Automation for network security configuration: state of the art and research trends
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …
consequence of novel architectural paradigms such as the Internet of Things and network …
A comprehensive approach to the automatic refinement and verification of access control policies
Access control is one of the building blocks of network security and is often managed by
network administrators through the definition of sets of high-level policies meant to regulate …
network administrators through the definition of sets of high-level policies meant to regulate …
Detecting multi-stage attacks using sequence-to-sequence model
P Zhou, G Zhou, D Wu, M Fei - Computers & Security, 2021 - Elsevier
Multi-stage attack is a kind of sophisticated intrusion strategy that has been widely used for
penetrating the well protected network infrastructures. To detect such attacks, state-of-the-art …
penetrating the well protected network infrastructures. To detect such attacks, state-of-the-art …
A noninvasive threat analyzer for advanced metering infrastructure in smart grid
Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits a
highly complex network configuration. AMI comprises heterogeneous cyber-physical …
highly complex network configuration. AMI comprises heterogeneous cyber-physical …
Short paper: Automatic configuration for an optimal channel protection in virtualized networks
Data confidentiality, integrity and authentication are security properties which are often
enforced with the generation of secure channels, such as Virtual Private Networks, over …
enforced with the generation of secure channels, such as Virtual Private Networks, over …
Improved indexing for cache miss reduction in embedded systems
T Givargis - Proceedings of the 40th annual Design Automation …, 2003 - dl.acm.org
The increasing use of microprocessor cores in embedded systems as well as mobile and
portable devices creates an opportunity for customizing the cache subsystem for improved …
portable devices creates an opportunity for customizing the cache subsystem for improved …
Automated synthesis of distributed network access controls: A formal framework with refinement
Due to the extensive use of network services and emerging security threats, enterprise
networks deploy varieties of security devices for controlling resource access based on …
networks deploy varieties of security devices for controlling resource access based on …
FARE: FDD-based firewall anomalies resolution tool
Problems arising from firewall misconfigurations are common and have dramatic
consequences for networks operations. Therefore, the discovery and removal of these …
consequences for networks operations. Therefore, the discovery and removal of these …
Continuous verification of network security compliance
C Lorenz, V Clemens, M Schrötter… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Continuous verification of network security compliance is an accepted need. Especially, the
analysis of stateful packet filters plays a central role for network security in practice. But the …
analysis of stateful packet filters plays a central role for network security in practice. But the …
Automating the configuration of firewalls and channel protection systems in virtual networks
Network virtualization has revolutionized the traditional approaches for security
configuration. If in the past error-prone and unoptimized manual operations were performed …
configuration. If in the past error-prone and unoptimized manual operations were performed …