Navegando por Assunto "Fluxo aberto"
Agora exibindo 1 - 2 de 2
- Resultados por página
- Opções de Ordenação
Item Acesso aberto (Open Access) Uma abordagem SDN para virtualização de redes(Universidade Federal do Pará, 2016-11-25) PINHEIRO, Billy Anderson; ABELÉM, Antônio Jorge Gomes; http://lattes.cnpq.br/5376253015721742The virtual SDN networks (vSDNs) have emerged from the association of virtualization and Software-Dened Networking (SDN), providing greater control and better use of network resources. Several studies have already shown the feasibility and benets of this approach. However, the issue still lacks solutions that can virtualize a network in a scalable, intuitive and simplied manner. Thus, this thesis proposes an SDN approach to network virtualization with the aim of reducing the limitations on vSDNs. Therefore, it is suggested to adopt in network virtualization the separation between data plans (distributed) and control (centralized), the global network view and use of ow abstraction to manage the communication between the dierent points. To support our proposition, three solutions were developed: the CIM-SDN (Common Information Model for Software-Dened Networking), to enable the use of formal representation of the new elements of vSDNs; The NVP (Network Virtualization Proxy), to provide greater scalability by separating the control plane into centralized and decentralized parts; And Graph Virtualization Layer (GVL), to provide greater use of abstractions between the hypervisor and controllers, thereby simplifying the understanding and use of the network. Proof of concept tests was carried out for the three proposed solutions, demonstrating the feasibility of the approach.Item Acesso aberto (Open Access) IPSFlow: Um framework para Sistema de Prevenção de Intrusão baseado em Redes Definidas por Software(Universidade Federal do Pará, 2013-10-09) NAGAHAMA, Fábio Yu; ABELÉM, Antonio Jorge Gomes; http://lattes.cnpq.br/5376253015721742; CERQUEIRA, Eduardo Coelho; http://lattes.cnpq.br/1028151705135221Intrusion Detection and Prevention Systems (IDSs/IPSs) are well known tools and well enshrined in the world of information security. However, the lack of integration with network equipment, such as switches and routers, tends to limit the performance of these tools leads to require a proper dimensioning of hardware resources such as processor, memory and high-speed network interfaces used to implement them. Faced with several limitations encountered by researchers and network administrators, the concept of Software Defined Network (SDN), that separates the data and control planes, emerged allowing to adapt the operation of the network according to their needs. Thus, due to standardization and flexibility offered by SDNs, and the limitations presented by IDSs, this dissertation proposes IPSFlow, a framework that uses a network based on the SDN architecture, and the OpenFlow protocol, to create an IPS with wide coverage that blocks a malicious traffic in the equipment closer to the origin. To validate the framework, experiments in the virtual Mininet environment were conducted using Snort as IDS to analyze scanning traffic generated by Nmap from a host to another. The results show that the IPSFlow worked as planned by blocking almost 85% of scanning traffic.