<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>4. KuVS Fachgespräch "Network Softwarization" (3. - 4.4.2025)</title>
<link>http://hdl.handle.net/10900/163069</link>
<description/>
<pubDate>Tue, 05 May 2026 12:54:04 GMT</pubDate>
<dc:date>2026-05-05T12:54:04Z</dc:date>
<image>
<title>4. KuVS Fachgespräch "Network Softwarization" (3. - 4.4.2025)</title>
<url>https://publikationen.uni-tuebingen.de:443/xmlui/bitstream/id/92bea732-d8de-47c1-a4dd-c8c71f6d5e4b/</url>
<link>http://hdl.handle.net/10900/163069</link>
</image>
<item>
<title>Assessing Effects of Cyber-Attacks on Smart Grids through Power Grid and Communication Co-Simulation</title>
<link>http://hdl.handle.net/10900/163785</link>
<description>Assessing Effects of Cyber-Attacks on Smart Grids through Power Grid and Communication Co-Simulation
Kaven, Sascha; Volkmann, Moritz; Skwarek, Volker
The transition to renewable energy sources has led&#13;
to the development of smart grids, which integrate advanced&#13;
metering infrastructure and communication networks to enhance&#13;
grid management. However, this evolution also introduces new&#13;
cyber-attack surfaces. This paper presents a co-simulation tool&#13;
designed to assess the impact of cyber-attacks on smart grids&#13;
by simulating both power grid and communication components.&#13;
Focusing on false data injection attacks, the tool evaluates the&#13;
effects of manipulated measurement data on state estimation and&#13;
grid stability. Initial results demonstrate the tool’s capability to&#13;
identify vulnerabilities and inform the development of robust&#13;
security measures for future smart grid control systems.
</description>
<pubDate>Thu, 03 Apr 2025 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10900/163785</guid>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</item>
<item>
<title>Scalable Cybersecurity Training: Integrating Virtual and Physical Security Teaching Environments</title>
<link>http://hdl.handle.net/10900/163784</link>
<description>Scalable Cybersecurity Training: Integrating Virtual and Physical Security Teaching Environments
Bechtel, Lukas; Schramm, Markus; Popperl, Lukas; Heer, Tobias
The number of cybersecurity incidents increases&#13;
year over year. Cybersecurity education requires hands-on experience&#13;
to protect infrastructure and services against hackers.&#13;
However, existing teaching infrastructures face scalability and&#13;
hardware integration challenges. This paper presents a semivirtualized&#13;
security teaching infrastructure combining virtual&#13;
infrastructure, physical hardware access, and an Attack &amp;&#13;
Defense framework. The infrastructure is based on a Proxmox&#13;
cluster, managed through a self-developed platform that allows&#13;
parallel access to different courses. The teaching concept enables&#13;
students to solve team-based exercises on personal laptops. Using&#13;
personal laptops motivates students to create and maintain their&#13;
own set of tools for cybersecurity analysis. Automated scoring and&#13;
hardware interaction enhance engagement, providing a flexible&#13;
platform for practical cybersecurity training.
</description>
<pubDate>Thu, 03 Apr 2025 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10900/163784</guid>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</item>
<item>
<title>VIPNANO: Monitoring of Virtual Private Cloud Networks for Automated Anomaly Detection</title>
<link>http://hdl.handle.net/10900/163783</link>
<description>VIPNANO: Monitoring of Virtual Private Cloud Networks for Automated Anomaly Detection
Sichermann, Marleen; Dietz, Katharina; Kögel, Jochen; Meier, Sebastian; Geißler, Stefan; Hoßfeld, Tobias
Anomaly detection in enterprise networks is crucial&#13;
for cybersecurity, system monitoring, and identifying outages.&#13;
Despite extensive academic research, practical deployment of&#13;
proposed mechanisms remains rare. The VIPNANO project&#13;
investigates key shortcomings in academic approaches, focusing&#13;
on two major obstacles: (1) reliance on unrealistic datasets that&#13;
fail to reflect real-world complexity, and (2) overly complex machine&#13;
learning models with impractical computational overhead.&#13;
Additionally, we highlight a critical gap – the lack of rigorous&#13;
real-world validation. Through systematic analysis, we emphasize&#13;
the need to prioritize realistic data, scalability, and verifiable&#13;
solutions to bridge the gap between theory and deployment.
</description>
<pubDate>Thu, 03 Apr 2025 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10900/163783</guid>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</item>
<item>
<title>Automated Test Bench for High-Performance Network Equipment</title>
<link>http://hdl.handle.net/10900/163782</link>
<description>Automated Test Bench for High-Performance Network Equipment
Steinert, Benjamin; Paradzik, Gabriel; Menth, Michael
This paper presents an automated test bench that&#13;
supports reproducible and holistic benchmarking of data plane&#13;
and control plane performance. The modular architecture integrates&#13;
the hardware-based traffic generator P4TG and the&#13;
software-based traffic generator iperf3 for precise control over&#13;
test traffic. Additionally, it supports automated Device under Test&#13;
(DuT) reconfiguration between test runs and metric collection.&#13;
A case study demonstrates the feasibility of the approach by&#13;
measuring the performance of a modern P4-based COTS data&#13;
center switch.
</description>
<pubDate>Thu, 03 Apr 2025 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10900/163782</guid>
<dc:date>2025-04-03T00:00:00Z</dc:date>
</item>
</channel>
</rss>
