Aplicação de SDN no gerenciamento de perfis de usuário em dispositivos de rede
Abstract
Software Defined Networks (SDN) isolate the control plane from the data plane, allowing a global view of the network and providing a high level programmable network. This can be very useful for managing network access control by associating device flows to user profiles. This paper proposes a tool for managing user profiles by authorizing device flows using software-defined networks. This tool has been implemented on the OpenFlow controller POX. In this paper we describe the experiments performed and the results obtained, which show the efficacy and the ease of use of the mechanism.
References
Combs, G. (2018). Disponível em <https://www.wireshark.org/>. Acesso em: 10 de
D. Marschke et al, J. Doyle, P. M. (2015). SDN: Anatomy of Openow. Lulu Publishing
Kamboj, P. and Raj, G. (2016). Analysis of role-based access control in software-dened networking. In Pant, M., Deep, K., Bansal, J. C., Nagar, A., and Das, K. N., editors, Proceedings of Fifth International Conference on Soft Computing for Problem Solving, pages 687–697, Singapore. Springer Singapore.
Mattos and Duarte (2014). AuthFlow Um Mecanismo de Autenticação e Controle de Acesso para Redes Denidas por Software. 32o Simpósio Brasileiro de Redes de Com- putadores e Sistemas Distribuídos, p. 661–674.
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., and Turner, J. (2008). Openow: Enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38(2):69–74.
Mininet (2013). Disponível em <http://mininet.org/>. Acesso em: 10 de abril de 2018.
MySQL (1995). Sistema de Gerenciamento de Banco de Dados MySQL. Disponível em <https://dev.mysql.com/doc/refman/5.7/en/>. Acesso em: 9 de novembro de 2017.
NOXRepo (2012). Nox repo. Disponível em <http://www.noxrepo.org>. Acesso em: 15 de dezembro de 2017.
OpenVSwitch (2009). Disponível em <http://www.openvswitch.org/>. Acesso em: 9 de novembro de 2017.
Rossum, G. V. (1991). Python. Disponível em <https://www.python.org/>. Acesso em: 12 de setembro de 2017.
Sandhu et al. (1996). Sandhu ', R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E. and Sandhu, R. (1996). Role-Based Access Control Models. IEEE Computer, v. 29, n. 2, p. 38–47.
