Marco Leogrande

Learn More
—While in computer networks the number of possible protocol encapsulations is growing day after day, network administrators face ever increasing difficulties in selecting accurately the traffic they need to inspect. This is mainly caused by the limited number of encapsulations supported by currently available tools and the difficulty to exactly specify(More)
Monitoring technologies leveraging on heterogeneous sensor networks are becoming increasingly important in almost every application scenario where pervasive data collection is needed. In current sensor networks deployments, many low-level protocols and functions details dependent on used network technology are explicitly handled at application level, in a(More)
Designing an efficient and scalable packet filter for modern computer networks becomes more challenging each day: Faster link speeds, the steady increase in the number of encapsulation rules (e.g., tunneling), and the necessity to precisely isolate a given subset of traffic cause filtering expressions to become more complex than in the past. Most current(More)
Cloud Management Systems (CMS) such as Open Stack are commonly used to manage IT resources such as computing and storage in large data enters. Recently, CMS are starting to offer customers also the possibility to customize their network infrastructure, allowing each tenant to build his virtual network made of elementary blocks such as traffic monitors,(More)
Packet filtering is a technology at the foundation of many traffic analysis tasks. While languages and tools for packet filtering have been available for many years, none of them supports filters operating on the encapsulation relationships found in each packet. This represents a problem as the number of possible encapsulations used to transport traffic is(More)
  • Szakdolgozat téma, Mély csomagvizsgálat, +16 authors Chengchen Hu
  • 2012
Deep Packet Inspection with Automata Napjainkban a hálózati alkalmazások számának, forgalmánakés a hálózat sebességének növekedése egyre hatékonyabb biztosnági eszközök használatát teszi szükségessé. Erre a célra többek között t˝ uzfalakat, hálózati behatolástészlel˝ o ´ es behatolásvédelmi rend-szereket (Intrusion Detection/Prevention Systems) alkalmazunk.(More)
Network virtualization has gained a lot of attention recently, because of some new interesting proposals in the field (i.e. Open Flow). This trend has had the effect of pushing some filtering operations up at the software level: i.e. extract a potentially large number of protocol fields from a packet, or dynamically combine different filters. The time(More)
  • 1