{"id":1403,"date":"2025-07-30T13:29:21","date_gmt":"2025-07-30T17:29:21","guid":{"rendered":"https:\/\/web.uri.edu\/decps\/?page_id=1403"},"modified":"2025-07-31T14:59:45","modified_gmt":"2025-07-31T18:59:45","slug":"sysnet","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/decps\/research\/sysnet\/","title":{"rendered":"Systems &amp; Networks"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Virtualize, Inspect, Protect \u2014 Resilient Grids from the Core Up<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:18px;margin-bottom:12px;line-height:1.8\">\nModern power grids face sophisticated cyber-physical threats that traditional IT security tools aren&#8217;t designed to address. Conventional firewalls, intrusion-detection systems, and honeypots, built for enterprise networks, often fail to recognize the unique timing and protocol behaviors of grid control systems. Even worse, many security solutions operate passively, reacting only after an attack has occurred, which makes it difficult to prevent actual physical disruptions.\n<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"598\" src=\"https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-1024x598.jpg\" alt=\"\" class=\"wp-image-1248\" style=\"width:430px;height:auto\" srcset=\"https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-1024x598.jpg 1024w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-300x175.jpg 300w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-768x448.jpg 768w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-1536x897.jpg 1536w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-2048x1195.jpg 2048w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-364x212.jpg 364w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-500x292.jpg 500w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-1000x584.jpg 1000w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-1280x747.jpg 1280w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-2000x1167.jpg 2000w, https:\/\/web.uri.edu\/decps\/wp-content\/uploads\/sites\/1880\/pfv-scaled.jpg 2560w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p style=\"font-size:18px;margin-bottom:12px;line-height:1.8\">\nMuch like remodeling a house on a weak foundation, retrofitting existing grid networks with conventional infrastructure limits the effectiveness of advanced security measures. Instead, we\u2019re pioneering the use of technologies that have revolutionized large-scale Internet platforms to create high-performance, resilient power grids:\n<ul style=\"font-size: 18px;margin-bottom:6px\">\n   <li style=\"line-height:1.6\"><b>Software-Defined Networking (SDN)-based Virtualization<\/b>: Virtualizes computing nodes to obscure the grid\u2019s cyber-physical footprint and disrupt adversarial reconnaissance.<\/li>\n   <li style=\"line-height:1.6\"><b>P4-Enabled Hardware Accelerators<\/b>: Losslessly compress network telemetry for faster, more efficient detection, prevention, and mitigation of attacks.<\/li>\n   <li style=\"line-height:1.6\"><b>Customized Zeek Intrusion-Detection Systems<\/b>: Analyze well-formed traffic patterns to expose an attacker\u2019s hidden strategies and malicious intent.<\/li>\n<\/ul>\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virtualize, Inspect, Protect \u2014 Resilient Grids from the Core Up Modern power grids face sophisticated cyber-physical threats that traditional IT security tools aren&#8217;t designed to address. Conventional firewalls, intrusion-detection systems, and honeypots, built for enterprise networks, often fail to recognize the unique timing and protocol behaviors of grid control systems. Even worse, many security solutions [&hellip;]<\/p>\n","protected":false},"author":3827,"featured_media":0,"parent":710,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-1403","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/1403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/users\/3827"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/comments?post=1403"}],"version-history":[{"count":4,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/1403\/revisions"}],"predecessor-version":[{"id":1523,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/1403\/revisions\/1523"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/710"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/media?parent=1403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}