Modeling and Verifying Basic Modules of Floodlight

Shuangqing Xiang, Xi Wu, Huibiao Zhu*, Wanling Xie, Lili Xiao, Phan Cong Vinh

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Software-Defined Networking (SDN) is an emerging networking paradigm that provides flexible network programmability and reduces the complexity of network management and control. OpenFlow Protocol is the best-known southbound interface of SDN. As one of the most popular OpenFlow controllers, Floodlight is famous for its excellent basic modules, which are used by many other mainstream controllers. Due to the popularity and widespread use of the Floodlight’s modules, it is important to analyze them in a formal framework. In this paper, we focus on six modules of Floodlight that are mainly responsible for pushing decisions and discovering topology. In order to verify whether these modules meet two important requirements, including Decision Pushed Correctly and Rule Installed Once, we propose a system model that formalizes these modules as well as hosts and switches using Communicating Sequential Processes (CSP). Moreover, we add two types of attacks: Link Fabrication and Host Hijacking, which aim at poisoning the topology information collected by a controller, to construct a second system model. Finally, we implement these two system models in Process Analysis Toolkit (PAT), a model checker, to verify whether our models cater for four assertions based on two requirements and if Floodlight is vulnerable to these two attacks.

Original languageEnglish
Pages (from-to)100-114
Number of pages15
JournalMobile Networks and Applications
Volume24
Issue number1
DOIs
StatePublished - 15 Feb 2019

Keywords

  • Floodlight
  • Formal verification
  • Modeling
  • SDN

Fingerprint

Dive into the research topics of 'Modeling and Verifying Basic Modules of Floodlight'. Together they form a unique fingerprint.

Cite this