A Formalized Method for Assessing the Criticality of Infrastructure as Code Changes in Software-defined Networks

Authors

DOI:

https://doi.org/10.32515/2664-262X.2026.13(44).52-58

Keywords:

software-defined networks, Infrastructure as Code, change criticality, classification

Abstract

The aim of the article is to develop a formalized method for assessing the criticality of changes to Infrastructure as Code configuration artifacts in software-defined networks. The relevance of the research is determined by the increasing automation of network management processes and the need for early identification of configuration changes that may compromise functional stability or violate security policies in corporate infrastructures. The study focuses on constructing an interpretable model that enables quantitative evaluation of the consequences of configuration modifications prior to their deployment in a production environment.

The paper introduces a formal representation of the state of a software-defined network and models the transition between states under the influence of a configuration change. Criticality is defined as an integral function that aggregates the degradation of topology connectivity, critical service reachability, and access policy consistency. For each change, the network state transition is explicitly modeled, normalized impact components are computed, and an aggregated indicator is formed using weighted coefficients. A threshold-based decision rule is applied to distinguish critical from non-critical modifications. The proposed metric is experimentally validated on controlled scenarios that include neutral, partially degradative, and critical configuration changes. The obtained results confirm the consistency of the integral indicator with the actual functional consequences observed in the modified network state.

The results demonstrate the interpretability and practical applicability of the proposed formalization for structured assessment of configuration changes in automated deployment workflows. The integral metric provides a transparent mechanism for separating critical modifications from non-critical ones based on measurable degradation characteristics.

Author Biographies

Oleksandr Huralnyk, Khmelnytskyi National University, Khmelnytskyi, Ukraine

PhD student in Computer Engineering

Oleg Savenko , Khmelnytskyi National University, Khmelnytskyi, Ukraine

Professor, Doctor of Technical Sciences, Professor of the Department of Computer Engineering and Information Systems

References

Список літератури

1. Arevalo-Herrera J., Camargo Mendoza J., Martínez Torre J. I., Zona-Ortiz T., Ramirez J. M. Assessing SDN controller vulnerabilities: A survey on attack typologies, detection mechanisms, controller selection, and dataset application in machine learning. Wireless Personal Communications. 2025. Vol. 140, № 1–2. P. 739–775. URL: https://doi.org/10.1007/s11277-025-11748-w (дата звернення: 10.01.2026).

2. Verdet A., Hamdaqa M., Silva L. D., Khomh F. Assessing the adoption of security policies by developers in terraform across different cloud providers. Empirical Software Engineering. 2025. Vol. 30, № 3. Art. 74. URL: https://doi.org/10.1007/s10664-024-10610-0 (дата звернення: 10.01.2026).

3. War A., Diallo A., Habib A., Klein J., Bissyandé T. F. Vulnerabilities in infrastructure as code: what, how many, and who? Empirical Software Engineering. 2025. Vol. 30, № 5. URL: https://doi.org/10.1007/s10664-025-10672-8 (дата звернення: 10.01.2026).

4. Opdebeeck R., Zerouali A., De Roover C. Control and data flow in security smell detection for infrastructure as code: Is it worth the effort? 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), Melbourne, Australia. 2023. P. 534–545. URL: https://doi.org/10.1109/msr59073.2023.00079 (дата звернення: 11.01.2026).

5. Shaji N. S., Muthalagu R. Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN. Digital Communications and Networks. 2023. URL: https://doi.org/10.1016/j.dcan.2023.09.004 (дата звернення: 11.01.2026).

6. Riggs H., Khalid A., Sarwat A. I. An Overview of SDN Issues—A Case Study and Performance Evaluation of a Secure OpenFlow Protocol Implementation. Electronics. 2025. Vol. 14, № 16. Art. 3244. URL: https://doi.org/10.3390/electronics14163244 (дата звернення: 11.01.2026).

7. Batool S., Aslam M., Akpokodje E., Jilani S. F. A Comprehensive Review of DDoS Detection and Mitigation in SDN Environments: Machine Learning, Deep Learning, and Federated Learning Perspectives. Electronics. 2025. Vol. 14, № 21. Art. 4222. URL: https://doi.org/10.3390/electronics14214222 (дата звернення: 17.01.2026).

8. Vasileiou Z., Kumara I., Meditskos G., Tokmakov K., Radolović D., Cruz J. G., Vrochidis S. A knowledge-based approach for guided development of Infrastructure as Code. Software and Systems Modeling. 2025. URL: https://doi.org/10.1007/s10270-025-01294-1 (дата звернення: 17.01.2026).

9. Chiari M., De Pascalis M., Pradella M. Static analysis of infrastructure as code: A survey. 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), Honolulu, HI, USA. 2022. URL: https://doi.org/10.1109/icsa-c54293.2022.00049 (дата звернення: 17.01.2026).

10. Sokolowski D., Salvaneschi G. Towards Reliable Infrastructure as Code. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy. 2023. URL: https://doi.org/10.1109/icsa-c57050.2023.00072 (дата звернення: 18.01.2026).

11. Akbar M. A., Smolander K., Mahmood S., Alsanad A. Toward successful DevSecOps in software development organizations: A decision-making framework. Information and Software Technology. 2022. Vol. 147. Art. 106894. URL: https://doi.org/10.1016/j.infsof.2022.106894 (дата звернення: 18.01.2026).

12. Phu A. T., Li B., Ullah F., Ul Huque T., Naha R., Babar M. A., Nguyen H. Defending SDN against packet injection attacks using deep learning. Computer Networks. 2023. Vol. 234. Art. 109935. URL: https://doi.org/10.1016/j.comnet.2023.109935 (дата звернення: 18.01.2026).

13. Bajenaid A., Khemakhem M., Eassa F. E., Bourennani F., Qurashi J. M., Alsulami A. A., Alturki B. Towards Robust SDN Security: A Comparative Analysis of Oversampling Techniques with ML and DL Classifiers. Electronics. 2025. Vol. 14, № 5. Art. 995. URL: https://doi.org/10.3390/electronics14050995 (дата звернення: 18.01.2026).

14. Toprani D., Madisetti V. K. LLM agentic workflow for automated vulnerability detection and remediation in infrastructure-as-code. IEEE Access: Practical Innovations, Open Solutions. 2025. Vol. 13. P. 69175–69181. URL: https://doi.org/10.1109/access.2025.3560911 (дата звернення: 18.01.2026).

References

1. Arevalo-Herrera, J., Camargo Mendoza, J., Martínez Torre, J. I., Zona-Ortiz, T., & Ramirez, J. M. (2025). Assessing SDN controller vulnerabilities: A survey on attack typologies, detection mechanisms, controller selection, and dataset application in machine learning. Wireless Personal Communications, 140(1–2), 739–775. https://doi.org/10.1007/s11277-025-11748-w

2. Verdet, A., Hamdaqa, M., Silva, L. D., & Khomh, F. (2025). Assessing the adoption of security policies by developers in terraform across different cloud providers. Empirical Software Engineer, 30(3), 74. https://doi.org/10.1007/s10664-024-10610-0

3. War, A., Diallo, A., Habib, A., Klein, J., & Bissyandé, T. F. (2025). Vulnerabilities in infrastructure as code: what, how many, and who? Empirical Software Engineer, 30(5). https://doi.org/10.1007/s10664-025-10672-8

4. Opdebeeck, R., Zerouali, A., & De Roover, C. (2023, May). Control and data flow in security smell detection for infrastructure as code: Is it worth the effort? 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), 534–545. Presented at the 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), Melbourne, Australia. https://doi.org/10.1109/msr59073.2023.00079

5. Shaji, N. S., & Muthalagu, R. (2023). Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2023.09.004

6. Riggs, H., Khalid, A., & Sarwat, A. I. (2025). An Overview of SDN Issues—A Case Study and Performance Evaluation of a Secure OpenFlow Protocol Implementation. Electronics, 14(16), 3244. https://doi.org/10.3390/electronics14163244

7. Batool, S., Aslam, M., Akpokodje, E., & Jilani, S. F. (2025). A Comprehensive Review of DDoS Detection and Mitigation in SDN Environments: Machine Learning, Deep Learning, and Federated Learning Perspectives. Electronics, 14(21), 4222. https://doi.org/10.3390/electronics14214222

8. Vasileiou, Z., Kumara, I., Meditskos, G., Tokmakov, K., Radolović, D., Cruz, J. G., … Vrochidis, S. (2025). A knowledge-based approach for guided development of Infrastructure as Code. Software and Systems Modeling. https://doi.org/10.1007/s10270-025-01294-1

9. Chiari, M., De Pascalis, M., & Pradella, M. (2022, March). Static analysis of infrastructure as code: A survey. 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C). Presented at the 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), Honolulu, HI, USA. https://doi.org/10.1109/icsa-c54293.2022.00049

10. Sokolowski, D., & Salvaneschi, G. (2023, March). Towards Reliable Infrastructure as Code. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C). Presented at the 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy. https://doi.org/10.1109/icsa-c57050.2023.00072

11. Akbar, M. A., Smolander, K., Mahmood, S., & Alsanad, A. (2022). Toward successful DevSecOps in software development organizations: A decision-making framework. Information and Software Technology, 147(106894), 106894. https://doi.org/10.1016/j.infsof.2022.106894

12. Phu, A. T., Li, B., Ullah, F., Ul Huque, T., Naha, R., Babar, M. A., & Nguyen, H. (2023). Defending SDN against packet injection attacks using deep learning. Computer Networks, 234(109935), 109935. https://doi.org/10.1016/j.comnet.2023.109935

13. Bajenaid, A., Khemakhem, M., Eassa, F. E., Bourennani, F., Qurashi, J. M., Alsulami, A. A., & Alturki, B. (2025). Towards Robust SDN Security: A Comparative Analysis of Oversampling Techniques with ML and DL Classifiers. Electronics, 14(5), 995. https://doi.org/10.3390/electronics14050995

14. Toprani, D., & Madisetti, V. K. (2025). LLM agentic workflow for automated vulnerability detection and remediation in infrastructure-as-code. IEEE Access: Practical Innovations, Open Solutions, 13, 69175–69181. https://doi.org/10.1109/access.2025.3560911

Published

2026-03-27

How to Cite

Huralnyk, O., & Savenko, O. (2026). A Formalized Method for Assessing the Criticality of Infrastructure as Code Changes in Software-defined Networks. Central Ukrainian Scientific Bulletin. Technical Sciences, (13(44), 52–58. https://doi.org/10.32515/2664-262X.2026.13(44).52-58