58 research outputs found
Using SIP as P2P Technology
Nowadays peer-to-peer (p2p) technologies are widely adopted and used for building even more sophisticated services: from ubiquitous file-sharing systems to the even more popular Internet telephony. In addition, the Session Initiation Protocol (SIP) has been used for different purposes. Due to its intrinsic generality and flexibility, it could be adopted to build and manage also p2p applications. Moreover, the p2p philosophy could be applied to the existing SIP architecture, to cope with issues such as Denial of Service (DoS). In this paper, we survey the state of the art of the joint use of p2p and SIP. Some hints and examples in using SIP as a core technological component of the p2p world are also presented
Method and system for regulating in real time the clock frequencies of at least one cluster of electronic machines
Method for regulating in real time the clock frequencies of at least one cluster of electronic machines, characterized
in that it provides for carrying out the following steps: a) defining a finite number of discrete virtual capacity values f[l], f[2],....
00
f[K], as global performance indices, of said cluster of machines; b) calculating by means of a randomized optimization procedure,
for each value of said virtual capacity, a set of 1 vectors containing clock frequency values for each machine in said cluster; c) defin
00 ing a reference queue value, related to the number of processing requests received by said cluster; and provides for iteratively carry
ing out the following steps: d) measuring the deviation between a current queue value, related to the number of processing requests
in said current queue, and said reference queue value; e) selecting one of said discrete virtual capacity values on the basis of said
» measured deviation, said selection occurring on the basis of a procedure that, at each iteration, analyzes said measured deviation,
o compares it with the measured deviation value obtained at the previous iteration, and chooses whether to keep the current virtual ca -
pacity value or to adopt one of the two adjacent or non-adjacent admissible virtual capacity values of said finite number of discrete
values; f) selecting, based on said selected virtual capacity value, a vector of clock frequency values for each machine from said set
o of 1 vectors, so as to optimize a multi-target performance index (J), and then setting the clock frequency of each machine in the
cluste
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent
network transmissions. Recent findings indicate that novel malware is
increasingly using network steganography. Similarly, other malicious activities
can profit from network steganography, such as data leakage or the exchange of
pedophile data. This paper provides an introduction to network steganography
and highlights its potential application for harmful purposes. We discuss the
issues related to countering network steganography in practice and provide an
outlook on further research directions and problems.Comment: 11 page
Smart e-Learning Systems with Big Data
Nowadays, the Internet connects people, multimedia and physical objects leading to a new-wave of services. This includes learning applications, which require to manage huge and mixed volumes of information coming from Web and social media, smart-cities and Internet of Things nodes. Unfortunately, designing smart e-learning systems able to take advantage of such a complex technological space raises different challenges. In this perspective, this paper introduces a reference architecture for the development of future and big-data-capable e-learning platforms. Also, it showcases how data can be used to enrich the learning process
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources
The use of Artificial Intelligence (AI) to support cybersecurity operations
is now a consolidated practice, e.g., to detect malicious code or configure
traffic filtering policies. The recent surge of AI, generative techniques and
frameworks with efficient natural language processing capabilities dramatically
magnifies the number of possible applications aimed at increasing the security
of the Internet. Specifically, the ability of ChatGPT to produce textual
contents while mimicking realistic human interactions can be used to mitigate
the plague of emails containing scams. Therefore, this paper investigates the
use of AI to engage scammers in automatized and pointless communications, with
the goal of wasting both their time and resources. Preliminary results showcase
that ChatGPT is able to decoy scammers, thus confirming that AI is an effective
tool to counteract threats delivered via mail. In addition, we highlight the
multitude of implications and open research questions to be addressed in the
perspective of the ubiquitous adoption of AI
SecCo: Automated Services to Secure Containers in the DevOps Paradigm
Containers are core building blocks for creating applications based on the microservice paradigm. However, assessing their security is complex, especially when deployed in distributed and heterogeneous scenarios. Moreover, developers and IT operators should only focus on integration and delivery processes without dealing with tasks to guarantee securing requirements. To overcome such issues, in this paper, we introduce the ideas at the basis of Project SecCo (Securing Containers), i.e., an architecture for extending and improving current security assessment methodologies into the continuous integration and continuous delivery DevOps pipeline. To this end, SecCo proposes a framework able to orchestrate new automatic security services to prevent and reduce security vulnerabilities in the design, implementation, and deployment phases, and to identify and mitigate, at runtime, attempts to exploit them. The paper also showcases the main research challenges to be addressed for pursuing the vision of SecCo
Correction to: Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters
Page 2: Column 2, lines 2-4, previously read: "Specifically, we consider a decision maker that, after a proper training, is able to select the most suitable heuristic for compute the placement for each VM requested by end users"
Network Information Hiding and Science 2.0: Can it be a Match?
Science 2.0 aims at using the information sharingand collaborative features of the Internet to offer new featuresto the research community. Science 2.0 has been already appliedto computer sciences, especially bioinformatics. For networkinformation hiding, a field studying the possibility of concealing acommunication in networks, the application of Science 2.0 is stilla rather uncovered territory. To foster the discussion of potentialbenefits for network information hiding, we provide a disquisitionfor six different Science 2.0 aspects when applied to this domain
- …