<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>4. KuVS Fachgespräch "Network Softwarization" (3. - 4.4.2025)</title>
<link href="http://hdl.handle.net/10900/163069" rel="alternate"/>
<subtitle/>
<id>http://hdl.handle.net/10900/163069</id>
<updated>2026-05-12T21:41:26Z</updated>
<dc:date>2026-05-12T21:41:26Z</dc:date>
<entry>
<title>Assessing Effects of Cyber-Attacks on Smart Grids through Power Grid and Communication Co-Simulation</title>
<link href="http://hdl.handle.net/10900/163785" rel="alternate"/>
<author>
<name>Kaven, Sascha</name>
</author>
<author>
<name>Volkmann, Moritz</name>
</author>
<author>
<name>Skwarek, Volker</name>
</author>
<id>http://hdl.handle.net/10900/163785</id>
<updated>2025-04-04T01:12:30Z</updated>
<published>2025-04-03T00:00:00Z</published>
<summary type="text">Assessing Effects of Cyber-Attacks on Smart Grids through Power Grid and Communication Co-Simulation
Kaven, Sascha; Volkmann, Moritz; Skwarek, Volker
The transition to renewable energy sources has led&#13;
to the development of smart grids, which integrate advanced&#13;
metering infrastructure and communication networks to enhance&#13;
grid management. However, this evolution also introduces new&#13;
cyber-attack surfaces. This paper presents a co-simulation tool&#13;
designed to assess the impact of cyber-attacks on smart grids&#13;
by simulating both power grid and communication components.&#13;
Focusing on false data injection attacks, the tool evaluates the&#13;
effects of manipulated measurement data on state estimation and&#13;
grid stability. Initial results demonstrate the tool’s capability to&#13;
identify vulnerabilities and inform the development of robust&#13;
security measures for future smart grid control systems.
</summary>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</entry>
<entry>
<title>Scalable Cybersecurity Training: Integrating Virtual and Physical Security Teaching Environments</title>
<link href="http://hdl.handle.net/10900/163784" rel="alternate"/>
<author>
<name>Bechtel, Lukas</name>
</author>
<author>
<name>Schramm, Markus</name>
</author>
<author>
<name>Popperl, Lukas</name>
</author>
<author>
<name>Heer, Tobias</name>
</author>
<id>http://hdl.handle.net/10900/163784</id>
<updated>2025-04-04T01:02:29Z</updated>
<published>2025-04-03T00:00:00Z</published>
<summary type="text">Scalable Cybersecurity Training: Integrating Virtual and Physical Security Teaching Environments
Bechtel, Lukas; Schramm, Markus; Popperl, Lukas; Heer, Tobias
The number of cybersecurity incidents increases&#13;
year over year. Cybersecurity education requires hands-on experience&#13;
to protect infrastructure and services against hackers.&#13;
However, existing teaching infrastructures face scalability and&#13;
hardware integration challenges. This paper presents a semivirtualized&#13;
security teaching infrastructure combining virtual&#13;
infrastructure, physical hardware access, and an Attack &amp;&#13;
Defense framework. The infrastructure is based on a Proxmox&#13;
cluster, managed through a self-developed platform that allows&#13;
parallel access to different courses. The teaching concept enables&#13;
students to solve team-based exercises on personal laptops. Using&#13;
personal laptops motivates students to create and maintain their&#13;
own set of tools for cybersecurity analysis. Automated scoring and&#13;
hardware interaction enhance engagement, providing a flexible&#13;
platform for practical cybersecurity training.
</summary>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</entry>
<entry>
<title>VIPNANO: Monitoring of Virtual Private Cloud Networks for Automated Anomaly Detection</title>
<link href="http://hdl.handle.net/10900/163783" rel="alternate"/>
<author>
<name>Sichermann, Marleen</name>
</author>
<author>
<name>Dietz, Katharina</name>
</author>
<author>
<name>Kögel, Jochen</name>
</author>
<author>
<name>Meier, Sebastian</name>
</author>
<author>
<name>Geißler, Stefan</name>
</author>
<author>
<name>Hoßfeld, Tobias</name>
</author>
<id>http://hdl.handle.net/10900/163783</id>
<updated>2025-04-04T01:02:30Z</updated>
<published>2025-04-03T00:00:00Z</published>
<summary type="text">VIPNANO: Monitoring of Virtual Private Cloud Networks for Automated Anomaly Detection
Sichermann, Marleen; Dietz, Katharina; Kögel, Jochen; Meier, Sebastian; Geißler, Stefan; Hoßfeld, Tobias
Anomaly detection in enterprise networks is crucial&#13;
for cybersecurity, system monitoring, and identifying outages.&#13;
Despite extensive academic research, practical deployment of&#13;
proposed mechanisms remains rare. The VIPNANO project&#13;
investigates key shortcomings in academic approaches, focusing&#13;
on two major obstacles: (1) reliance on unrealistic datasets that&#13;
fail to reflect real-world complexity, and (2) overly complex machine&#13;
learning models with impractical computational overhead.&#13;
Additionally, we highlight a critical gap – the lack of rigorous&#13;
real-world validation. Through systematic analysis, we emphasize&#13;
the need to prioritize realistic data, scalability, and verifiable&#13;
solutions to bridge the gap between theory and deployment.
</summary>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</entry>
<entry>
<title>Automated Test Bench for High-Performance Network Equipment</title>
<link href="http://hdl.handle.net/10900/163782" rel="alternate"/>
<author>
<name>Steinert, Benjamin</name>
</author>
<author>
<name>Paradzik, Gabriel</name>
</author>
<author>
<name>Menth, Michael</name>
</author>
<id>http://hdl.handle.net/10900/163782</id>
<updated>2025-04-04T01:02:31Z</updated>
<published>2025-04-03T00:00:00Z</published>
<summary type="text">Automated Test Bench for High-Performance Network Equipment
Steinert, Benjamin; Paradzik, Gabriel; Menth, Michael
This paper presents an automated test bench that&#13;
supports reproducible and holistic benchmarking of data plane&#13;
and control plane performance. The modular architecture integrates&#13;
the hardware-based traffic generator P4TG and the&#13;
software-based traffic generator iperf3 for precise control over&#13;
test traffic. Additionally, it supports automated Device under Test&#13;
(DuT) reconfiguration between test runs and metric collection.&#13;
A case study demonstrates the feasibility of the approach by&#13;
measuring the performance of a modern P4-based COTS data&#13;
center switch.
</summary>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</entry>
</feed>
