The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) is an emerging paradigm for network design and management. By providing network programmability and separation of control and data planes, SDN offers salient features such as simplified and centralized management and control, reduced complexity and accelerated innovation. However, SDN introduces new challenges that should be addressed properly in order to benefit...
A system for the excitation of numerous capacitive loads such as electroluminescent devices is presented. It is based on a controller equipped with up to 16 driver boards which are based on an arbitrary waveform generator. Besides the three template waveforms, any requested waveform can be generated by a Digital-to-analog converter whose output is amplified. Signals can be generated with up to 400...
Software defined network (SDN) is an emerging network architecture which offloads the control logic of the network from the underlying forwarding devices to a centralized controller. This centralized control intelligence software defines the behavior of the network. However, the programmability and centralization of the SDN architecture introduce potential security concerns. In this paper, we first...
In this paper, we propose techniques for securing Software Defined Networks(SDN). We describe the design of a security architecture that makes use of security applications on top of the SDN Controller to specify fine granular security policies based on domain wide knowledge of the domain and Security Agents to enforce these policies in the switches in the data plane. We have extended the Open Flow...
This paper provides simulation practitioners and consumers with a grounding in how discrete-event simulation software works. Topics include discrete-event systems; entities, resources, control elements and operations; simulation runs; entity states; entity lists; and their management. The implementations of these generic ideas in AutoMod, SLX, ExtendSim, and Simio are described. The paper concludes...
This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). CPS security, though well studied, suffers from fragmentation. In this paper, we consider control systems as an abstraction of CPS. Here, we use information flow analysis, a well established set of methods developed in software security,...
In SDP-based H∞ control, we often encounter numerical difficulties when solving SDPs by various pieces of software. It is empirically known that such numerical difficulty occurs if an SDP at hand or its dual has no interior point feasible solutions, and this is indeed the case of some SDPs in H∞ control. To conceive a way for getting around such numerical difficulties in a concrete problem setting,...
The current transformation process of how energy is supplied attracts great interest from many different market players. As a consequence, many proprietary solutions for “smart” energy applications are flooding the market. This turns out to be rather a problem than part of the solution for the systematic development of future energy grids. Additionally, the absence of necessary standards blocks further...
Recent research demonstrated that software defined networking (SDN) can be leveraged to enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks. The network states are continuously changed in MTD by effectively collecting information from the network and enforcing certain security measures on the fly in order to deceive the attackers. Being motivated from the success...
Measurement and tracking have crucial roles in Software-Defined Networks (SDNs). Unfortunately, most of procedures and techniques to perform measurements and monitoring tasks are implemented in software at network end-hosts. Despite the large use, a software based approach generates imprecision, high costs, and makes monitoring more difficult. In this paper, we extend OpenFlow switch to implement...
Software Defined Networking moves the control plane functionalities of the network elements to one or more external entities known as controllers. The controller placement problem mainly deals with determining the optimal location of the controllers and assignment of the switches to the controllers. Failure of the controllers results in disconnections between switches and controllers. These disconnected...
Continuous Integration (CI) is a common practice in agile software development processes. It improves the quality of the developed software and reduces the risk of integration problems. However, the effectiveness of CI depends heavily on the frequency of integration problems. For systematic improvement of the applied agile development process, the effect of large commits on the likelihood of integration...
This work presents the development of a remote laboratory service and its application during the teaching of Control Systems subject of third course in a Telecommunication Technology and Service Engineering degree. The application was successful allowing the student to control the same components as remotely, in a similar way as they were in the laboratory. There was an elevated interest by the students,...
The SAGITTA Research Demonstrator is a flying-wing UAV testbed. Its digital flight control system, which is being developed by the Institute of Flight System Dynamics of the Technical University Munich, consists of cascaded control loops. In a UAV operation scenario, different control loops need to be engaged at different times or connected in different ways to fulfill a given mission. This has to...
In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to designing a range of security policies that are relevant for SDN services and communications. The design of a security architecture that enables secure routing of packets based on the specified security policies...
In this paper we describe ACyDS, an adaptive cyber deception system. ACyDS provides a unique virtual network view to each host in an enterprise network. That is, a host's view of its network, including subnet topology and IP address assignments of reachable hosts and servers, does not reflect physical network configurations and is different than the view of any other host in the network. ACyDS generates...
The increase in productivity implied by model-driven software product line engineering is weakened by the complexity exposed to the user having to manage a multi-variant model. Recently, a new paradigm has emerged: filtered software product line engineering transfers the established check-out/modify/commit workflow from version control to variability management, allowing to iteratively develop the...
Development of complex program software of automated control systems is connected with essential expenses. Failure of the software can lead to control system fail as a whole and to connected with these economic or other losses. Ways of rational decrease in expenses and losses are given in this article. In article three questions are considered: Problem definition of optimization of reliability of...
PHM (Prognostics and Health Management) is a key technology in autonomic logistics equipment. It is also the newest development in the current equipment system, BIT (Built-In Test), because of its condition monitoring abilities. PHM technology marks a transformation from condition monitoring to health management. The PHM design philosophy has also been adopted in the development of new generation...
As the rapid growth of computing demand in cloud computing, the virtualization of data center network is more and more deployed. The data center is reconstructed to Software Defined Data Center with the technical of Software defined network. The services of data center are formed into Virtual Data Center, which is based on the virtual resource collection of the physical network section. So the VDC...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.