239 research outputs found
Performance analysis of next generation web access via satellite
Acknowledgements This work was partially funded by the European Union's Horizon 2020 research and innovation programme under grant agreement No. 644334 (NEAT). The views expressed are solely those of the author(s).Peer reviewedPostprin
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent
network transmissions. Recent findings indicate that novel malware is
increasingly using network steganography. Similarly, other malicious activities
can profit from network steganography, such as data leakage or the exchange of
pedophile data. This paper provides an introduction to network steganography
and highlights its potential application for harmful purposes. We discuss the
issues related to countering network steganography in practice and provide an
outlook on further research directions and problems.Comment: 11 page
Method and system for regulating in real time the clock frequencies of at least one cluster of electronic machines
Method for regulating in real time the clock frequencies of at least one cluster of electronic machines, characterized
in that it provides for carrying out the following steps: a) defining a finite number of discrete virtual capacity values f[l], f[2],....
00
f[K], as global performance indices, of said cluster of machines; b) calculating by means of a randomized optimization procedure,
for each value of said virtual capacity, a set of 1 vectors containing clock frequency values for each machine in said cluster; c) defin
00 ing a reference queue value, related to the number of processing requests received by said cluster; and provides for iteratively carry
ing out the following steps: d) measuring the deviation between a current queue value, related to the number of processing requests
in said current queue, and said reference queue value; e) selecting one of said discrete virtual capacity values on the basis of said
» measured deviation, said selection occurring on the basis of a procedure that, at each iteration, analyzes said measured deviation,
o compares it with the measured deviation value obtained at the previous iteration, and chooses whether to keep the current virtual ca -
pacity value or to adopt one of the two adjacent or non-adjacent admissible virtual capacity values of said finite number of discrete
values; f) selecting, based on said selected virtual capacity value, a vector of clock frequency values for each machine from said set
o of 1 vectors, so as to optimize a multi-target performance index (J), and then setting the clock frequency of each machine in the
cluste
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources
The use of Artificial Intelligence (AI) to support cybersecurity operations
is now a consolidated practice, e.g., to detect malicious code or configure
traffic filtering policies. The recent surge of AI, generative techniques and
frameworks with efficient natural language processing capabilities dramatically
magnifies the number of possible applications aimed at increasing the security
of the Internet. Specifically, the ability of ChatGPT to produce textual
contents while mimicking realistic human interactions can be used to mitigate
the plague of emails containing scams. Therefore, this paper investigates the
use of AI to engage scammers in automatized and pointless communications, with
the goal of wasting both their time and resources. Preliminary results showcase
that ChatGPT is able to decoy scammers, thus confirming that AI is an effective
tool to counteract threats delivered via mail. In addition, we highlight the
multitude of implications and open research questions to be addressed in the
perspective of the ubiquitous adoption of AI
Using SIP as P2P Technology
Nowadays peer-to-peer (p2p) technologies are widely adopted and used for building even more sophisticated services: from ubiquitous file-sharing systems to the even more popular Internet telephony. In addition, the Session Initiation Protocol (SIP) has been used for different purposes. Due to its intrinsic generality and flexibility, it could be adopted to build and manage also p2p applications. Moreover, the p2p philosophy could be applied to the existing SIP architecture, to cope with issues such as Denial of Service (DoS). In this paper, we survey the state of the art of the joint use of p2p and SIP. Some hints and examples in using SIP as a core technological component of the p2p world are also presented
Smart e-Learning Systems with Big Data
Nowadays, the Internet connects people, multimedia and physical objects leading to a new-wave of services. This includes learning applications, which require to manage huge and mixed volumes of information coming from Web and social media, smart-cities and Internet of Things nodes. Unfortunately, designing smart e-learning systems able to take advantage of such a complex technological space raises different challenges. In this perspective, this paper introduces a reference architecture for the development of future and big-data-capable e-learning platforms. Also, it showcases how data can be used to enrich the learning process
Programmable data gathering for detecting stegomalware
The 'arm race' against malware developers requires to collect a wide variety of performance measurements, for instance to face threats leveraging information hiding and steganography. Unfortunately, this process could be time-consuming, lack of scalability and cause performance degradations within computing and network nodes. Moreover, since the detection of steganographic threats is poorly generalizable, being able to collect attack-independent indicators is of prime importance. To this aim, the paper proposes to take advantage of the extended Berkeley Packet Filter to gather data for detecting stegomalware. To prove the effectiveness of the approach, it also reports some preliminary experimental results obtained as the joint outcome of two H2020 Projects, namely ASTRID and SIMARGL
- …