verification and configuration of software-based … spinoso_presentation.pdfservice function...

39
Introduction Network Verification Network Configuration Conclusions Verification and Configuration of Software-based Networks Serena Spinoso XXIX PhD cycle [email protected] Advisor: Prof. Riccardo Sisto 29 June 2017 Serena Spinoso Verification and Configuration of Software-based Networks 1 / 38

Upload: others

Post on 29-May-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification and Configuration ofSoftware-based Networks

Serena SpinosoXXIX PhD cycle

[email protected]: Prof. Riccardo Sisto

29 June 2017

Serena Spinoso Verification and Configuration of Software-based Networks 1 / 38

Page 2: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

ScenarioGoal

Scenario

New opportunities in productive environments, like datacenters, thanks to:

Network Function Virtualization (NFV) decouplessoftware implementation of the network functions fromtheir physical counterparts

Software Defined Networking (SDN) is in charge ofchaining those functions to create network paths.

Serena Spinoso Verification and Configuration of Software-based Networks 2 / 38

Page 3: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

ScenarioGoal

Scenario

Service Providers allow users to build Service Graphs by:

selecting a set of Virtual Network Functions (VNFs)DPI, NAT, Firewall ...

specifying traffic forwarding through the selected VNFsService Function Chaining (SFC)

Serena Spinoso Verification and Configuration of Software-based Networks 3 / 38

Page 4: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

ScenarioGoal

Thesis Goals

Many research topics in SDN/NFV-based networks:VNF placement, security enforcement,bandwidth optimization, ...

PhD goals:1 Formal verification of service graph requests2 Model-based configuration of network functions

Serena Spinoso Verification and Configuration of Software-based Networks 4 / 38

Page 5: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Formal Verificationof Service Graphs

Serena Spinoso Verification and Configuration of Software-based Networks 5 / 38

Page 6: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Formal Network Verification

Formal verification checks the correctness of computersystems before putting them into use, by exploiting formalmethods and mathematical reasoning

Formal verification can be applied to the networking field:Network Verification proves that a network model (e.g.network configurations) fulfils certain invariants

Serena Spinoso Verification and Configuration of Software-based Networks 6 / 38

Page 7: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Formal Network Verification

Formal techniques for verification and property checking inSDN/NFV-based networks to avoid faults and errors at run-time

flexibility of the offered network servicesvery frequent network reconfiguration (e.g. user requestsor management events)

Traditional model checking techniques run out of memory andtime in case of complex network scenarios!

Serena Spinoso Verification and Configuration of Software-based Networks 7 / 38

Page 8: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Formal Network Verification: Challenges

Service Providers need verification strategies:done before deploying the service graphswith low verification timeswith fair processing resources (e.g. CPU, memory)

Serena Spinoso Verification and Configuration of Software-based Networks 8 / 38

Page 9: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Formal Verificationof Service Graphs

Detecting Anomalies in Service Function ChainsChecking Reachability in Service Graphs

Serena Spinoso Verification and Configuration of Software-based Networks 9 / 38

Page 10: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Detecting Anomalies in SFCs

Many SDN programming languages offer forwarding policiesto specify traffic forwarding through chains of VNFstranslated into flow entries in OpenFlow switches

Providers have to check the policy specification correctnessfaults in network configurations may arise at run-time

Serena Spinoso Verification and Configuration of Software-based Networks 10 / 38

Page 11: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Detecting Anomalies in SFCs: contributions

State of the Art:verification of OpenFlow networks

during or after the switch configuration deploymentjust conflict analysis among OpenFlow entries

Contributions:language-independent checking mechanismearly-detection of anomalies among forwarding policiescustomizable anomaly specification approach

Serena Spinoso Verification and Configuration of Software-based Networks 11 / 38

Page 12: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Detecting Anomalies in SFCs: anomalies

Forwarding anomalies are any erroneous or unwanted policyspecification done by the Service Provider

possible faulty network conditions and states at run-timeinclude conflicts, errors, sub-optimization, and more

Example:“FW must process traffic before NAT"“User1 traffic must not pass through FW"

Serena Spinoso Verification and Configuration of Software-based Networks 12 / 38

Page 13: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Detecting Anomalies in SFCs: the approach

First Order Logic models for:Forwarding rules that compose a policy

ri =(Mi , Ci) = (eth_srci = veth_srci , eth_dsti = veth_dsti ,

eth_typei = veth_typei , vlan_idi = vvlan_idi , ip_srci = vip_srci ,

ip_dsti = vip_dsti , ip_protoi = vip_protoi , port_srci = vport_srci ,

port_dsti = vport_dsti , c1i , ... , cn

i ), ri ∈ RF

Pre- and provider-defined anomalies

ip_srci = ip_srcj ∧ ip_dsti = ip_dstj ∧ ip_protoi = ip_protoj ∧port_srci = port_srcj ∧ port_dsti = port_dstj ∧ c1

i 6= c1j ⇒Collision(pii ,pij )

Serena Spinoso Verification and Configuration of Software-based Networks 13 / 38

Page 14: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Detecting Anomalies in SFCs: classification

Single-Field

Pair-FieldFlow-Error

Node TraversalNode Ordering

Chain Constraint

Chaining-Error

Intra-Rule

Sub-Optimiaztion

ConflictingInter-Rule

ForwardingAnomalies

Figure: Hierarchy of anomaly classes.

Serena Spinoso Verification and Configuration of Software-based Networks 14 / 38

Page 15: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Detecting Anomalies in SFCs: results

Verification time is influenced by both the number of forwardingrules and the percentage of these that trigger an anomaly

Reasonable verification times from boththe NFV architecture and users perspectives!

Serena Spinoso Verification and Configuration of Software-based Networks 15 / 38

Page 16: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Detecting Anomalies in SFCs:publications and next plans

Publications:Valenza, F., Spinoso, S., Basile, C., Sisto, R., Lioy, A.. A formal model ofnetwork policy analysis. In IEEE 1st International Forum on Research andTechnologies for Society and Industry Leveraging a better tomorrow (2015).

Valenza, F., Su, T., Spinoso, S., Lioy, A., Sisto, R., Vallini, M. A formalapproach for network security policy validation. Journal of WirelessMobile Networks, Ubiquitous Computing and Dependable Applications (2017).

Spinoso S., Sisto R., Formally Specifying and Checking Policies andAnomalies in Service Function Chaining. Submitted major revision to IEEETransactions on Network and Service Management.

Next improvements:raise the abstraction-level of traffic flow modellingraise the expressiveness of the model

- additional network operation (e.g. monitoring)Serena Spinoso Verification and Configuration of Software-based Networks 16 / 38

Page 17: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Formal Verificationof Service Graphs

Detecting Anomalies in Service Function ChainsChecking Reachability in Service Graphs

Serena Spinoso Verification and Configuration of Software-based Networks 17 / 38

Page 18: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in Service Graphs

Forwarding errors may also be due to faulty VNF configurationsat run-time

e.g. faulty filtering rules in firewalls, wrong black list inanti-spams, DPIs etc...

Service Providers need more accurate modelling approachesto check the network correctness

Serena Spinoso Verification and Configuration of Software-based Networks 18 / 38

Page 19: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in SGs: contributions

State of the Art:most existing verification tools are OpenFlow-orientedthey check network functions that take forwardingdecisions based on packet headers only (statelessfunctions)

Contributions:Model networks and stateful VNFs

network functions that alter and forward packets based oninternal states and algorithms

Serena Spinoso Verification and Configuration of Software-based Networks 19 / 38

Page 20: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in SGs: the approach

Boolean modelling and satisfiability checking techniques toverify reachability properties against stateful VNFs

VeriGraph:Network and VNFs models are sets of FOL formulasUse Z3, an SMT solver, as verification engineExploit Neo4J for service graph manipulation

Serena Spinoso Verification and Configuration of Software-based Networks 20 / 38

Page 21: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in SGs: network model

FOL formulas for modelling:

1 network fundamentals

(send(n0,n1, p0, t0)) =⇒ (n0 6= n1 ∧ p0.src 6= p0.dst), ∀n0, p0, t0

2 VNF behaviour (e.g. NAT)

(send(nat , n1, p1, t1) ∧ ¬isPrivateAddress(p1.dst)) =⇒ p1.src = ip_nat

∧ ∃(n0, p0, t0) | (t0 < t1 ∧ recv(n0, nat , p0, t0) ∧ isPrivateAddress(p0.src)

∧ p0.dst = p1.dst), ∀(n1, p1, t1)

Serena Spinoso Verification and Configuration of Software-based Networks 21 / 38

Page 22: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in SGs: VeriGraph

Part of the SP-DevOps toolkit (UNIFY) and integrated into aVNF Orchestrator (ESCAPE)

https://github.com/netgroup-polito/verigraph

Part of the D-release of Parser (OPNFV)https://github.com/opnfv/parser

Serena Spinoso Verification and Configuration of Software-based Networks 22 / 38

Page 23: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in SGs: VeriGraphReach. Property Result VeriGraph Z3 Verification TimeHost1 ->Server X 263ms 30ms 293msHost2 ->Server X 326ms 28ms 354msHost3 ->Server V 256ms 54ms 310msHost1 ->Server V 250ms 107ms 357msHost2 ->Server V 295ms 65ms 360msHost3 ->Server V 282ms 61ms 343ms

Serena Spinoso Verification and Configuration of Software-based Networks 23 / 38

Page 24: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in SGs:publications and next plans

Publications:Spinoso, S., Virgilio, M., John, W., Manzalini, A., Marchetto, G., Sisto, R,Formal Verification of Virtual Network Function Graphs in an SP-DevOpsContext, in 4th European Conference on Service-Oriented and CloudComputing, 2015.

Next improvements:

Make the verification approach scalableReduce the complexity of the modelling technique

Serena Spinoso Verification and Configuration of Software-based Networks 24 / 38

Page 25: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

Verification of Service GraphsForwarding Policy VerificationNetwork Reachability Checking

Checking Reachability in SGs: scalability issues

Boolean modelling-based approach is more promising thenmodel checking techniques

FOL is not a decidable logic

Make network and VNF models in Skolemized form (withoutexistential quantifiers)

5 20 40 60 80 1000

2

4

6

8

# of nodes

seco

nds

Serena Spinoso Verification and Configuration of Software-based Networks 25 / 38

Page 26: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Network Function Configuration

Serena Spinoso Verification and Configuration of Software-based Networks 26 / 38

Page 27: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Network Function Configuration

Service Providers have to configure VNFs to complete theservice graph deployment

filtering rules in firewalls, IP addresses for NATs...

Cloud Managers (CMs) rely on external configuration servicese.g. Puppet, Chef, Ansible,...

Serena Spinoso Verification and Configuration of Software-based Networks 27 / 38

Page 28: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Network Function Configuration: Challenges

Flexible configuration approaches have to consider:

many configuration strategies per function- REST API, CLI, SMTP, etc...

configuration semantics depend on the function types- router and firewall parameters are clearly different

Serena Spinoso Verification and Configuration of Software-based Networks 28 / 38

Page 29: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Network Function Configuration

Seamless Configuration of Virtual Network Functions

Serena Spinoso Verification and Configuration of Software-based Networks 29 / 38

Page 30: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Seamless Configuration of VNFs: contributions

State of the art:existing configuration services are targeted to expert usersthey use one configuration strategythey rely on VNF-specific plug-ins

Contributions:Enable a model-based VNF configuration in CMs to:

hide the low-level details to the userssupport many configuration strategiesuse vendor-agnostic and function-independent modules

Serena Spinoso Verification and Configuration of Software-based Networks 30 / 38

Page 31: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Seamless Configuration of VNFs: overview

Service Providers need configuration modules that arevendor-agnostic and function-independent :

Translator- translates the configuration parameters into a particular

format required by a VNFGateway

- delivers the produced configuration into the VNF

Serena Spinoso Verification and Configuration of Software-based Networks 31 / 38

Page 32: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Seamless Configuration of VNFs: inputs

VNF Object Model (VNF OM)representation of the main VNF configuration parametersone VNF Object Model Instance is created for each VNF

Translation Rulesdirectives to translate the VNF OM instance into thestructure/format required by the VNF

Access Parametersdirectives to push down the VNF configuration

Serena Spinoso Verification and Configuration of Software-based Networks 32 / 38

Page 33: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

VNFDescription

TranslationRules

Add rule -source SRC -destination DST –action ACT

VNF Object Model

list rule{ leaf src {type ipv4-address; }leaf dst { type ipv4-address; }leaf action {type string; }}

FW1VNF

Cloud Manager

User Service Provider VNF Developer

Data center

CM interfaceweb browser

FW

FW

LB NAT

FW2VNF

LB VNF

NATVNF

AccessParameters

FW reachable at IP 20.2.2.2 and TCP port 23

VNF Object Model Instances

FW#1 FW#2 LB NAT

Translator(REST)

Translator(CLI)

……Translator

(FILE)

Gateway (REST)

Gateway(CLI)

……Gateway

(FILE)

Serena Spinoso Verification and Configuration of Software-based Networks 33 / 38

Page 34: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Seamless Configuration of VNFs: results

Two types of VNF were successfully configured in softwarecloud architecture provided by PLUMgrid, Inc:

1 10 20 30 40 50 60 70 80 90 1000

1

2

3

4·10−2

(k)bytes

seco

nds

Vyatta CoreBind9

Serena Spinoso Verification and Configuration of Software-based Networks 34 / 38

Page 35: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

VNF ConfigurationSeamless VNF Configuration

Seamless Configuration of VNFs:publications and next plans

Publications:Spinoso, S., Leogrande, M., Risso, F., Singh, S., Sisto, R., AutomaticConfiguration of Opaque Network Functions in CMS. In IEEE/ACM 7thInternational Conference on Utility and Cloud Computing (2014).

Spinoso, S., Leogrande, M., Risso, F., Singh, S., Sisto, R., SeamlessConfiguration of Virtual Network Functions in Data Center ProviderNetworks. In Journal of Network and Systems Management (2017).

Next improvements:integration with the verification service to

check the correctness of the VNF configuration generatedenable an automatic fixing in case of errors

Serena Spinoso Verification and Configuration of Software-based Networks 35 / 38

Page 36: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

ConclusionsQuestions

Conclusions

Improvements to the state of the art in many aspects of anetwork service life-cycle:

Verification of anomalies in a forwarding policyReachability analysis in service graphsModel-based functional configuration of network functions

Serena Spinoso Verification and Configuration of Software-based Networks 36 / 38

Page 37: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

ConclusionsQuestions

Publication List

2014:Spinoso S., Leogrande M., Risso F., Singh S., Sisto R., AutomaticConfiguration of Opaque Network Functions in CMS. In: 1st InternationalWorkshop on Network Virtualization and Software-Defined Networks for CloudData Centres (NVSDN 2014).

2015:Spinoso S., Virgilio M., John W., Manzalini A., Marchetto G., Sisto R., FormalVerification of Virtual Network Function Graphs in an SP-DevOps Context.In: Fourth European Conference on Service-Oriented and Cloud Computing(ESOCC2015), Taormina, Italy, 15-17 September, 2015.

Valenza F., Spinoso S., Basile C., Sisto R., Lioy A., A Formal Model of NetworkPolicy Analysis In: First International Forum on Research and Technologies forSociety and Industry (RTSI2015), Turin, Italy, 16-18 September, 2015.

Serena Spinoso Verification and Configuration of Software-based Networks 37 / 38

Page 38: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

ConclusionsQuestions

Publication List

2016:Valenza F., Su T., Spinoso S., Lioy A., Sisto R., Vallini M., A formal approachfor network security policy validation. Journal of Wireless Mobile Networks,Ubiquitous Computing, and Dependable Applications.

2017:Spinoso S., Leogrande M., Risso F., Singh S., Sisto R., SeamlessConfiguration of Virtual Network Functions in Data Center Providernetworks. Journal of Network and Systems Management, Springer.

Spinoso S., Sisto R., Formal Verification of Forwarding Policies. Submittedmajor revision to: Transactions on Network and Service Management, IEEE.

Planned:Spinoso S., Virgilio M., Marchetto G., Sisto R., VeriGraph: Verifying complexservice Graphs. To submit in 2017.

Serena Spinoso Verification and Configuration of Software-based Networks 37 / 38

Page 39: Verification and Configuration of Software-based … SPINOSO_presentation.pdfService Function Chaining (SFC) Serena Spinoso Verification and Configuration of Software-based Networks

IntroductionNetwork Verification

Network ConfigurationConclusions

ConclusionsQuestions

Questions

Serena Spinoso Verification and Configuration of Software-based Networks 38 / 38