{"id":"https://openalex.org/W3049715686","doi":"https://doi.org/10.1109/netsoft48620.2020.9165434","title":"Introducing programmability and automation in the synthesis of virtual firewall rules","display_name":"Introducing programmability and automation in the synthesis of virtual firewall rules","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3049715686","doi":"https://doi.org/10.1109/netsoft48620.2020.9165434","mag":"3049715686"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft48620.2020.9165434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/4973441","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073892199","display_name":"Daniele Bringhenti","orcid":"https://orcid.org/0000-0002-3086-7364"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Daniele Bringhenti","raw_affiliation_strings":["Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010269472","display_name":"Guido Marchetto","orcid":"https://orcid.org/0000-0003-3588-9367"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Guido Marchetto","raw_affiliation_strings":["Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021669146","display_name":"Riccardo Sisto","orcid":"https://orcid.org/0000-0002-3142-2383"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Riccardo Sisto","raw_affiliation_strings":["Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055358727","display_name":"Fulvio Valenza","orcid":"https://orcid.org/0000-0002-8471-3029"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fulvio Valenza","raw_affiliation_strings":["Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045152316","display_name":"Jalolliddin Yusupov","orcid":"https://orcid.org/0000-0003-3973-4266"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Jalolliddin Yusupov","raw_affiliation_strings":["Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Dip. Automatica e Informatica, Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073892199"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":0.4835,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.68134569,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"473","last_page":"478"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7889743447303772},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.598585844039917},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5574150085449219},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4866109788417816},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.48108384013175964},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.47234049439430237},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4584488570690155},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13581061363220215},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.1123020350933075},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09971445798873901}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7889743447303772},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.598585844039917},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5574150085449219},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4866109788417816},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.48108384013175964},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.47234049439430237},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4584488570690155},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13581061363220215},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.1123020350933075},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09971445798873901},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/netsoft48620.2020.9165434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165434","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:4973441","is_oa":true,"landing_page_url":"https://zenodo.org/record/4973441","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:4973441","is_oa":true,"landing_page_url":"https://zenodo.org/record/4973441","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1483177141","https://openalex.org/W2014254858","https://openalex.org/W2036291311","https://openalex.org/W2040340473","https://openalex.org/W2125560635","https://openalex.org/W2135292514","https://openalex.org/W2256418578","https://openalex.org/W2260783129","https://openalex.org/W2412422166","https://openalex.org/W2521390033","https://openalex.org/W2575561340","https://openalex.org/W2594657955","https://openalex.org/W2740568708","https://openalex.org/W2911938450","https://openalex.org/W3034278024","https://openalex.org/W4293737261","https://openalex.org/W6715572863","https://openalex.org/W6779181810"],"related_works":["https://openalex.org/W2515419187","https://openalex.org/W4244478748","https://openalex.org/W2077352188","https://openalex.org/W2507130582","https://openalex.org/W4399793156","https://openalex.org/W4223488648","https://openalex.org/W2009238965","https://openalex.org/W2373690040","https://openalex.org/W2134969820","https://openalex.org/W2042575648"],"abstract_inverted_index":{"The":[0],"rise":[1],"of":[2,5,14,21,41,53,71,75,79,133,143,159,164],"new":[3],"forms":[4],"cyber-threats":[6],"is":[7],"mostly":[8,118],"due":[9],"to":[10,47,87,91,93,96,98,126],"the":[11,18,24,38,42,49,69,124,131,147,156],"extensive":[12],"use":[13,66,166],"virtualization":[15],"paradigms":[16],"and":[17,44,51,130,150],"increasing":[19],"adoption":[20],"automation":[22],"in":[23,68],"software":[25],"life-cycle.":[26],"To":[27],"address":[28],"these":[29],"challenges":[30],"we":[31,59],"propose":[32],"an":[33],"innovative":[34],"framework":[35,116],"that":[36],"leverages":[37],"intrinsic":[39],"programmability":[40],"cloud":[43],"software-defined":[45],"infrastructures":[46],"improve":[48],"effectiveness":[50],"efficiency":[52],"reaction":[54],"mechanisms.":[55],"In":[56,107],"this":[57,76],"paper,":[58],"present":[60],"our":[61,115,137],"contributions":[62],"with":[63],"a":[64,165],"demonstrative":[65],"case":[67],"context":[70],"Kubernetes.":[72],"By":[73],"means":[74,163],"framework,":[77],"developers":[78],"cybersecurity":[80],"appliances":[81],"will":[82,117],"not":[83],"have":[84],"any":[85,100],"more":[86],"care":[88],"about":[89],"how":[90],"react":[92],"events":[94],"or":[95],"struggle":[97],"define":[99],"possible":[101],"security":[102,160],"tasks":[103],"at":[104,146],"design":[105],"time.":[106],"addition,":[108],"automatic":[109],"firewall":[110],"ruleset":[111],"generation":[112],"provided":[113],"by":[114,162],"avoid":[119],"human":[120],"intervention,":[121],"hence":[122],"decreasing":[123],"time":[125],"carry":[127],"out":[128],"them":[129],"likelihood":[132],"errors.":[134],"We":[135],"focus":[136],"discussions":[138],"on":[139],"technical":[140],"challenges:":[141],"definition":[142],"common":[144],"actions":[145],"policy":[148],"level":[149],"their":[151],"translation":[152],"into":[153],"configurations":[154],"for":[155],"heterogeneous":[157],"set":[158],"functions":[161],"case.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
