Cyber security of a power grid: State-of-the-art
The integration of computing and communication capabilities with the power grid has led to
numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can …
numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can …
A deep learning model for network intrusion detection with imbalanced data
Y Fu, Y Du, Z Cao, Q Li, W Xiang - Electronics, 2022 - mdpi.com
With an increase in the number and types of network attacks, traditional firewalls and data
encryption methods can no longer meet the needs of current network security. As a result …
encryption methods can no longer meet the needs of current network security. As a result …
Methods and tools for policy analysis
AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …
technology especially for present and future systems characterized by large-scale systems …
Veriflow: Verifying network-wide invariants in real time
Networks are complex and prone to bugs. Existing tools that check configuration files and
data-plane state operate offline at timescales of seconds to hours, and cannot detect or …
data-plane state operate offline at timescales of seconds to hours, and cannot detect or …
Header space analysis: Static checking for networks
Today's networks typically carry or deploy dozens of protocols and mechanisms
simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual …
simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual …
A general approach to network configuration analysis
A Fogel, S Fung, L Pedrosa… - … USENIX Symposium on …, 2015 - usenix.org
We present an approach to detect network configuration errors, which combines the benefits
of two prior approaches. Like prior techniques that analyze configuration files, our approach …
of two prior approaches. Like prior techniques that analyze configuration files, our approach …
Debugging the data plane with anteater
Diagnosing problems in networks is a time-consuming and error-prone process. Existing
tools to assist operators primarily focus on analyzing control plane configuration …
tools to assist operators primarily focus on analyzing control plane configuration …
FLOWGUARD: Building robust firewalls for software-defined networks
Software-Defined Networking (SDN) introduces significant granularity, visibility and flexibility
to networking, but at the same time brings forth new security challenges. One of the …
to networking, but at the same time brings forth new security challenges. One of the …
Optimizing the" one big switch" abstraction in software-defined networks
Software Defined Networks (SDNs) support diverse network policies by offering direct,
network-wide control over how switches handle traffic. Unfortunately, many controller …
network-wide control over how switches handle traffic. Unfortunately, many controller …
FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures
E Al-Shaer, S Al-Haj - Proceedings of the 3rd ACM workshop on …, 2010 - dl.acm.org
It is difficult to build a real network to test novel experiments. OpenFlow makes it easier for
researchers to run their own experiments by providing a virtual slice and configuration on …
researchers to run their own experiments by providing a virtual slice and configuration on …