Networking and Internet Architecture

2025-12-12 | | Total: 4

#1 Natural Language Interface for Firewall Configuration [PDF] [Copy] [Kimi] [REL]

Authors: F. Taghiyev, A. Aslanbayli

This paper presents the design and prototype implementation of a natural language interface for configuring enterprise firewalls. The framework allows administrators to express access control policies in plain language, which are then translated into vendor specific configurations. A compact schema bound intermediate representation separates human intent from device syntax and in the current prototype compiles to Palo Alto PAN OS command line configuration while remaining extensible to other platforms. Large language models are used only as assistive parsers that generate typed intermediate representation objects, while compilation and enforcement remain deterministic. The prototype integrates three validation layers, namely a static linter that checks structural and vendor specific constraints, a safety gate that blocks overly permissive rules such as any to any allows, and a Batfish based simulator that validates configuration syntax and referential integrity against a synthetic device model. The paper describes the architecture, implementation, and test methodology on synthetic network context datasets and discusses how this approach can evolve into a scalable auditable and human centered workflow for firewall policy management.

Subjects: Networking and Internet Architecture , Artificial Intelligence

Publish: 2025-12-11 16:33:33 UTC


#2 L2 Ethernet Switch VLSI Implementation [PDF] [Copy] [Kimi] [REL]

Authors: Aniruddh Mishra, Benjamin Oommen, Jimmy Liang

Ethernet switches are foundational to the global internet infrastructure. These devices route packets of data on a local area network between source addresses to destination media access control addresses. On the L2 layer of the Open Systems Interconnections model, Ethernet switches take in digitized data from a Media Independent Interface and send it to the corresponding output port for the destination address. Switches need to handle parallel input and output streams from each port, prioritizing throughput, efficiency, and packet integrity. Due to the confidential nature of the networking device industry, there do not exist many open source implementations of switching fabrics. We propose an open source design for an L2 Ethernet switch along with the power, performance, and area tradeoffs for architecture decisions.

Subjects: Networking and Internet Architecture , Systems and Control

Publish: 2025-12-11 06:08:55 UTC


#3 Lightweight Security for Private Networks: Real-World Evaluation of WireGuard [PDF] [Copy] [Kimi] [REL]

Authors: Hubert Djuitcheu, Andrew Sergeev, Khurshid Alam, Danny Santhosh, Achim Autenrieth, Jochen Seitz

This paper explores WireGuard as a lightweight alternative to IPsec for securing the user plane as well as the control plane in an industrial Open RAN deployment at the Adtran Terafactory in Meiningen. We focus on a realistic scenario where external vendors access their hardware in our 5G factory network, posing recurrent security risks from untrusted gNBs and intermediate network elements. Unlike prior studies limited to lab setups, we implement a complete proof-of-concept in a factory environment and compare WireGuard with IPsec under industrial traffic conditions. Our approach successfully protects user data (N3 interface) against untrusted gNBs and man-in-the-middle attacks while enabling control plane (N2 interface) authentication between the access and mobility management functions (AMF) and gNB. Performance measurements show that WireGuard adds minimal overhead in throughput, latency, and Central Processing Unit (CPU) usage, achieving performance comparable to IPsec. These findings demonstrate that WireGuard offers competitive performance with significantly reduced configuration complexity, making it a strong candidate for broader adoption in O-RAN, providing a unified, lightweight security layer across multiple interfaces and components.

Subjects: Cryptography and Security , Networking and Internet Architecture , High Energy Physics - Experiment

Publish: 2025-12-10 22:30:00 UTC


#4 IoTEdu: Access Control, Detection, and Automatic Incident Response in Academic IoT Networks [PDF] [Copy] [Kimi] [REL]

Authors: Joner Assolin, Diego Kreutz, Leandro Bertholdo

The growing presence of IoT devices in academic environments has increased operational complexity and exposed security weaknesses, especially in academic institutions without unified policies for registration, monitoring, and incident response involving IoT. This work presents IoTEdu, an integrated platform that combines access control, incident detection, and automatic blocking of IoT devices. The solution was evaluated in a controlled environment with simulated attacks, achieving an average time of 28.6 seconds between detection and blocking. The results show a reduction in manual intervention, standardization of responses, and unification of the processes of registration, monitoring, and incident response.

Subjects: Cryptography and Security , Artificial Intelligence , Networking and Internet Architecture , Software Engineering

Publish: 2025-11-28 13:26:53 UTC