42 research outputs found

    On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives

    Get PDF
    Blockchain (BC) and software-defined networking (SDN) are leading technologies which have recently found applications in several network-related scenarios and have consequently experienced a growing interest in the research community. Indeed, current networks connect a massive number of objects over the Internet and in this complex scenario, to ensure security, privacy, confidentiality, and programmability, the utilization of BC and SDN have been successfully proposed. In this work, we provide a comprehensive survey regarding these two recent research trends and review the related state-of-the-art literature. We first describe the main features of each technology and discuss their most common and used variants. Furthermore, we envision the integration of such technologies to jointly take advantage of these latter efficiently. Indeed, we consider their group-wise utilization—named BC–SDN—based on the need for stronger security and privacy. Additionally, we cover the application fields of these technologies both individually and combined. Finally, we discuss the open issues of reviewed research and describe potential directions for future avenues regarding the integration of BC and SDN. To summarize, the contribution of the present survey spans from an overview of the literature background on BC and SDN to the discussion of the benefits and limitations of BC–SDN integration in different fields, which also raises open challenges and possible future avenues examined herein. To the best of our knowledge, compared to existing surveys, this is the first work that analyzes the aforementioned aspects in light of a broad BC–SDN integration, with a specific focus on security and privacy issues in actual utilization scenarios

    Non-B HIV type 1 subtypes among men who have sex with men in Rome, Italy

    Get PDF
    An increase in the circulation of HIV-1 non-B subtypes has been observed in recent years in Western European countries. Due to the lack of data on the circulation of HIV-1 non-B subtypes among European HIV-1-infected men who have sex with men (MSM), a biomolecular study was conducted in Rome, Italy. HIV-1 partial pol gene sequences from 111 MSM individuals (76 drug naive and 35 drug experienced) were collected during the years 2004-2006. All these sequences were analyzed using the REGA HIV-1 Subtyping Tool, and aligned using CLUSTAL X followed by manual editing using the Bioedit software. A BLAST search for non-B subtype sequences was also performed. Twenty-six (23.4%) MSM were not Italians. Eight individuals (7.2%) were diagnosed as HIV infected before 1991, 20 (18.0%) between 1991 and 1999, and 83 (74.8%) from 2000 to 2006. Fifteen (15/111, 13.5%) individuals were infected with the non-B subtype. The percentage of infection with HIV-1 non-B subtypes was 8.2% (7/85) among Italian MSM and 30.8% (8/26) among the non-Italians (OR = 4.95 95% IC: 1.40-17.87). Individuals infected with the non-B subtype were significantly younger than those infected with the HIV-1 B subtype (28 years vs. 34 years, p = 0.003). The CRFs were more prevalent (8.1%) than pure subtypes (5.4%), which were distributed as follows: subtype C (2.6%), subtype A1 (1.7%), and subtype F1 (0.9%). Major mutations conferring resistance to antiretroviral drugs (ARV) were not found among HIV-1 non-B subtype drug-naive patients but were found in two ARV-experienced individuals. The data show that viral diversity is likely increasing in a population group that had been previously characterized by the circulation of HIV-1 subtype B. © Copyright 2009, Mary Ann Liebert, Inc

    Positive Selection Results in Frequent Reversible Amino Acid Replacements in the G Protein Gene of Human Respiratory Syncytial Virus

    Get PDF
    Human respiratory syncytial virus (HRSV) is the major cause of lower respiratory tract infections in children under 5 years of age and the elderly, causing annual disease outbreaks during the fall and winter. Multiple lineages of the HRSVA and HRSVB serotypes co-circulate within a single outbreak and display a strongly temporal pattern of genetic variation, with a replacement of dominant genotypes occurring during consecutive years. In the present study we utilized phylogenetic methods to detect and map sites subject to adaptive evolution in the G protein of HRSVA and HRSVB. A total of 29 and 23 amino acid sites were found to be putatively positively selected in HRSVA and HRSVB, respectively. Several of these sites defined genotypes and lineages within genotypes in both groups, and correlated well with epitopes previously described in group A. Remarkably, 18 of these positively selected tended to revert in time to a previous codon state, producing a “flip-flop” phylogenetic pattern. Such frequent evolutionary reversals in HRSV are indicative of a combination of frequent positive selection, reflecting the changing immune status of the human population, and a limited repertoire of functionally viable amino acids at specific amino acid sites

    Internet censorship in Italy: An analysis of 3G/4G networks

    No full text

    Encrypted Multitask Traffic Classification via Multimodal Deep Learning

    No full text
    Traffic Classification (TC), i.e. the collection of procedures for inferring applications and/or services generating network traffic, represents the workhorse for service management and the enabler for valuable profiling information. Sadly, the growing trend toward encrypted protocols (e.g. TLS) and the evolving nature of network traffic make TC design solutions based on payload-inspection and machine learning, respectively, unsuitable. Conversely, Deep Learning (DL) is currently foreseen as a viable means to design traffic classifiers based on automatically-extracted features, reflecting the complex patterns distilled from the multifaceted (encrypted) traffic nature, implicitly carrying information in multimodal fashion. To this end, in this paper a novel multimodal DL approach for multitask TC is explored. The latter is able to capitalize traffic data heterogeneity (by learning both intra- and inter-modality dependencies), overcome performance limitations of existing (myopic) single-modality DL-based TC proposals, and solve different traffic categorization problems associated with different providers' desiderata. Based on a real dataset of encrypted traffic, we report performance gains of our proposal over (a) state-of-art multitask DL architectures and (b) multitask extensions of single-task DL baselines (both based on single-modality philosophy)

    Unveiling MIMETIC: Interpreting deep learning traffic classifiers via XAI techniques

    No full text
    The widespread use of powerful mobile devices has deeply affected the mix of traffic traversing both the Internet and enterprise networks (with bring-your-own-device policies). Traffic encryption has become extremely common, and the quick proliferation of mobile apps and their simple distribution and update have created a specifically challenging scenario for traffic classification and its uses, especially network-security related ones. The recent rise of Deep Learning (DL) has responded to this challenge, by providing a solution to the time-consuming and human-limited handcrafted feature design, and better clas-sification performance. The counterpart of the advantages is the lack of interpretability of these black-box approaches, limiting or preventing their adoption in contexts where the reliability of results, or interpretability of polices is necessary. To cope with these limitations, eXplainable Artificial Intelligence (XAI) techniques have seen recent intensive research. Along these lines, our work applies XAI-based techniques (namely, Deep SHAP) to interpret the behavior of a state-of-the-art multimodal DL traffic classifier. As opposed to common results seen in XAI, we aim at a global interpretation, rather than sample-based ones. The results quantify the importance of each modality (payload- or header-based), and of specific subsets of inputs (e.g., TLS SNI and TCP Window Size) in determining the classification outcome, down to per-class (viz. application) level. The analysis is based on a publicly-released recent dataset focused on mobile app traffic

    A Comparison of Machine and Deep Learning Models for Detection and Classification of Android Malware Traffic

    No full text
    With the increasing popularity of mobile-app services, malicious software is increasing as well. Accordingly, the interest of the scientific community in Machine and Deep Learning solutions for detecting and classifying malware traffic is growing. In this work, we provide a fair assessment of the performance of a number of data-driven strategies to detect and classify Android malware traffic. Three models are taken into account (Decision Tree, Random Forest, and 1-D Convolutional Neural Network) considering both flat (i.e. non-hierarchical) and hierarchical approaches. The experimental analysis performed using a state-of-art dataset (CIC-AAGM2017) reports that Random Forest exhibits the best performance in a flat setup, while moving to a hierarchical approach could cause significant variation in precision and recall. Such results push for further investigating advanced hierarchical setups and learning schemes
    corecore