Roberto Canonico

Learn More
TBCP is a generic Tree Building Control Protocol designed to build overlay spanning trees among participants of a multicast session, without any specific help from the network routers. TBCP therefore falls into the general category of protocols and mechanisms often referred to as Application-Level Multicasting. TBCP is an efficient, distributed protocol(More)
The success of the Cloud Computing paradigm may be jeopardized by concerns about the risk of misuse of this model aimed at conducting illegal activities. In this paper we address the issue of detecting Denial of Service attacks performed by means of resources acquired on-demand on a Cloud Computing platform. To this purpose, we propose to investigate the(More)
Denial of Service (DoS ) attacks represent, in today’s Internet, one of the most complex issues to address. In this paper we present a novel approach to deal with Distributed DoS (DDoS ) attacks in the Internet. We propose a model for an Active Security System, comprising a number of components that actively cooperate in order to effectively react to a wide(More)
To tackle an inherent security weakness of wireless environments, we propose the implementation of a reputation procedure onto the routing protocol Ad-hoc On Demand Vector routing (AODV). This procedure relies on the overal cooperation of nodes taking part to the Wireless Mesh Network. Each node associates a reputation value to its neighbours, which(More)
Ubiquitous network access allows people to access an ever increasing range of services from a variety of mobile terminals, including laptops, tablets and smartphones. A flexible and economically efficient way of provisioning such services is through Cloud Computing. Assuming that several cloud-enabled datacenters are made available at the edges of the(More)
This paper presents a work in progress which deals with the important and unresolved problem of node misbehavior. A realistic approach is used to determine the impact of contention window manipulation on IEEE 802.11e ad-hoc networks. It is explained why such networks are more prone to misbehavior. Novel results pertaining to the 802.11e standard are(More)
Wireless mesh networks (WMNs) based on the IEEE 802.11 standard are becoming increasingly popular as a viable alternative to wired networks. WMNs can cover large or difficult to reach areas with low deployment and management costs. Several multi-path routing algorithms have been proposed for such kind of networks with the objective of load balancing the(More)
The continuous increase of computational power has made viable the implementation of more and more sophisticated virtualization techniques. The use of virtualization in cluster environments to build on-demand computing infrastructures is a recent trend with a great potential. Clusterbased network emulators are a specific class of clusterbased systems whose(More)