Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bernardi Pranggono is active.

Publication


Featured researches published by Bernardi Pranggono.


IEEE Transactions on Power Delivery | 2014

Multiattribute SCADA-Specific Intrusion Detection System for Power Networks

Yi Yang; Kieran McLaughlin; Sakir Sezer; Timothy Littler; Eul Gyu Im; Bernardi Pranggono; H. F. Wang

The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.


power and energy society general meeting | 2013

Intrusion Detection System for IEC 60870-5-104 based SCADA networks

Yi Yang; Kieran McLaughlin; Timothy Littler; Sakir Sezer; Bernardi Pranggono; H. F. Wang

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.


international conference on communications | 2006

A Metro WDM Multi-ring Network with Variable Packet Size

Bin Chen; Bernardi Pranggono; Jaafar M. H. Elmirghani

This paper proposes two metro Wavelength Division Multiplexing (WDM) ring network architectures for variable size packet traffic. Firstly, it presents the network architectures and describes their medium access control (MAC) protocol. Secondly, it evaluates and compares the performance of the modified and original architectures, presenting results for throughput, queuing delay, packet dropping probability and global delay. Finally, it analyses and explains the results.


Wireless Personal Communications | 2015

Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure

Satin Asri; Bernardi Pranggono

The age of Internet of Things has brought in new challenges specifically in areas such as security. The evolution of classic power grids to smart grids is a prime example of how everything is now being connected to the Internet. With the power grid becoming smart, the information and communication systems supporting it is subject to both classical and emerging cyber-attacks. The article investigates the vulnerabilities caused by a distributed denial-of-service (DDoS) attack on the smart grid advanced metering infrastructure. Attack simulations have been conducted on a realistic electrical grid topology. The simulated network consisted of smart meters, power plant and utility server. Finally, the impact of large scale DDoS attacks on the distribution system’s reliability is discussed.


ieee acm international conference utility and cloud computing | 2014

Energy-Aware Virtual Machine Consolidation for Cloud Data Centers

Dabiah Ahmed Alboaneen; Bernardi Pranggono; Huaglory Tianfield

One of the issues in virtual machine consolidation (VMC) in cloud data centers is categorizing different workloads to classify the state of physical servers. In this paper, we propose a new scheme of hosts load categorization in energy-performance VMC framework to reduce energy consumption while meeting the quality of service (QoS) requirement. Specifically the under loaded hosts are classified into three further states, i.e., Under loaded, normal and critical by applying the under load detection algorithm. We also design overload detection and virtual machine (VM) selection policies. The simulation results show that the proposed policies outperform the existing policies in Cloud Sim in terms of both energy and service level agreements violation (SLAV) reduction.


Journal of optical communications | 2008

A Mirroring Strategy for SANs in a Metro WDM Sectioned Ring Architecture under Different Traffic Scenarios

Taisir E. H. El-Gorashi; Bernardi Pranggono; Rashid Mehmood; Jaafar M. H. Elmirghani

In this work, a novel data mirroring technique for storage area networks (SANs) is introduced in a metropolitan area wavelength division multiplexing (WDM) sectioned ring scenario. Simulation is carried out to evaluate the performance of the network with the proposed mirroring method for 16 and 24 nodes under two different traffic models– Poisson and self-similar. Simulation results show four network parameters including node throughput, queuing delay, transmission buffer packet dropping probability and receiver packet dropping probability. A modified version of the MAC protocol that improves mirroring time and bandwidth usage is also introduced and evaluated.


international conference on transparent optical networks | 2005

Performance evaluation of INSTANT - a metro WDM SAN under balanced and unbalanced traffic conditions

Bernardi Pranggono; Jaafar M. H. Elmirghani

Storage area networks (SAN) have become an essential part in todays enterprise computing. This paper reports performance results of INSTANT (integrated storage area network); a metro WDM ring network based SAN, under balanced and unbalanced traffic conditions. Network performance, in terms of throughput, delay, and packet dropping is presented.


optical network design and modelling | 2008

A data Mirroring technique for SANs in a Metro WDM sectioned ring

Taisir E. H. El-Gorashi; Bernardi Pranggono; Rashid Mehmood; Jaafar M. H. Elmirghani

This paper introduces a new data mirroring technique for storage area networks (SANs) in a metropolitan area wavelength division multiplexing (WDM) sectioned ring scenario. Performance is evaluated through simulation of a network with 16 nodes, 4 wavelengths, 1 Gb/s access node rate and 5 Gb/s SAN node rate under different asymmetries of both Poisson and self-similar traffic. Results of average node throughput, queuing delay and transmission buffer packet dropping probability are presented and analyzed. A modified version of the MAC protocol that improves performance in term of mirroring time and bandwidth utilization is introduced and evaluated.


international conference on communications | 2007

Performance Evaluation of a Metro WDM Multi-channel Ring Network with Variable-length Packets

Bernardi Pranggono; Rashid Mehmood; Jaafar M. H. Elmirghani

In this paper, we discuss and evaluate our two metro wavelength division multiplexing (WDM) ring network architectures for variable-length packet traffic. The paper begins with a brief review of the relevant architectures and protocols in the literature. Subsequently, the network architectures along with their medium access control (MAC) protocols are described. Performance for the two network architectures is studied using both simulation and Markovian modeling approaches with the help of their results for queuing delay, node throughput and proportion of packet dropped. Performance for the network is evaluated under symmetric and asymmetric traffic scenarios with Poisson and self-similar traffic.


international conference on transparent optical networks | 2006

Multi-Wavelength Metro WDM Sectioned Ring for SAN Extension under Hot Node Scenario and Variable Traffic Profiles

Taisir E. H. El-Gorashi; Bernardi Pranggono; Jaafar M. H. Elmirghani

First-generation storage area networks (SANs) were designed to operate within limited distances. However, with the destructive effects of catastrophic events in a limited distance environment and the need of large organizations to connect their campuses over large geographic distances to share storage recourses among a larger number of users, the need of extending SANs has become essential. Several solutions were proposed to extend SANs over large distances. In this paper, a sectioned WDM metropolitan ring network is proposed as a suitable extension for SANs. SANs in a metropolitan WDM scenario create asymmetrical traffic and hot node scenarios. For the proposed network, two node architectures are considered, one with two fixed transmitters and the other with a tuneable transmitter. A tunable receive is used with both architectures. For the two fixed transmitters node architecture, two versions of medium access control (MAC) protocol are introduced. Simulation is carried out under both symmetrical and asymmetrical traffic. Performance of the sectioned ring is compared with that of the ring network architecture proposed in B. Pranggono and J.M.H. Elmirghani (2005)

Collaboration


Dive into the Bernardi Pranggono's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Huaglory Tianfield

Glasgow Caledonian University

View shared research outputs
Top Co-Authors

Avatar

Kieran McLaughlin

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sakir Sezer

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

Yi Yang

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Timothy Littler

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

H. F. Wang

North China Electric Power University

View shared research outputs
Top Co-Authors

Avatar

Abdul Razaq

Glasgow Caledonian University

View shared research outputs
Researchain Logo
Decentralizing Knowledge