Gabriele Monti

Learn More
Network intrusion detection is a key security issue that can be tackled by means of different approaches. This paper describes a novel methodology for network attack detection based on the use of data mining techniques to process traffic information collected by a monitoring station from a set of hosts using the Simple Network Management Protocol (SNMP).(More)
Peer-to-Peer (P2P) systems share and manage huge amounts of data and resources distributed across a large number of machines. In pure P2P environments the control is totally decentralized in peers, which are autonomous, perform the same roles and do not have a global view of the entire system. Several P2P solutions have been deployed and proposed in(More)
—Large scale wireless ad-hoc networks of computers , sensors, PDAs etc. (i.e. nodes) are revolutionizing connectivity and leading to a paradigm shift from centralized systems to highly distributed and dynamic environments. A plethora of routing algorithms have been proposed for the network path discovery ranging from broadcasting/flooding-based approaches(More)
—Large scale wireless ad-hoc networks of computers , sensors, PDAs etc. (i.e. nodes) are revolutionizing connectivity and leading to a paradigm shift from centralized systems to highly distributed systems. A plethora of routing algorithms have been proposed to support path discovery into this class of networks, ranging from broadcasting/flooding approaches(More)
  • 1