Published December 3, 2024
| Version v1
Conference paper
Choreography-Defined Networks: a Case Study on DoS Mitigation
Contributors
Others:
- Alma Mater Studiorum Università di Bologna = University of Bologna (UNIBO)
- Fondements opérationnels, logiques et algébriques des systèmes logiciels (OLAS) ; Centre Inria d'Université Côte d'Azur (CRISAM) ; Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Dipartimento di Informatica - Scienza e Ingegneria [Bologna] (DISI) ; Alma Mater Studiorum Università di Bologna = University of Bologna (UNIBO)-Alma Mater Studiorum Università di Bologna = University of Bologna (UNIBO)
- University of Southern Denmark (SDU)
- Partially supported by the research project FREEDA (CUP: I53D23003550006) funded by the framework PRIN 2022 (MUR, Italy)
- Villum Fonden (grant no. 29518)
- ANR-23-CE25-0012,SmartCloud,Adaptivité Dynamique Intelligente pour les Systèmes de Cloud Computing(2023)
- European Project: 101124225,HORIZON.1.1 - European Research Council (ERC),ERC-2023-COG ,CHORDS(2024)
Description
Software-defined networking and network function virtualization have brought unparalleled flexibility in defining and managing network architectures. With the widespread diffusion of cloud platforms, more resources are available to execute virtual network functions concurrently, but the current approach to defining networks in the cloud development is held back by the lack of tools to manage the composition of more complex flows than simple sequential invocations. In this paper, we advocate for the usage of choreographic programming for defining the multiparty workflows of a network. When applied to the composition of virtual network functions, this approach yields multiple advantages: a single program expresses the behavior of all components, in a way that is easier to understand and check; a compiler can produce the executable code for each component, guaranteeing correctness properties of their interactions such as deadlock freedom; and the bottleneck of a central orchestrator is removed. We describe the proposed approach and show its feasibility via a case study where different functions cooperatively solve a security monitoring task.
Abstract
International audienceAdditional details
Identifiers
- URL
- https://inria.hal.science/hal-04826429
- URN
- urn:oai:HAL:hal-04826429v1
Origin repository
- Origin repository
- UNICA