Fabio Maino

Learn More
— The TCP/IP suite, the basis for today's Inter-net, lacks even the most basic mechanisms of authentication. As usage of the Internet increases, its scarcity of built-in security becomes more and more problematic. This paper describes serious attacks against IP control and management protocols with an accent on the ICMP protocol, as well as some of the(More)
Storage Area Networks, with their ability to offer high data availability, reliability and scalability, are a promising solution for the large scale storage needs of many enterprises. As with any distributed storage system, a major design challenge for a Storage Area Network (SAN) is to provide data integrity and confidentiality. In this paper, we propose a(More)
The current Internet architecture was not designed to easily accommodate mobility because IP addresses are used both to identify and locate hosts. The Locator/Identifier Separation Protocol (LISP) decouples them by considering two types of addresses: EIDs that identify hosts, and RLOCs that identify network attachment points and are used as routing(More)
—This paper presents Lcast, a scalable network-layer single-source multicast framework. Lcast builds a router overlay for inter-domain content distribution and interfaces with intra-domain multicast for seamless interaction with end-hosts. The architecture is built as an extension of the Locator/ID Separation Protocol (LISP), a proposed scalable Internet(More)
— The present article is an overview of the security problems affecting the Domain Name System and also of the solutions developed throughout the last years in order to provide a better, trustworthy and safer name resolution protocol for the expanding Internet community of present days. The paper discusses the basic notions regarding DNS and introduces the(More)
—The research community has considered in the past the application of Artificial Intelligence (AI) techniques to control and operate networks. A notable example is the Knowledge Plane proposed by D.Clark et al. However, such techniques have not been extensively prototyped or deployed in the field yet. In this paper, we explore the reasons for the lack of(More)
—Secret sharing is important in information and network security and has broad applications in the real world. Since an elegant secret sharing mechanism was first proposed by Shamir in 1979, many schemes have appeared in literature. These schemes deal with either single or multiple secrets and their shares have either the same weight or different weights.(More)