Gabriele Monti

Learn More
Network intrusion detection is a key security issue that can be tackled by means of different approaches. This paper describes a novel methodology for network attack detection based on the use of data mining techniques to process traffic information collected by a monitoring station from a set of hosts using the Simple Network Management Protocol (SNMP).(More)
Sensor networks are usually composed by spatially distributed devices able to monitor physical or environmental conditions (pressure, temperature, motion, etc.). This kind of networks were originally built with the idea of transmitting elementary information to external sinks for further processing and querying. Nowadays, the growth of sensors memory and(More)
Large scale wireless ad-hoc networks of computers, sensors, PDAs etc. (i.e. nodes) are revolutionizing connectivity and leading to a paradigm shift from centralized systems to highly distributed and dynamic environments. A plethora of routing algorithms have been proposed for the network path discovery ranging from broadcasting/flooding-based approaches to(More)
Peer-to-Peer (P2P) systems share and manage huge amounts of data and resources distributed across a large number of machines. In pure P2P environments the control is totally decentralized in peers, which are autonomous, perform the same roles and do not have a global view of the entire system. Several P2P solutions have been deployed and proposed in(More)
—Large scale wireless ad-hoc networks of computers , sensors, PDAs etc. (i.e. nodes) are revolutionizing connectivity and leading to a paradigm shift from centralized systems to highly distributed systems. A plethora of routing algorithms have been proposed to support path discovery into this class of networks, ranging from broadcasting/flooding approaches(More)
Sensor networks are usually composed by small units able to sense and transmit to a sink elementary data which are successively processed by an external machine. However recent improvements in the memory and computational power of sensors, together with the reduction of energy consumptions, are rapidly changing the potential of such systems, moving the(More)
The work presents a decentralized protocol that allows self-organization of autonomous wireless devices in mobile mesh networks. In the resulting infrastructure the routing and information services are provided in a peer-to- peer fashion. Both services are performed through multi- hop radio transmissions among participant nodes with no fixed infrastructure(More)
In this paper we present WPA-GPG, a modification on WPA-PSK wireless authentication protocol that allows a wireless station to access a protected network using a GnuPG public key. GnuPG, (GPG) short for GnU Privacy Guard, is a complete, multi-platform and open source implementation of the OpenPGP standard as defined by RFC4880. Like WPA-PSK, WPA-GPG is(More)