- Home
- People
- Research Fellows
- Dinesha Ranathunga
Dr Dinesha Ranathunga
Research Associate
The University of Adelaide
Dinesha Ranathunga received his Ph.D. for his thesis titled "auto-configuration
of critical network infrastructure" from the University of Adelaide.
His current research focuses on developing formal models of network policies.
Research Interests:
Firewall policy
Metagraph modeling
Network auto-configuration
Policy-defined networking
SCADA network security
Software-defined networking
Publications
Invited talks, refereed proceedings and other conference outputs
Feutrill, A., Ranathunga D., Yarom Y., & Roughan M.
(2018). The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay.
2018 Sixth International Symposium on Computing and Networking (CANDAR) . 1-10. doi: 10.1109/CANDAR.2018.00009
Hamza, A., Ranathunga D., Gharakheili H. Habibi, Roughan M., & Sivaraman V.
(2018). Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles.
SIGCOMM IoT Security and Privacy - IoT S&P '18. 8 - 14. doi: 10.1145/3229565.3229566
Ranathunga, D., Nguyen H., & Roughan M.
(2017). Verifiable Policy-Defined Networking using Metagraphs.
IFIP Networking.
Ranathunga, D., Roughan M., Kernick P., & Falkner N.
(2016). Malachite: Firewall policy comparison.
2016 IEEE Symposium on Computers and Communication (ISCC). doi: 10.1109/ISCC.2016.7543759
Ranathunga, D., Roughan M., Kernick P., Falkner N., Nguyen H., Mihailescu M., et al.
(2016). Verifiable Policy-defined Networking for Security Management.
International Conference on Security and Cryptography. 344-351. doi: 10.5220/0005990303440351
Ranathunga, D., Roughan M., Kernick P., & Falkner N.
(2016). The Mathematical Foundations for Mapping Policies to Network Devices.
International Conference on Security and Cryptography. doi: 10.5220/0005946201970206
Ranathunga, D., Kernick P., Falkner N., Nguyen H., & Roughan M.
(2015). Identifying the missing aspects of the ANSI/ISA best practices for security policy.
ASIACCS 2015. doi: 10.1145/2732198.2732201
Ranathunga, D., Kernick P., Faulkner N., & Roughan M.
(2015). Towards standardising firewall reporting.
Conference on Cybersecurity of Industrial Control Systems (CyberICS).
Journal Articles
Hamza, A., Ranathunga D., Gharakheili H. Habibi, Benson T. A., Roughan M., & Sivaraman V.
(2019). Verifying and Monitoring IoTs Network Behavior using MUD Profiles.
arXiv. arXiv:1902.02484v1.
Ranathunga, D., Nguyen H.., & Roughan M.
(2017). MGtoolkit: A python package for implementing metagraphs.
SoftwareX. 6, 91 - 93. doi: 10.1016/j.softx.2017.04.001
Ranathunga, D., Roughan M., Nguyen H., Kernick P., & Falkner N.
(2016). Case studies of SCADA firewall configurations and the implications for best practices.
IEEE Transactions on Network and Service Management. 13(4), 871-884. doi: 10.1109/TNSM.2016.2597245
Technical reports and unrefereed outputs
Ranathunga, D., Roughan M., & Nguyen H.
(2018). Mathematical Reconciliation of Medical Privacy Policies.
IEEE Journal of Biomedical and Health Informatics.
Ranathunga, D., Roughan M., & Nguyen H.
(2017). Understanding Course Pathways using Metagraphs.