Learn More
TBCP is a generic Tree Building Control Protocol designed to build overlay spanning trees among participants of a multicast session, without any specific help from the network routers. TBCP therefore falls into the general category of protocols and mechanisms often referred to as Application-Level Multicasting. TBCP is an efficient, distributed protocol(More)
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse of this model aimed at conducting illegal activities. In this paper we address the issue of detecting Denial of Service attacks performed by means of resources acquired on-demand on a Cloud Computing platform. To this purpose, we propose to investigate the(More)
Ubiquitous network access allows people to access an ever increasing range of services from a variety of mobile terminals, including laptops, tablets and smartphones. A flexible and economically efficient way of provisioning such services is through Cloud Computing. Assuming that several cloud-enabled datacenters are made available at the edges of the(More)
In this paper, we suggest the use of the chi-square test for detecting backoff misbehaviour in IEEE 802.11 EDCA networks. A performance evaluation is performed to compare the chi-square test with two other methods, known in the literature. To perform a suitable comparison, these two methods are extended to support EDCA and the BEB mechanism. We assume a(More)
Denial of Service (DoS) attacks represent, in today's Internet, one of the most complex issues to address. In this paper we present a novel approach to deal with Distributed DoS (DDoS) attacks in the Internet. We propose a model for an Active Security System, comprising a number of components that actively cooperate in order to effectively react to a wide(More)
The continuous increase of computational power has made viable the implementation of more and more sophisticated virtualization techniques. The use of virtualization in cluster environments to build on-demand computing infrastructures is a recent trend with a great potential. Cluster-based network emulators are a specific class of cluster-based systems(More)
This paper presents a work in progress which deals with the important and unresolved problem of node misbehavior. A realistic approach is used to determine the impact of contention window manipulation on IEEE 802.11e ad-hoc networks. It is explained why such networks are more prone to misbehavior. Novel results pertaining to the 802.11e standard are(More)
In many areas of ICT the use of virtualization techniques has decoupled the binding between physical resources and functional roles assigned to them. While the use of virtualization in computing systems is already extremely popular, similar forms of virtualization have been proposed for the network infrastructure as well. In such a context, we propose a new(More)
The emerging Network Function Virtualization paradigm (NFV) is a disruptive change that creates new business opportunities for vendors and carriers. By exploiting virtualization technologies, it allows the dynamic creation of logically isolated infrastructures over abstracted physical networks. To be able to offer Virtualized Services efficiently, service(More)