Automation for network security configuration: state of the art and research trends

D Bringhenti, G Marchetto, R Sisto… - ACM Computing Surveys, 2023 - dl.acm.org
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …

A comprehensive approach to the automatic refinement and verification of access control policies

M Cheminod, L Durante, L Seno, F Valenza… - Computers & …, 2019 - Elsevier
Access control is one of the building blocks of network security and is often managed by
network administrators through the definition of sets of high-level policies meant to regulate …

Detecting multi-stage attacks using sequence-to-sequence model

P Zhou, G Zhou, D Wu, M Fei - Computers & Security, 2021 - Elsevier
Multi-stage attack is a kind of sophisticated intrusion strategy that has been widely used for
penetrating the well protected network infrastructures. To detect such attacks, state-of-the-art …

A noninvasive threat analyzer for advanced metering infrastructure in smart grid

MA Rahman, E Al-Shaer, P Bera - IEEE Transactions on Smart …, 2012 - ieeexplore.ieee.org
Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits a
highly complex network configuration. AMI comprises heterogeneous cyber-physical …

Short paper: Automatic configuration for an optimal channel protection in virtualized networks

D Bringhenti, G Marchetto, R Sisto… - Proceedings of the 2nd …, 2020 - dl.acm.org
Data confidentiality, integrity and authentication are security properties which are often
enforced with the generation of secure channels, such as Virtual Private Networks, over …

Improved indexing for cache miss reduction in embedded systems

T Givargis - Proceedings of the 40th annual Design Automation …, 2003 - dl.acm.org
The increasing use of microprocessor cores in embedded systems as well as mobile and
portable devices creates an opportunity for customizing the cache subsystem for improved …

Automated synthesis of distributed network access controls: A formal framework with refinement

MA Rahman, E Al-Shaer - IEEE Transactions on Parallel and …, 2016 - ieeexplore.ieee.org
Due to the extensive use of network services and emerging security threats, enterprise
networks deploy varieties of security devices for controlling resource access based on …

FARE: FDD-based firewall anomalies resolution tool

A Saâdaoui, NBYB Souayeh, A Bouhoula - Journal of computational …, 2017 - Elsevier
Problems arising from firewall misconfigurations are common and have dramatic
consequences for networks operations. Therefore, the discovery and removal of these …

Continuous verification of network security compliance

C Lorenz, V Clemens, M Schrötter… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Continuous verification of network security compliance is an accepted need. Especially, the
analysis of stateful packet filters plays a central role for network security in practice. But the …

Automating the configuration of firewalls and channel protection systems in virtual networks

D Bringhenti, R Sisto, F Valenza - 2023 IEEE 9th International …, 2023 - ieeexplore.ieee.org
Network virtualization has revolutionized the traditional approaches for security
configuration. If in the past error-prone and unoptimized manual operations were performed …