239 research outputs found

    Performance analysis of next generation web access via satellite

    Get PDF
    Acknowledgements This work was partially funded by the European Union's Horizon 2020 research and innovation programme under grant agreement No. 644334 (NEAT). The views expressed are solely those of the author(s).Peer reviewedPostprin

    Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

    Full text link
    Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data. This paper provides an introduction to network steganography and highlights its potential application for harmful purposes. We discuss the issues related to countering network steganography in practice and provide an outlook on further research directions and problems.Comment: 11 page

    Method and system for regulating in real time the clock frequencies of at least one cluster of electronic machines

    Get PDF
    Method for regulating in real time the clock frequencies of at least one cluster of electronic machines, characterized in that it provides for carrying out the following steps: a) defining a finite number of discrete virtual capacity values f[l], f[2],.... 00 f[K], as global performance indices, of said cluster of machines; b) calculating by means of a randomized optimization procedure, for each value of said virtual capacity, a set of 1 vectors containing clock frequency values for each machine in said cluster; c) defin 00 ing a reference queue value, related to the number of processing requests received by said cluster; and provides for iteratively carry ing out the following steps: d) measuring the deviation between a current queue value, related to the number of processing requests in said current queue, and said reference queue value; e) selecting one of said discrete virtual capacity values on the basis of said » measured deviation, said selection occurring on the basis of a procedure that, at each iteration, analyzes said measured deviation, o compares it with the measured deviation value obtained at the previous iteration, and chooses whether to keep the current virtual ca - pacity value or to adopt one of the two adjacent or non-adjacent admissible virtual capacity values of said finite number of discrete values; f) selecting, based on said selected virtual capacity value, a vector of clock frequency values for each machine from said set o of 1 vectors, so as to optimize a multi-target performance index (J), and then setting the clock frequency of each machine in the cluste

    Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources

    Full text link
    The use of Artificial Intelligence (AI) to support cybersecurity operations is now a consolidated practice, e.g., to detect malicious code or configure traffic filtering policies. The recent surge of AI, generative techniques and frameworks with efficient natural language processing capabilities dramatically magnifies the number of possible applications aimed at increasing the security of the Internet. Specifically, the ability of ChatGPT to produce textual contents while mimicking realistic human interactions can be used to mitigate the plague of emails containing scams. Therefore, this paper investigates the use of AI to engage scammers in automatized and pointless communications, with the goal of wasting both their time and resources. Preliminary results showcase that ChatGPT is able to decoy scammers, thus confirming that AI is an effective tool to counteract threats delivered via mail. In addition, we highlight the multitude of implications and open research questions to be addressed in the perspective of the ubiquitous adoption of AI

    Using SIP as P2P Technology

    Full text link
    Nowadays peer-to-peer (p2p) technologies are widely adopted and used for building even more sophisticated services: from ubiquitous file-sharing systems to the even more popular Internet telephony. In addition, the Session Initiation Protocol (SIP) has been used for different purposes. Due to its intrinsic generality and flexibility, it could be adopted to build and manage also p2p applications. Moreover, the p2p philosophy could be applied to the existing SIP architecture, to cope with issues such as Denial of Service (DoS). In this paper, we survey the state of the art of the joint use of p2p and SIP. Some hints and examples in using SIP as a core technological component of the p2p world are also presented

    Smart e-Learning Systems with Big Data

    Get PDF
    Nowadays, the Internet connects people, multimedia and physical objects leading to a new-wave of services. This includes learning applications, which require to manage huge and mixed volumes of information coming from Web and social media, smart-cities and Internet of Things nodes. Unfortunately, designing smart e-learning systems able to take advantage of such a complex technological space raises different challenges. In this perspective, this paper introduces a reference architecture for the development of future and big-data-capable e-learning platforms. Also, it showcases how data can be used to enrich the learning process

    Programmable data gathering for detecting stegomalware

    Get PDF
    The 'arm race' against malware developers requires to collect a wide variety of performance measurements, for instance to face threats leveraging information hiding and steganography. Unfortunately, this process could be time-consuming, lack of scalability and cause performance degradations within computing and network nodes. Moreover, since the detection of steganographic threats is poorly generalizable, being able to collect attack-independent indicators is of prime importance. To this aim, the paper proposes to take advantage of the extended Berkeley Packet Filter to gather data for detecting stegomalware. To prove the effectiveness of the approach, it also reports some preliminary experimental results obtained as the joint outcome of two H2020 Projects, namely ASTRID and SIMARGL
    corecore