| dc.contributor.author | Kim, Jiwon | |
| dc.contributor.author | Okhravi, Hamed | |
| dc.contributor.author | Tian, Dave (Jing) | |
| dc.contributor.author | Ujcich, Benjamin E. | |
| dc.date.accessioned | 2024-07-12T18:46:14Z | |
| dc.date.available | 2024-07-12T18:46:14Z | |
| dc.date.issued | 2024-07 | |
| dc.identifier.issn | 0001-0782 | |
| dc.identifier.issn | 1557-7317 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/155673 | |
| dc.description.abstract | As programming languages have evolved towards natural human language, computer networks have evolved in a similar way to provide high-level abstractions for configuration and deployment through intent-based networking (IBN). IBN abstracts network configuration and protocol complexity from network administrators by allowing such administrators to define what the network should do rather than how such configuration and protocols should be implemented. While enabling greater usability and reducing operational complexity, little attention has been paid to the security challenges that arise from such an approach. We present the unique security challenges of IBN and discuss possible approaches and opportunities that can be taken to enhance IBN's security posture. | en_US |
| dc.publisher | Association for Computing Machinery | en_US |
| dc.relation.isversionof | 10.1145/3639702 | en_US |
| dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
| dc.source | Association for Computing Machinery | en_US |
| dc.title | Security Challenges of Intent-Based Networking | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Kim, Jiwon, Okhravi, Hamed, Tian, Dave (Jing) and Ujcich, Benjamin E. 2024. "Security Challenges of Intent-Based Networking." Communications of the ACM, 67 (7). | |
| dc.contributor.department | Lincoln Laboratory | |
| dc.relation.journal | Communications of the ACM | en_US |
| dc.identifier.mitlicense | PUBLISHER_POLICY | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2024-07-01T07:45:14Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | The author(s) | |
| dspace.date.submission | 2024-07-01T07:45:15Z | |
| mit.journal.volume | 67 | en_US |
| mit.journal.issue | 7 | en_US |
| mit.license | PUBLISHER_POLICY | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |