Automation for network security configuration: state of the art and research trends

D Bringhenti, G Marchetto, R Sisto… - ACM Computing Surveys, 2023 - dl.acm.org
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …

Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

Software-defined networking: Categories, analysis, and future directions

M Hussain, N Shah, R Amin, SS Alshamrani, A Alotaibi… - Sensors, 2022 - mdpi.com
Software-defined networking (SDN) is an innovative network architecture that splits the
control and management planes from the data plane. It helps in simplifying network …

Safely and automatically updating in-network acl configurations with intent language

B Tian, X Zhang, E Zhai, HH Liu, Q Ye… - Proceedings of the …, 2019 - dl.acm.org
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …

A machine-learning-based approach to build zero-false-positive IPSs for industrial IoT and CPS with a case study on power grids security

MS Haghighi, F Farivar, A Jolfaei - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Intrusion prevention systems have long been the first layer of defense against malicious
attacks. Most sensitive systems employ instances of them (eg, Firewalls) to secure the …

NetGen: Synthesizing data-plane configurations for network policies

S Saha, S Prabhu, P Madhusudan - Proceedings of the 1st ACM …, 2015 - dl.acm.org
Networks are hard to maintain. When the physical network changes or when policies, most
importantly security properties change, it is hard to change the network while maintaining all …

Security policy violations in SDN data plane

Q Li, Y Chen, PPC Lee, M Xu… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Software-defined networking (SDN) utilizes a centralized controller to distribute packet
processing rules to network switches. However, rules are often generated by the …

Case studies of scada firewall configurations and the implications for best practices

D Ranathunga, M Roughan, H Nguyen… - … on Network and …, 2016 - ieeexplore.ieee.org
Firewall configuration is an important activity for any modern day business. It is particularly a
critical task for the supervisory control and data acquisition (SCADA) networks that control …

Automatic and optimized firewall reconfiguration

F Pizzato, D Bringhenti, R Sisto… - NOMS 2024-2024 IEEE …, 2024 - ieeexplore.ieee.org
The continuous innovation in network softwarization has enabled higher dynamism and
responsiveness in creating and deploying complex network configurations. Following this …

[HTML][HTML] A formal basis for the design and analysis of firewall security policies

A Khoumsi, M Erradi, W Krombi - Journal of King Saud University-Computer …, 2018 - Elsevier
A firewall is the core of a well defined network security policy. This paper presents an
automata-based method to study firewall security policies. We first propose a procedure that …