Automation for network security configuration: State of the art and research Trends

D Bringhenti, G Marchetto, R Sisto… - ACM Computing Surveys, 2023 - dl.acm.org
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …

Safely and automatically updating in-network acl configurations with intent language

B Tian, X Zhang, E Zhai, HH Liu, Q Ye… - Proceedings of the …, 2019 - dl.acm.org
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …

Switch code generation using program synthesis

X Gao, T Kim, MD Wong, D Raghunathan… - Proceedings of the …, 2020 - dl.acm.org
Writing packet-processing programs for programmable switch pipelines is challenging
because of their all-or-nothing nature: a program either runs at line rate if it can fit within …

Learning to configure computer networks with neural algorithmic reasoning

L Beurer-Kellner, M Vechev… - Advances in Neural …, 2022 - proceedings.neurips.cc
We present a new method for scaling automatic configuration of computer networks. The key
idea is to relax the computationally hard search problem of finding a configuration that …

Large language model (llm) for telecommunications: A comprehensive survey on principles, key techniques, and opportunities

H Zhou, C Hu, Y Yuan, Y Cui, Y Jin, C Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) have received considerable attention recently due to their
outstanding comprehension and reasoning capabilities, leading to great progress in many …

[HTML][HTML] A novel abstraction for security configuration in virtual networks

D Bringhenti, R Sisto, F Valenza - Computer Networks, 2023 - Elsevier
The incessant growth of network virtualization determined the proliferation of Virtual Network
Functions (VNFs), software programs that can run on general-purpose servers and that can …

Tiramisu: Fast multilayer network verification

A Abhashkumar, A Gember-Jacobson… - 17th USENIX Symposium …, 2020 - usenix.org
Today's distributed network control planes are highly sophisticated, with multiple interacting
protocols operating at layers 2 and 3. The complexity makes network configurations highly …

{Config2Spec}: Mining network specifications from network configurations

R Birkner, D Drachsler-Cohen, L Vanbever… - … USENIX Symposium on …, 2020 - usenix.org
Network verification and configuration synthesis are promising approaches to make
networks more reliable and secure by enforcing a set of policies. However, these …

Auric: using data-driven recommendation to automatically generate cellular configuration

A Mahimkar, A Sivakumar, Z Ge, S Pathak… - Proceedings of the 2021 …, 2021 - dl.acm.org
Cellular service providers add carriers in the network in order to support the increasing
demand in voice and data traffic and provide good quality of service to the users. Addition of …

Neural language models for network configuration: Opportunities and reality check

ZB Houidi, D Rossi - Computer Communications, 2022 - Elsevier
Boosted by deep learning, natural language processing (NLP) techniques have recently
seen spectacular progress, mainly fueled by breakthroughs both in representation learning …