Cyber security of a power grid: State-of-the-art

CC Sun, A Hahn, CC Liu - International Journal of Electrical Power & …, 2018 - Elsevier
The integration of computing and communication capabilities with the power grid has led to
numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can …

A deep learning model for network intrusion detection with imbalanced data

Y Fu, Y Du, Z Cao, Q Li, W Xiang - Electronics, 2022 - mdpi.com
With an increase in the number and types of network attacks, traditional firewalls and data
encryption methods can no longer meet the needs of current network security. As a result …

Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

Veriflow: Verifying network-wide invariants in real time

A Khurshid, W Zhou, M Caesar… - … of the first workshop on Hot …, 2012 - dl.acm.org
Networks are complex and prone to bugs. Existing tools that check configuration files and
data-plane state operate offline at timescales of seconds to hours, and cannot detect or …

Header space analysis: Static checking for networks

P Kazemian, G Varghese, N McKeown - 9th USENIX Symposium on …, 2012 - usenix.org
Today's networks typically carry or deploy dozens of protocols and mechanisms
simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual …

A general approach to network configuration analysis

A Fogel, S Fung, L Pedrosa… - … USENIX Symposium on …, 2015 - usenix.org
We present an approach to detect network configuration errors, which combines the benefits
of two prior approaches. Like prior techniques that analyze configuration files, our approach …

Debugging the data plane with anteater

H Mai, A Khurshid, R Agarwal, M Caesar… - ACM SIGCOMM …, 2011 - dl.acm.org
Diagnosing problems in networks is a time-consuming and error-prone process. Existing
tools to assist operators primarily focus on analyzing control plane configuration …

FLOWGUARD: Building robust firewalls for software-defined networks

H Hu, W Han, GJ Ahn, Z Zhao - Proceedings of the third workshop on Hot …, 2014 - dl.acm.org
Software-Defined Networking (SDN) introduces significant granularity, visibility and flexibility
to networking, but at the same time brings forth new security challenges. One of the …

Optimizing the" one big switch" abstraction in software-defined networks

N Kang, Z Liu, J Rexford, D Walker - … of the ninth ACM conference on …, 2013 - dl.acm.org
Software Defined Networks (SDNs) support diverse network policies by offering direct,
network-wide control over how switches handle traffic. Unfortunately, many controller …

FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures

E Al-Shaer, S Al-Haj - Proceedings of the 3rd ACM workshop on …, 2010 - dl.acm.org
It is difficult to build a real network to test novel experiments. OpenFlow makes it easier for
researchers to run their own experiments by providing a virtual slice and configuration on …