I am a Fixed-term Assistant Professor (RTD-A) in the Computer Network Group (NetGroup) of the Department of Control and Computer Engineering (DAUIN) at the Politecnico di Torino, Italy.
I received the Ph.D. degree (cum laude) in Computer and Control Engineering in December 7th, 2022, with a thesis entitled “Network Security Automation”, under the supervision of Professors Riccardo Sisto, leader of the NetGroup, and Fulvio Valenza.
My current research interests are in the areas of cybersecurity and network management, with a special focus on:
automatic security orchestration and configuration of network security functions;
formal verification of network security policies;
threat modeling and analysis;
softwarization technologies for computer networks.
The configuration of security systems for communication protection, such as VPNs, is traditionally performed manually by human beings. However, because the complexity of this task becomes soon difficult to manage when its size increases, critical errors that may open the door to cyberattacks may be introduced. Moreover, even when a solution is computed correctly, sub-optimizations that may afflict the performance of the configured VPNs may be introduced. Unfortunately, the possible solution that consists in automating the definition of VPN configurations has been scarcely studied in literature so far. Therefore, this paper proposes an automatic approach to compute the configuration of VPN systems. Both the allocation scheme of VPN systems in the network and their protection rules are computed automatically. This result is achieved through the formulation of a Maximum Satisfiability Modulo Theories problem, which provides both formal correctness-by-construction and optimization of the result. A framework implementing this approach has been developed, and its experimental validation showed that it is a valid alternative for replacing time-consuming and error-prone human operations for significant problem sizes.
@article{TDSC2025B,author={Bringhenti, Daniele and Sisto, Riccardo and Valenza, Fulvio},title={Automating {VPN} Configuration in Computer Networks},journal={{IEEE} Trans. Dependable Secur. Comput.},volume={22},number={1},pages={561--578},year={2025},url={https://doi.org/10.1109/TDSC.2024.3409073},doi={10.1109/TDSC.2024.3409073}}
TDSC
Atomizing Firewall Policies for Anomaly Analysis and Resolution
Daniele
Bringhenti, Simone
Bussa, Riccardo
Sisto, and Fulvio
Valenza
Nowadays, the security management of packet filtering firewall policies got complicated due to the evolution of modern computer networks, characterized by growing size and heterogeneity of communications. The traditional manual approaches for configuring firewalls have become error-prone, unoptimized and time-consuming, leading to an increasing number of policy anomalies, including both sub-optimizations and conflicts. In literature, the techniques proposed for anomaly management have several shortcomings, as their anomaly analysis is usually excessively complex, while their anomaly resolution cannot solve all anomalies. In order to overcome these shortcomings, this paper proposes a comprehensive approach for firewall policy anomaly analysis and resolution, based on the formal concept of atomic predicates. This approach has the aim to simplify the anomaly management operations, make them efficient and solve all configuration anomalies. The achievement of these objectives has been experimentally proved through the validation of a framework which implements the proposed approach, and whose time performance and anomaly management efficiency have been compared with the relevant alternative approaches.
@article{TDSC2025A,author={Bringhenti, Daniele and Bussa, Simone and Sisto, Riccardo and Valenza, Fulvio},title={Atomizing Firewall Policies for Anomaly Analysis and Resolution},journal={{IEEE} Trans. Dependable Secur. Comput.},volume={22},number={3},pages={2308--2325},year={2025},url={https://doi.org/10.1109/TDSC.2024.3495230},doi={10.1109/TDSC.2024.3495230}}
TNSM
GreenShield: Optimizing Firewall Configuration for Sustainable Networks
Sustainability is an increasingly critical design feature for modern computer networks. However, green objectives related to energy savings are affected by the application of approximate cybersecurity management techniques. In particular, their impact is evident in distributed firewall configuration, where traditional manual approaches create redundant architectures, leading to avoidable power consumption. This issue has not been addressed by the approaches proposed in literature to automate firewall configuration so far, because their optimization is not focused on network sustainability. Therefore, this paper presents GreenShield as a possible solution that combines security and green-oriented optimization for firewall configuration. Specifically, GreenShield minimizes the power consumption related to firewalls activated in the network while ensuring that the security requested by the network administrator is guaranteed, and the one due to traffic processing by making firewalls to block undesired traffic as near as possible to the sources. The framework implementing GreenShield has undergone experimental tests to assess the provided optimization and its scalability performance.
@article{TNSM2024B,author={Bringhenti, Daniele and Valenza, Fulvio},title={GreenShield: Optimizing Firewall Configuration for Sustainable Networks},journal={{IEEE} Trans. Netw. Serv. Manag.},volume={21},number={6},pages={6909--6923},year={2024},url={https://doi.org/10.1109/TNSM.2024.3452150},doi={10.1109/TNSM.2024.3452150}}
Comput. Surv.
Automation for Network Security Configuration: State of the Art and
Research Trends
Daniele
Bringhenti, Guido
Marchetto, Riccardo
Sisto, and Fulvio
Valenza
The size and complexity of modern computer networks are progressively increasing, as a consequence of novel architectural paradigms such as the Internet of Things and network virtualization. Consequently, a manual orchestration and configuration of network security functions is no more feasible in an environment where cyber attacks can dramatically exploit breaches related to any minimum configuration error. A new frontier is then the introduction of automation in network security configuration, i.e., automatically designing the architecture of security services and the configurations of network security functions, such as firewalls, Virtual Private Networks gateways, and so on. This opportunity has been enabled by modern computer networks technologies, such as virtualization. In view of these considerations, the motivations for the introduction of automation in network security configuration are first introduced, along with the key automation enablers. Then, the current state of the art in this context is surveyed, focusing on both the achieved improvements and the current limitations. Finally, possible future trends in the field are illustrated.
@article{COMSUR2024,author={Bringhenti, Daniele and Marchetto, Guido and Sisto, Riccardo and Valenza, Fulvio},title={Automation for Network Security Configuration: State of the Art and
Research Trends},journal={{ACM} Comput. Surv.},volume={56},number={3},pages={57:1--57:37},year={2024},url={https://doi.org/10.1145/3616401},doi={10.1145/3616401}}
TDSC
Automated Firewall Configuration in Virtual Networks
The configuration of security functions in computer networks is still typically performed manually, which likely leads to security breaches and long re-configuration times. This problem is exacerbated for modern networks based on network virtualization, because their complexity and dynamics make a correct manual configuration practically unfeasible. This article focuses on packet filters, i.e., the most common firewall technology used in computer networks, and it proposes a new methodology to automatically define the allocation scheme and configuration of packet filters in the logical topology of a virtual network. The proposed method is based on solving a carefully designed partial weighted Maximum Satisfiability Modulo Theories problem by means of a state-of-the-art solver. This approach formally guarantees the correctness of the solution, i.e., that all security requirements are satisfied, and it minimizes the number of needed firewalls and firewall rules. This methodology is extensively evaluated using different metrics and tests on both synthetic and real use cases, and compared to the state-of-the-art solutions, showing its superiority.
@article{TDSC2023,author={Bringhenti, Daniele and Marchetto, Guido and Sisto, Riccardo and Valenza, Fulvio and Yusupov, Jalolliddin},title={Automated Firewall Configuration in Virtual Networks},journal={{IEEE} Trans. Dependable Secur. Comput.},volume={20},number={2},pages={1559--1576},year={2023},url={https://doi.org/10.1109/TDSC.2022.3160293},doi={10.1109/TDSC.2022.3160293}}