Turn off MathJax
Article Contents
ZHAO Yue, YANG Bin, TENG Fei, et al., “A Review of Intelligent Configuration and Its Security for Complex Networks,” Chinese Journal of Electronics, in press, doi: 10.23919/cje.2023.00.001, 2022.
Citation: ZHAO Yue, YANG Bin, TENG Fei, et al., “A Review of Intelligent Configuration and Its Security for Complex Networks,” Chinese Journal of Electronics, in press, doi: 10.23919/cje.2023.00.001, 2022.

A Review of Intelligent Configuration and Its Security for Complex Networks

doi: 10.23919/cje.2023.00.001
Funds:  This work was supported by the National Natural Science Foundation of China (U20B2049, U20B2048, U20B2046, 61962033, 62272398, 62171387, 62202390, 61976064), the Key Research and Development Project of Sichuan Province of China (2022YFG0028, 2022YFG0172), and the Natural Science Project of Anhui/ChuZhou University (KJ2021ZD0128, 2022XJZD12).
More Information
  • Author Bio:

    Yue ZHAO born in 1983, received the B.S. degree from the North China Institute of Science and Technology, Langfang, China, in 2006, and the Ph.D. degree from Southwest Jiaotong University, Chengdu, China, in 2012. He is currently a professorate senior engineer with the Science and Technology on Communication Security Laboratory, Chengdu. He is also the master student supervisor of School of Computing and Artificial Intelligence of Southwest Jiaotong University, School of Computer and Software Engineering of Xihua University, and School of Computer and Information Engineering of Chuzhou University. His research interests include wireless networks and information security. (Email: yuezhao@foxmail.com)

    Bin YANG received his Ph.D. degree in systems information science from Future University Hakodate, Japan in 2015. He was a research fellow with the School of Electrical Engineering, Aalto University, Finland, from Jul. 2020 to Nov. 2021. He is currently a professor with the School of Computer and Information Engineering, Chuzhou University, China. His research interests include unmanned aerial vehicle networks, cyber security and Internet of Things. (Email: ybcup@chzu.edu.cn)

    Fei TENG received her B.S. degree and M.S. degree from the Southwest Jiaotong University, China in 2006 and 2008, respectively. She received her Ph.D degree at Ecole Centrale Paris in France in 2011. She is an associate professor at School of Computing and Artificial Intelligence, Southwest Jiaotong University, China. Her research interests include cloud computing, industrial data mining. (Email: fteng@swjtu.edu.cn)

    Xianhua NIU received the B.S. degree in communication engineering and the Ph.D. degree in information security from Southwest Jiaotong University, Chengdu, China, in 2006 and 2012, respectively. She is currently a Professor with the School of Computer and Software Engineering, Xihua University, and a Post-Doctoral Member with the National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu. Her research interests include sequence design and coding theory. (Email: niuxh@mail.xhu.edu.cn)

    Ning HU received his B.S., M.S. and Ph.D degree in computer science from National University of Defense Technology (NUDT), China. He is currently a professor of the Cyberspace Institute of Advanced Technology, Guangzhou University. His current research interests include Software-Defined Network and Network Security. (Email: huning@gzhu.edu.cn)

    Bo TIAN born in 1970. He received a M.S. degree in communication engineering from Southwest Communication Institute, in 1997. Currently, he is an executive vice-director and professorate senior engineer of Science and Technology on Communication Security Laboratory, Chengdu, China. His main research interests include cyberspace security and communication information system. (Email: tb_30wish@163.com)

  • Received Date: 2023-01-01
  • Accepted Date: 2023-01-05
  • Available Online: 2023-07-14
  • Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. However, there is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation, and so on. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
  • loading
  • [1]
    Y. L. Hu, J. C. Li, and Y. R. Ruan, “Finding influencers in complex networks: A novel method based on information theory,” IEEE Systems Journal, vol.16, no.2, pp.3372–3380, 2022. doi: 10.1109/JSYST.2021.3119081
    [2]
    R. Q. Lu, W. W. Yu, J. H. Lü, et al., “Synchronization on complex networks of networks,” IEEE Transactions on Neural Networks and Learning Systems, vol.25, no.11, pp.2110–2118, 2014. doi: 10.1109/TNNLS.2014.2305443
    [3]
    O. Duman, M. Y. Zhang, L. Y. Wang, et al., “Factor of security (FoS): Quantifying the security effectiveness of redundant smart grid subsystems,” IEEE Transactions on Dependable and Secure Computing, vol.19, no.2, pp.1018–1035, 2022. doi: 10.1109/TDSC.2020.3009931
    [4]
    Defense Advanced Research Projects Agency, “DARPA Configuration Security (ConSec) Program,” Available at: https://www.darpa.mil/program/configuration-security, 2018-01-09. (查阅网上资料,未找到本条文献信息,请确认)
    [5]
    H. H. Liu, X. Wu, W. Zhou, et al., “Automatic life cycle management of network configurations,” in Proceedings of the Afternoon Workshop on Self-Driving Networks, Budapest, Hungary, pp.29–35, 2018.
    [6]
    D. Comer and A. Rastegarnia, “Toward disaggregating the SDN control plane,” IEEE Communications Magazine, vol.57, no.10, pp.70–75, 2019. doi: 10.1109/MCOM.001.1900063
    [7]
    D. Comer, “Configuration and operation,” in Automated Network Management Systems: Current and Future Capabilities, China Machine Press, Beijing China, pp.103–112, 2009. (查阅网上资料, 未找到本条文献信息, 请确认)
    [8]
    Y. S. X. Lin, J. Bi, Y. Zhou, et al., “Research and applications of programmable data plane based on P4,” Chinese Journal of Computers, vol.42, no.11, pp.2539–2560, 2019. (in Chinese) doi: 10.11897/SP.J.1016.2019.02539
    [9]
    A. Ratan, “Using artificial intelligence in operations,” in Practical Network Automation: A Beginner’s Guide to Automating and Optimizing Networks Using Python, Ansible, and More, 2nd ed., A. Ratan, Ed. Packt Publishing, Birmingham, UK, pp.618–619, 2018. (查阅网上资料, 作者及出版地信息不确定, 请确认)
    [10]
    B. Claise, J. Clarke, and J. Lindblad, “Automation is as good as the data models, their related metadata, and the tools: For the network architect and operator introduction,” in Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI, China Machine Press, Beijing China, pp.213–225, 2009. (查阅网上资料, 未找到本条文献信息, 请确认)
    [11]
    T. Szigeti, D. Zacks, M. Falkner, and S. Arena, “Software Innovations,” in Cisco Digital Network Architecture: Intent-Based Networking for the Enterprise, Hoboken, NJ, USA, Cisco Press, pp.189–224, 2018. (查阅网上资料, 未找到本条文献信息, 请确认)
    [12]
    A. Bartusevics and L. Novickis, “Models for implementation of software configuration management,” Procedia Computer Science, vol.43, pp.3–10, 2015. doi: 10.1016/j.procs.2014.12.002
    [13]
    K. T. Foerster, S. Schmid, and S. Vissicchio, “Survey of consistent software-defined network updates,” IEEE Communications Surveys & Tutorials, vol.21, no.2, pp.1435–1461, 2019. doi: 10.1109/COMST.2018.2876749
    [14]
    W. Kellerer, P. Kalmbach, A. Blenk, et al., “Adaptable and data-driven softwarized networks: Review, opportunities, and challenges,” Proceedings of the IEEE, vol.107, no.4, pp.711–731, 2019. doi: 10.1109/JPROC.2019.2895553
    [15]
    M. He, A. M. Alba, A. Basta, et al., “Flexibility in softwarized networks: Classifications and research challenges,” IEEE Communications Surveys & Tutorials, vol.21, no.3, pp.2600–2636, 2019. doi: 10.1109/COMST.2019.2892806
    [16]
    Q. Cai, S. Alam, and J. M. Liu, “On the robustness of complex systems with multipartitivity structures under node attacks,” IEEE Transactions on Control of Network Systems, vol.7, no.1, pp.106–117, 2020. doi: 10.1109/TCNS.2019.2919856
    [17]
    G. C. Zhang, Y. Q. Xia, X. F. Li, et al., “Multievent-triggered sliding-mode control for a class of complex dynamic network,” IEEE Transactions on Control of Network Systems, vol.9, no.2, pp.835–844, 2022. doi: 10.1109/TCNS.2021.3124897
    [18]
    C. K. Zhang, Y. Cui, H. Y. Tang, et al., “State-of-the-art survey on software-defined networking (SDN),” Journal of Software, vol.26, no.1, pp.62–81, 2015. (in Chinese) doi: 10.13328/j.cnki.jos.004701
    [19]
    M. Dai, G. Cheng, and Y. Y. Zhou, “Survey on measurement methods in software-defined networking,” Journal of Software, vol.30, no.6, pp.1853–1874, 2019. (in Chinese) doi: 10.13328/j.cnki.jos.005832
    [20]
    L. Csikor, M. Szalay, G. Rétvári, et al., “Transition to SDN is HARMLESS: Hybrid architecture for migrating legacy ethernet switches to SDN,” IEEE/ACM Transactions on Networking, vol.28, no.1, pp.275–288, 2020. doi: 10.1109/TNET.2019.2958762
    [21]
    A. Ludwig, S. Dudycz, M. Rost, et al., “Transiently policy-compliant network updates,” IEEE/ACM Transactions on Networking, vol.26, no.6, pp.2569–2582, 2018. doi: 10.1109/TNET.2018.2871023
    [22]
    K. Subramanian, L. Antoni, and A. Akella. “Synthesis of fault-tolerant distributed router configurations,” in Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems, Irvine, CA, USA, pp.87–89, 2018.
    [23]
    S. Achleitner, N. Bartolini, T. He, et al., “Fast network configuration in software defined networking,” IEEE Transactions on Network and Service Management, vol.15, no.4, pp.1249–1263, 2018. doi: 10.1109/TNSM.2018.2874051
    [24]
    D. Streeb, M. El-Assady, D. A. Keim, et al., “Why visualize? Untangling a large network of arguments,” IEEE Transactions on Visualization and Computer Graphics, vol.27, no.3, pp.2220–2236, 2021. doi: 10.1109/TVCG.2019.2940026
    [25]
    S. di Bartolomeo, M. Riedewald, W. Gatterbauer, et al., “STRATISFIMAL LAYOUT: A modular optimization model for laying out layered node-link network visualizations,” IEEE Transactions on Visualization and Computer Graphics, vol.28, no.1, pp.324–334, 2022. doi: 10.1109/TVCG.2021.3114756
    [26]
    A. Gember-Jacobson, C. Raiciu, and L. Vanbever, “Integrating verification and repair into the control plane,” in Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, pp.129–135, 2017.
    [27]
    E. N. Zhai, A. Chen, R. Piskac, et al., “Check before you change: Preventing correlated failures in service updates,” in Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp.575–590, 2020.
    [28]
    S. K. R. Kakarla, A. L. Tang, R. Beckett, et al., “Finding network misconfigurations by automatic template inference,” in Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp.999–1014, 2020.
    [29]
    Y. Zhao, Y. R. Yang, B. Tian, et al., “An invocation chain test and evaluation method for fog computing,” Wireless Communications and Mobile Computing, vol.2020, article no.8812017, 2020. doi: 10.1155/2020/8812017
    [30]
    F. Tao, Y. Laili, Y. L. Liu, et al., “Concept, principle and application of dynamic configuration for intelligent algorithms,” IEEE Systems Journal, vol.8, no.1, pp.28–42, 2014. doi: 10.1109/JSYST.2013.2275619
    [31]
    U. Dharmapriya, S. B. Kiridena, and N. Shukla, “A review of supply network configuration literature and decision support tools,” in Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Bali, Indonesia, pp.149–153, 2016.
    [32]
    M. Sayagh, N. Kerzazi, B. Adams, et al., “Software configuration engineering in practice interviews, survey, and systematic literature review,” IEEE Transactions on Software Engineering, vol.46, no.6, pp.646–673, 2020. doi: 10.1109/TSE.2018.2867847
    [33]
    E. Schede, J. Brandt, A. Tornede, et al., “A survey of methods for automated algorithm configuration,” Journal of Artificial Intelligence Research, vol.75, pp.425–487, 2022. doi: 10.1613/jair.1.13676
    [34]
    S. Achleitner, Q. Burke, P. McDaniel, et al., “MLSNet: A policy complying multilevel security framework for software defined networking,” IEEE Transactions on Network and Service Management, vol.18, no.1, pp.729–744, 2021. doi: 10.1109/TNSM.2020.3045998
    [35]
    B. Li, Z. D. Wang, and L. F. Ma, “An event-triggered pinning control approach to synchronization of discrete-time stochastic complex dynamical networks,” IEEE Transactions on Neural Networks and Learning Systems, vol.29, no.12, pp.5812–5822, 2018. doi: 10.1109/TNNLS.2018.2812098
    [36]
    X. P. Qi, K. Duan, and K. Wang, “Design of module-based test system configuration management system,” in Proceedings of the IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS), Dalian, China, pp.194–197, 2020.
    [37]
    J. Edelman, S. S. Lowe, and M. Oswalt, “Network automation,” in Network Programmability and Automation: Skills for the Next-Generation Network Engineer, J. Edelman, S. S. Lowe, and M. Oswalt, Eds. O’Reilly, Sebastopol, CA, USA, pp.56–58, 2018. (查阅网上资料, 作者及出版地信息不确定, 请确认)
    [38]
    E. L. Manibardo, I. Laña, and J. Del Ser, “Deep learning for road traffic forecasting: Does it make a difference?,” IEEE Transactions on Intelligent Transportation Systems, vol.23, no.7, pp.6164–6188, 2022. doi: 10.1109/TITS.2021.3083957
    [39]
    P. Ashok, T. P. G. James, G. Malathi, et al., “Development of truly intelligent autonomous agents based on classical AI using complex representations,” in Proceedings of the International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), Chennai, India, pp.1–6, 2022.
    [40]
    C. G. Yang, X. R. Mi, Y. Ouyang, et al., “SMART intent-driven network management,” IEEE Communications Magazine, vol.61, no.1, pp.106–112, 2023. doi: 10.1109/MCOM.002.2200119
    [41]
    Y. W. E. Sung, X. Z. Tie, S. H. Y. Wong, et al., “Robotron: Top-down network management at facebook scale,” in Proceedings of the 2016 ACM SIGCOMM Conference, Florianopolis, Brazil, pp.426–439, 2016.
    [42]
    R. Beckett, R. Mahajan, T. Millstein, et al., “Don't mind the gap: Bridging network-wide objectives and device-level configurations,” in Proceedings of the 2016 ACM SIGCOMM Conference, Florianopolis, Brazil, pp.328–341, 2016.
    [43]
    R. Beckett, R. Mahajan, T. Millstein, et al., “Network configuration synthesis with abstract topologies,” in Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, New York, NY, USA, pp.437–451, 2017.
    [44]
    S. Choi, B. Burkov, A. Eckert, et al., “FBOSS: Building switch software at scale,” in Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, Budapest, Hungary, pp.342–356, 2018.
    [45]
    A. El-Hassany, P. Tsankov, L. Vanbever, et al., “netcomplete: Practical network-wide configuration synthesis with autocompletion,” in Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, Renton, WA, USA, pp.579–594, 2018.
    [46]
    F. X. Tang, B. M. Mao, Y. Kawamoto, et al., “Survey on machine learning for intelligent end-to-end communication toward 6G: From network access, routing to traffic control and streaming adaption,” IEEE Communications Surveys & Tutorials, vol.23, no.3, pp.1578–1598, 2021. doi: 10.1109/COMST.2021.3073009
    [47]
    Y. Zhao, X. M. Fang, R. S. Huang, et al., “Joint interference coordination and load balancing for OFDMA multihop cellular networks,” IEEE Transactions on Mobile Computing, vol.13, no.1, pp.89–101, 2014. doi: 10.1109/TMC.2012.224
    [48]
    V. Sciancalepore, F. Z. Yousaf, and X. Costa-Perez, “z-TORCH: An automated NFV orchestration and monitoring solution,” IEEE Transactions on Network and Service Management, vol.15, no.4, pp.1292–1306, 2018. doi: 10.1109/TNSM.2018.2867827
    [49]
    M. Samson, T. Vergnaud, É. Dujardin, et al., “A model-based approach to automatic generation of TSN network simulations,” in Proceedings of the IEEE 18th International Conference on Factory Communication Systems (WFCS), Pavia, Italy, pp.1–8, 2022.
    [50]
    A. Kanso, F. Khendek, M. Toeroe, et al., “Automatic configuration generation for service high availability with load balancing,” Concurrency and Computation: Practice & Experience, vol.25, no.2, pp.265–287, 2013. doi: 10.1002/cpe.2805
    [51]
    A. Syed, B. Anwer, V. Gopalakrishnan, et al., “DEPO: A platform for safe DEployment of POlicy in a software defined infrastructure,” in Proceedings of the 2019 ACM Symposium on SDN Research, San Jose, CA, USA, pp.98–111, 2019.
    [52]
    R. Birkner, D. Drachsler-Cohen, L. Vanbever, et al., “Config2Spec: Mining network specifications from network configurations,” in Proceedings of the 17th USENIX Conference on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp.969–984, 2020.
    [53]
    N. Perera, “Automatic configuration management - Autodiscovery of Configuration Items and Automatic Configuration Verification,” in Proceeding of the International Conference on Space Operations (SpaceOps), Daejeon, Korea, pp.1–13, 2016. (查阅网上资料,页码信息不确定,请确认)
    [54]
    H. H. Liu, Y. B. Zhu, J. Padhye, et al., “CrystalNet: Faithfully emulating large production networks,” in Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, pp.599–613, 2017.
    [55]
    L. Z. Tan, W. Su, W. Zhang, et al., “A packet loss monitoring system for in-band network telemetry: Detection, localization, diagnosis and recovery,” IEEE Transactions on Network and Service Management, vol.18, no.4, pp.4151–4168, 2021. doi: 10.1109/TNSM.2021.3125012
    [56]
    J. Y. Pan, Z. X. Wei, W. Chen, et al., “Orchestrating probabilistic in-band network telemetry for network monitoring,” in Proceedings of the International Conference on Computer and Communications (ICCC), Chengdu, China, pp.441–446, 2021.
    [57]
    A. Fogel, S. Fung, L. Pedrosa, et al., “A general approach to network configuration analysis,” in Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, Oakland, CA, USA, pp.469–483, 2015.
    [58]
    R. Beckett, A. Gupta, R. Mahajan, et al., “A general approach to network configuration verification,” in Proceedings of the Conference of the ACM Special Interest Group on Data Communication, Los Angeles, CA, USA, pp.155–168, 2017.
    [59]
    A. Panda, K. Argyraki, M. Sagiv, et al., “New directions for network verification,” in Proceedings of the 1st Summit on Advances in Programming Languages (SNAPL), Dagstuhl, Germany, pp.209–220, 2015.
    [60]
    S. Prabhu, K. Y. Chou, A. Kheradmand, et al., “Plankton: Scalable network configuration verification through model checking,” in Proceedings of the 17th USENIX Conference on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp.953–968, 2020.
    [61]
    S. K. Fayaz, T. Sharma, A. Fogel, et al., “Efficient network reachability analysis using a succinct control plane representation,” in Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, Savannah, GA, USA, pp.217–232, 2016.
    [62]
    A. Gember-Jacobson, A. Akella, R. Mahajan, et al., “Automatically repairing network control planes using an abstract representation,” in Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, pp.359–373, 2017.
    [63]
    A. Gember-Jacobson, R. Viswanathan, A. Akella, et al., “Fast control plane analysis using an abstract representation,” in Proceedings of the 2016 ACM SIGCOMM Conference, Florianopolis, Brazil, pp.300–313, 2016.
    [64]
    Y. H. Li, X. Yin, Z. L. Wang, et al., “A survey on network verification and testing with formal methods: Approaches and challenges,” IEEE Communications Surveys & Tutorials, vol.21, no.1, pp.940–969, 2019. doi: 10.1109/COMST.2018.2868050
    [65]
    J. A. Riaza and G. Moreno, “Using SAT/SMT solvers for efficiently tuning fuzzy logic programs,” in Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Glasgow, UK, pp.1–8, 2020.
    [66]
    S. Zhou, J. B. Wang, J. Jia, et al., “A formal verification method for the SOPC software,” IEEE Transactions on Reliability, vol.71, no.2, pp.818–829, 2022. doi: 10.1109/TR.2022.3166548
    [67]
    F. L. Li, J. H. Yang, J. P. Wu, et al., “Research on internet automatic configuration,” Journal of Software, vol.25, no.1, pp.118–134, 2014. (in Chinese) doi: 10.13328/j.cnki.jos.004458
    [68]
    S. Sinche, D. Raposo, N. Armando, et al., “A survey of IoT management protocols and frameworks,” IEEE Communications Surveys & Tutorials, vol.22, no.2, pp.1168–1190, 2020. doi: 10.1109/COMST.2019.2943087
    [69]
    S. Zhou, J. B. Wang, J. Jia, et al., “A formal verification method for the SOPC software,” IEEE Transactions on Reliability, vol.71, no.2, pp.818–829, 2022. doi: 10.1109/TR.2022.3166548.
    [70]
    F. Lei, D. Z. Dong, and X. K. Liao, “Exploring the galaxyfly family to build flexible-scale interconnection networks,” IEEE Transactions on Parallel and Distributed Systems, vol.33, no.5, pp.1054–1068, 2022. doi: 10.1109/TPDS.2021.3100783
    [71]
    Y. Y. Liu, Z. Y. Liu, F. Fang, et al., “Hierarchical domain-consistent network for cross-domain object detection,” in Proceedings of the IEEE International Conference on Image Processing (ICIP), Anchorage, AK, USA, pp.474–478, 2021.
    [72]
    H. Chahed and A. J. Kassler, “Software-defined time sensitive networks configuration and management,” in Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Heraklion, Greece, pp.124–128, 2021.
    [73]
    L. Z. You, J. H. Zhang, Y. L. Jin, et al., “Fast configuration change impact analysis for network overlay data center networks,” IEEE/ACM Transactions on Networking, vol.30, no.1, pp.423–436, 2022. doi: 10.1109/TNET.2021.3114448
    [74]
    S. K. Patri, E. Grigoreva, W. Kellerer, et al., “Rational agent-based decision algorithm for strategic converged network migration planning,” Journal of Optical Communications and Networking, vol.11, no.7, pp.371–382, 2019. doi: 10.1364/JOCN.11.000371
    [75]
    M. Quamara, G. Pedroza, and B. Hamid, “Multi-layered model-based design approach towards system safety and security co-engineering,” in Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, Japan, pp.274–283, 2021.
    [76]
    L. Hiryanto, S. Soh, K. W. Chin, et al., “Green multi-stage upgrade for bundled-links SDN/OSPF-ECMP networks,” in Proceedings of the IEEE International Conference on Communications, Montreal, QC, Canada, pp.1–7, 2021.
    [77]
    S. Achleitner, Q. Burke, P. McDaniel, et al., “MLSNet: A policy complying multilevel security framework for software defined networking,” IEEE Transactions on Network and Service Management, vol.18, no.1, pp.729–744, 2021. doi: 10.1109/TNSM.2020.3045998.
    [78]
    H. W. Hui, C. C. Zhou, S. G. Xu, et al., “A novel secure data transmission scheme in industrial internet of things,” China Communications, vol.17, no.1, pp.73–88, 2020. doi: 10.23919/JCC.2020.01.006
    [79]
    A. Aminpour and P. Razzaghi, “Weakly Supervised Semantic Segmentation Using Hierarchical Multi-Image Model,” in Proceedings of the Iranian Conference on Electrical Engineering (ICEE), Mashhad, Iran, pp.1634–1640, 2018.
    [80]
    J. Brenes, A. García-Martínez, M. Bagnulo, et al., “Power prefixes prioritization for smarter BGP reconvergence,” IEEE/ACM Transactions on Networking, vol.28, no.3, pp.1074–1087, 2020. doi: 10.1109/TNET.2020.2979665
    [81]
    M. Quamara, G. Pedroza, and B. Hamid, “Introducing a multi-layered model-based design approach towards safety-security co-engineering,” in Proceedings of the IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Hainan, China, pp.1163–1164, 2021.
    [82]
    S. Achleitner, Q. Burke, P. McDaniel, et al., “MLSNet: A policy complying multilevel security framework for software defined networking,” IEEE Transactions on Network and Service Management, vol.18, no.1, pp.729–744, 2021. doi: 10.1109/TNSM.2020.3045998.
    [83]
    M. Behringer, M. Pritikin, S. Bjarnason, et al., “Autonomic networking: Definitions and design goals,” Available at: https://www.rfc-editor.org/rfc/pdfrfc/rfc7575.txt.pdf, 2015-06-01.
    [84]
    A. Clemm, L. Ciavaglia, L. Z. Granville, et al., “Intent-based networking-concepts and definitions,” Available at: https://datatracker.ietf.org/doc/rfc9315/, 2022-10-11.
    [85]
    Q. Sun, W. Liu, and K. Xie, “An Intent-driven Management Fra mework,” Available at: https://datatracker.ietf.org/meeting/105/materials/slides-105-nmrg-an-intent-driven-management-framework-01.pdf, 2019-07-08.
    [86]
    R. Perez, A. Zabala, and A. Banchs, “Alviu: An intent-based SD-WAN orchestrator of network slices for enterprise networks,” in Proceedings of the IEEE 7th International Conference on Network Softwarization (NetSoft), Tokyo, Japan, pp.211–215, 2021.
    [87]
    S. Larkin, W. Collicott, and J. Hiebel, “Modeling expert knowledge in a heuristic-based gin rummy agent,” in Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), virtual event, pp.15577–15582, 2021.
    [88]
    M. F. Balcan, T. Sandholm, and Ellen Vitercik, “Refined bounds for algorithm configuration: The knife-edge of dual class approximability,” in Proceedings of the 37th International Conference on Machine Learning (ICML), Vienna, Austria, article no.55, 2020. (查阅网上资料,未找到对应的出版地信息,请确认)
    [89]
    N. Halliwell, “Evaluating explanations of relational graph convolutional network link predictions on knowledge graphs,” in Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), virtual event, pp.12880–12881, 2022.
    [90]
    B. Y. Hou, Q. Chen, Z. Q. Chen, et al., “r-HUMO: A risk-aware human-machine cooperation framework for entity resolution with quality guarantees,” IEEE Transactions on Knowledge and Data Engineering, vol.32, no.2, pp.347–359, 2020. doi: 10.1109/TKDE.2018.2883532
    [91]
    B. M. Mao, Y. Kawamoto, J. J. Liu, et al., “Harvesting and threat aware security configuration strategy for IEEE 802.15. 4 based IoT networks,” IEEE Communications Letters, vol.23, no.11, pp.2130–2134, 2019. doi: 10.1109/LCOMM.2019.2932988
    [92]
    F. Q. Liu, H. Huang, Z. M. Yang, et al., “Search-based algorithm with scatter search strategy for automated test case generation of NLP toolkit,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol.5, no.3, pp.491–503, 2021. doi: 10.1109/TETCI.2019.2914280
    [93]
    Y. Cao, R. Wang, M. Chen, et al., “AI agent in software-defined network: Agent-based network service prediction and wireless resource scheduling optimization,” IEEE Internet of Things Journal, vol.7, no.7, pp.5816–5826, 2020. doi: 10.1109/JIOT.2019.2950730
    [94]
    O. Alhussein, P. Thinh Do, Q. Ye, et al., “A virtual network customization framework for multicast services in NFV-enabled core networks,” IEEE Journal on Selected Areas in Communications, vol.38, no.6, pp.1025–1039, 2020. doi: 10.1109/JSAC.2020.2986591
    [95]
    Y. Bi, C. C. Meixner, M. Bunyakitanon, et al., “Multi-objective deep reinforcement learning assisted service function chains placement,” IEEE Transactions on Network and Service Management, vol.18, no.4, pp.4134–4150, 2021. doi: 10.1109/TNSM.2021.3127685
    [96]
    L. L. Zheng, H. L. Xu, S. Chen, et al., “Performance guaranteed single link failure recovery in SDN overlay networks,” in Proceedings of the IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), Hong Kong, China, pp.703–708, 2020.
    [97]
    L. Y. Ji, S. B. He, W. J. Wu, et al., “Dynamic network slicing orchestration for remote adaptation and configuration in industrial IoT,” IEEE Transactions on Industrial Informatics, vol.18, no.6, pp.4297–4307, 2022. doi: 10.1109/TII.2021.3131355
    [98]
    E. Municio, N. Balemans, S. Latré, et al., “Leveraging distributed protocols for full end-to-end softwarization in IoT networks,” in Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, pp.1–6, 2020.
    [99]
    R. Ganduri, R. Dantu, M. Thompson, et al., “A human-network-security-interface for an average joe,” in Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, pp.1–6, 2020.
    [100]
    C. Lorenz, V. Clemens, M. Schrötter, et al., “Continuous verification of network security compliance,” IEEE Transactions on Network and Service Management, vol.19, no.2, pp.1729–1745, 2022. doi: 10.1109/TNSM.2021.3130290
    [101]
    S. Guellouz, A. Benzina, M. Khalgui, et al., “Designing efficient reconfigurable control systems using IEC61499 and symbolic model checking,” IEEE Transactions on Automation Science and Engineering, vol.16, no.3, pp.1110–1124, 2019. doi: 10.1109/TASE.2018.2868897
    [102]
    Y. Zhang, K. Chakrabarty, Z. B. Peng, et al., “Software-based self-testing using bounded model checking for out-of-order superscalar processors,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.39, no.3, pp.714–727, 2020. doi: 10.1109/TCAD.2018.2890695
    [103]
    Y. Zhao, X. M. Fang, B. Huang, et al., “Resource allocation scheme based on load balancing for OFDMA two-hop relay networks,” Journal of Southwest Jiaotong University, vol.48, no.1, pp.94–101, 2013. (in Chinese) doi: 10.3969/j.issn.0258-2724.2013.01.015
    [104]
    A. Rahman and L. Williams, “Characterizing defective configuration scripts used for continuous deployment,” in Proceedings of the IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), Västerås, Sweden, pp.34–45, 2018.
    [105]
    A. Lara and B. Ramamurthy, “OpenSec: Policy-based security using software-defined networking,” IEEE Transactions on Network and Service Management, vol.13, no.1, pp.30–42, 2016. doi: 10.1109/TNSM.2016.2517407
    [106]
    C. C. Machado, L. Z. Granville, and A. Schaeffer-Filho, “ANSwer: Combining NFV and SDN features for network resilience strategies,” in Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, pp.391–396, 2016.
    [107]
    I. Hafeez, A. Y. Ding, L. Suomalainen, et al., “Securebox: Toward safer and smarter IoT networks,” in Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking, Irvine, CA, USA, pp.55–60, 2016.
    [108]
    Z. L. Zhao, E. Schiller, E. Kalogeiton, et al., “Autonomic communications in software-driven networks autonomic communications in software-driven networks,” IEEE Journal on Selected Areas in Communications, vol.35, no.11, pp.2431–2445, 2017. doi: 10.1109/JSAC.2017.2760354
    [109]
    S. Choi and J. Kwak, “Enhanced SDIoT security framework models,” International Journal of Distributed Sensor Networks, vol.12, no.5, article no.4807804, 2016. doi: 10.1155/2016/4807804
    [110]
    K. Fysarakis, N. E. Petroulakis, A. Roos, et al., “A reactive security framework for operational wind parks using service function chaining,” in Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, pp.663–668, 2017.
    [111]
    A. M. Zarca, J. B. Bernabe, I. Farris, “Enhancing IoT security through network softwarization and virtual security appliances,” International Journal of Network Management, vol.28, no.5, article no.e2038, 2018. doi: 10.1002/nem.2038
    [112]
    X. C. Liu, “Application of configuration software in remote monitoring system,” in Proceedings of the International Conference on Virtual Reality and Intelligent Systems (ICVRIS), Hunan, China, pp.263–266, 2018.
    [113]
    C. C. Min, D. C. Zhao, and H. Lu, “The processing method of the message based on the in-band network telemetry technology,” in Proceedings of the International Conference on Service Science (ICSS), Zhuhai, China, pp.21–24, 2022.
    [114]
    B. Gu, J. L. Li, J. C. Fang, et al., “Airborne distributed POS flexible baseline measurement method based on MCLS,” IEEE Sensors Journal, vol.19, no.6, pp.2087–2095, 2019. doi: 10.1109/JSEN.2018.2886582
    [115]
    B. Małysiak-Mrozek, M. Stabla, and D. Mrozek, “Soft and declarative fishing of information in big data lake,” IEEE Transactions on Fuzzy Systems, vol.26, no.5, pp.2732–2747, 2018. doi: 10.1109/TFUZZ.2018.2812157
    [116]
    J. J. Carroll, P. Anand, and D. Guo, “Preproduction deploys: Cloud-native integration testing,” in Proceedings of the IEEE Cloud Summit (Cloud Summit), Hempstead, NY, USA, pp.41–48, 2021.
    [117]
    S. Yang, L. Z. Cui, X. H. Deng, et al., “FISE: A forwarding table structure for enterprise networks,” IEEE Transactions on Network and Service Management, vol.17, no.2, pp.1181–1196, 2020. doi: 10.1109/TNSM.2019.2951426
    [118]
    A. Bartel, J. Klein, and Y. Le Traon, “Musti: Dynamic prevention of invalid object initialization attacks,” IEEE Transactions on Information Forensics and Security, vol.14, no.8, pp.2167–2178, 2019. doi: 10.1109/TIFS.2019.2894356
    [119]
    A. Umunnakwe, A. Sahu, and K. Davis, “Multi-component risk assessment using cyber-physical betweenness centrality,” in Proceedings of the IEEE Madrid PowerTech, Madrid, Spain, pp.1–6, 2021.
    [120]
    L. G. Chen, J. Guo, Z. L. He, et al., “RoBin: Facilitating the reproduction of configuration-related vulnerability,” in Proceedings of the IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, pp.91–98, 2021.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(9)  / Tables(2)

    Article Metrics

    Article views (238) PDF downloads(98) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return