Automation for network security configuration: state of the art and research trends
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …
consequence of novel architectural paradigms such as the Internet of Things and network …
Methods and tools for policy analysis
AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …
technology especially for present and future systems characterized by large-scale systems …
Software-defined networking: Categories, analysis, and future directions
Software-defined networking (SDN) is an innovative network architecture that splits the
control and management planes from the data plane. It helps in simplifying network …
control and management planes from the data plane. It helps in simplifying network …
Safely and automatically updating in-network acl configurations with intent language
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …
connectivity and security. As cloud-scale WANs today constantly evolve in size and …
A machine-learning-based approach to build zero-false-positive IPSs for industrial IoT and CPS with a case study on power grids security
Intrusion prevention systems have long been the first layer of defense against malicious
attacks. Most sensitive systems employ instances of them (eg, Firewalls) to secure the …
attacks. Most sensitive systems employ instances of them (eg, Firewalls) to secure the …
NetGen: Synthesizing data-plane configurations for network policies
Networks are hard to maintain. When the physical network changes or when policies, most
importantly security properties change, it is hard to change the network while maintaining all …
importantly security properties change, it is hard to change the network while maintaining all …
Security policy violations in SDN data plane
Software-defined networking (SDN) utilizes a centralized controller to distribute packet
processing rules to network switches. However, rules are often generated by the …
processing rules to network switches. However, rules are often generated by the …
Case studies of scada firewall configurations and the implications for best practices
Firewall configuration is an important activity for any modern day business. It is particularly a
critical task for the supervisory control and data acquisition (SCADA) networks that control …
critical task for the supervisory control and data acquisition (SCADA) networks that control …
Automatic and optimized firewall reconfiguration
The continuous innovation in network softwarization has enabled higher dynamism and
responsiveness in creating and deploying complex network configurations. Following this …
responsiveness in creating and deploying complex network configurations. Following this …
[HTML][HTML] A formal basis for the design and analysis of firewall security policies
A Khoumsi, M Erradi, W Krombi - Journal of King Saud University-Computer …, 2018 - Elsevier
A firewall is the core of a well defined network security policy. This paper presents an
automata-based method to study firewall security policies. We first propose a procedure that …
automata-based method to study firewall security policies. We first propose a procedure that …