Francesco Palmieri | University of Salerno (original) (raw)

Papers by Francesco Palmieri

Research paper thumbnail of Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility

Lecture Notes in Computer Science, 2003

... ing the e net-igrate the current -based it has ... and traffic engineering delivers the QoS t... more ... ing the e net-igrate the current -based it has ... and traffic engineering delivers the QoS that is re-quired to support Conversational, Streaming, and Interactive traffic, something ... The access have been properly located in our plant to obtain two semi-adjacent coverag with no overlap ...

Research paper thumbnail of An energy-aware dynamic RWA framework for next-generation wavelength-routed networks

Power demand in networking equipment is expected to become a main limiting factor and hence a fun... more Power demand in networking equipment is expected to become a main limiting factor and hence a fundamental challenge to ensure bandwidth scaling in the next generation Internet. Environmental effects of human activities, such as CO 2 emissions and the consequent global warming have risen as one of the major issue for the ICT sector and for the society. Therefore, it is not surprising that telecom operators are devoting much of their efforts to the reduction of energy consumption and of the related CO 2 emissions of their network infrastructures. In this work, we present a novel integrated routing and wavelength assignment framework that, while addressing the traditional network management objectives, introduces energy-awareness in its decision process to contain the power consumption of the underlying network infrastructure and make use of green energy sources wherever possible. This approach results in direct power, cost and CO 2 emissions savings in the short term, as demonstrated by our extensive simulation studies. with honors). He worked with the Federico II University and with the Italian National Institute for Nuclear Physics (INFN) within several national and international projects. His research interests are mainly focused on energy-aware RWA algorithms and protocols for telecommunication networks and energy-oriented optimizations for grid/cloud computing.

Research paper thumbnail of A nonlinear, recurrence-based approach to traffic classification

The ability to accurately classify and identify the network traffic associated with different app... more The ability to accurately classify and identify the network traffic associated with different applications is a central issue for many network operation and research topics including Quality of Service enforcement, traffic engineering, security, monitoring and intrusiondetection. However, traditional classification approaches for traffic to higher-level application mapping, such as those based on port or payload analysis, are highly inaccurate for many emerging applications and hence useless in actual networks. This paper presents a recurrence plot-based traffic classification approach based on the analysis of non-stationary ''hidden" transition patterns of IP traffic flows. Such nonlinear properties cannot be affected by payload encryption or dynamic port change and hence cannot be easily masqueraded. In performing a quantitative assessment of the above transition patterns, we used recurrence quantification analysis, a nonlinear technique widely used in many fields of science to discover the time correlations and the hidden dynamics of statistical time series. Our model proved to be effective for providing a deterministic interpretation of recurrence patterns derived by complex protocol dynamics in end-to-end traffic flows, and hence for developing qualitative and quantitative observations that can be reliably used in traffic classification.

Research paper thumbnail of Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam

Lecture Notes in Computer Science, 2005

With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a m... more With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates inconveniences for sites that have been used as a relay. This seems to be a growing problem, and without appropriate countermeasures, spam messages could eventually undermine the usability of e-mail. In this paper, we propose a cooperative spam-avoidance strategy based on the concept of restricting, at the network border and mail relay level, the mail sending function through properly authorized mail gateways registered as proper new Resource Records in the DNS System. If accepted and enforced by the largest number possible of network and mail administrators on the Internet, this strategy may result in a substantial reduction of the worldwide e-mail spam phenomenon.

Research paper thumbnail of EASyCoSe 2013

Research paper thumbnail of Guest Editorial: Special Issue on Advances in Security and Privacy in Sensor Networks

Research paper thumbnail of Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness

Research paper thumbnail of Multimedia-based battery drain attacks for Android devices

ABSTRACT People using smartphones to connect to the Internet for day-life activities has overtake... more ABSTRACT People using smartphones to connect to the Internet for day-life activities has overtaken the number of people using canonical PCs. This lead to a huge quantity of security threats that usually tend to penetrate the defenses of a smartphone in order to gain control of its resources. Differently, energy-based attacks have the objective of increasing the energy consumption of the victim device. It is important to highlight that this objective could be possibly achieved by just activating the system's defenses as a consequence of canonical attacks and letting the system defenses detect and (try to) defeat them. These activities consume additional energy and could led the mobile device to its complete uselessness. In this paper, an energy-based attack based on soliciting hardware-level encoding/decoding functions through properly crafted multimedia files is analyzed and its impact evaluated. Such kind of attacks are performed without accessing the device by taking advantage of the new HTML5 functionalities. A series of experiments have been performed in order to understand which are the codecs that have a more relevant impact on energy consumption, and, as a consequence, that make the attack more effective.

Research paper thumbnail of Advances in Security and Privacy in Sensor Networks

Research paper thumbnail of Modeling security requirements for cloud‐based system development

The Cloud Computing paradigm provides a new model for the more flexible utilization of computing ... more The Cloud Computing paradigm provides a new model for the more flexible utilization of computing and storage services. However, such enhanced flexibility, that implies outsourcing the data and business applications to a third party, may introduce critical security issues. Therefore, there is a clear necessity of new security paradigms able to face with all the problems introduced by the cloud approach. Although, in the last years, several solutions have been proposed, the implementation of secure cloud applications and services is still a complex and far from consolidated task. Starting from these considerations, this work fosters the development of a methodology that considers security concerns as an integral part of cloudbased applications design and implementation. Accordingly, we present a set of stereotypes that defines a vocabulary for annotating UML-based models with information relevant for integrating the specification of security requirements into cloud architectures. This approach can be used to significantly improve productivity and overall success in the development of secure distributed cloud applications and systems. The final publication is available at: . Prepared using cpeauth.cls [Version: 2010/05/13 v3.00] 2 M. FICCO ET AL.

Research paper thumbnail of Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures

This work analyzes a new and very subtle kind of security threat that can affect large scale clou... more This work analyzes a new and very subtle kind of security threat that can affect large scale cloudbased IT service infrastructures, by exploiting the computational resources of their component data center in order to waste as much energy as possible. The consequence of these threats range from increased costs in the energy bill, to penalization for exceeding the agreed quantity of green house gases (GHG) emissions, up to complete denial of service caused by electrical outages due to power budget exhaustion.

Research paper thumbnail of Text compression and encryption through smart devices for mobile communication

Research paper thumbnail of Secure and distributed video surveillance via portable devices

ABSTRACT In this work we present a system for distributed video surveillance based on the Client-... more ABSTRACT In this work we present a system for distributed video surveillance based on the Client-Server model. The system we present can be accessed via portable devices. In many real-world scenarios is useful, or sometimes necessary, to have portable devices that can receive real-time data from a selected camera, to prevent or to manage anomalous activities. The system provides reliable, high speed, secure and real-time communication among all its components, which are the Repository, the Node and the Portable Device. Both Repository and Node can act as a server. The Repository can provide services to both Nodes and Portable Devices, while the Nodes provide services only to the Portable Device. The portable device can only act as a client, using the services offered by the other two parts. In our system, a portable device is assumed to know only the location of the Repository which permits to get the list of nodes connected with one or more camera(s). When a portable device gets the list, it can choose which node intends to connect to, to get the images of its connected camera(s). The security of the interaction among Node-Repository and Node-Portable Device is guaranteed by using the SSL/TLS protocol. The interaction among nodes and portable devices is secured by using an invisible digital watermarking algorithm on each image, before that image is sent from a node to a portable device. The latter extracts the watermark from the image and verifies the identity of the node.

Research paper thumbnail of An energy-aware framework for reliable and secure end-to-end ubiquitous data communications

ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi cover... more ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life activities, it is still an open question. In particular, security becomes a key factor in such a scenario, since a large number of mobile terminal devices (smartphones, handhelds, tablets) simultaneously supporting multiple networking technologies, may be used to store, access, manipulate, or communicate sensitive data from everywhere and at any time. However, the computational efforts required for achieving security, due to the inherent complexity of cryptographic algorithms, heavily affect the power consumption of the involved terminals. Such energy demand, together with the amount of power already required to manage the communication activities carried out by using multiple network interfaces, make energy efficient secure communication among mobile hardware-constrained handheld devices, a really challenging topic. Based on above considerations, we present the architecture of a framework which enables secure end-to-end and reliable data transfer for heterogeneous mobile terminals by also describing and modeling its power demand, with the aim of achieving a robust and reliable ubiquitous data transfer service also minimizing the overall battery consumption in such devices.

Research paper thumbnail of A botnet-based command and control approach relying on swarm intelligence

ABSTRACT Survivability and scalability are the main emerging challenges in command and control of... more ABSTRACT Survivability and scalability are the main emerging challenges in command and control of ubiquitous networked entities operating in untrusted communication scenarios, due to the increasing sophistication of the detection and mitigation/defeating techniques together with the increasing number of elements to be controlled and their distribution over multiple heterogeneous communication infrastructures. Accordingly, this work focuses on a new more robust and scalable botnet-based command and control architecture, aiming at wiping off any rigid master-slave relationship and autonomizing the bot operating roles, with significant agility gains in the whole overlay communication infrastructure. It relies on swarm intelligence and in particular on stigmergic communication, ensuring spontaneous, implicit coordination and collaboration among the independent bot agents. The resulting architecture presents improved fault tolerance and dynamic adaptation to varying network conditions, by propagating control messages to any bot node through multiple short-range hops structured according to a dynamically built Degree Constrained Minimum Spanning Tree, whose distributed calculation is inspired to ant colony's foraging behavior. For this reason, it may constitute the basis for an evolutionary malware-based control and management scheme that can be used in several homeland security/defense scenarios where the botnet technology may be used as a support tool in strategic military or intelligence operations.

Research paper thumbnail of Towards service orchestration between smart grids and telecom networks

In the last years, the research efforts in smart grids (SG) and telecommunication networks (TN) h... more In the last years, the research efforts in smart grids (SG) and telecommunication networks (TN) have been considerable but never converged to a common view and, due to the lack of strong interactions between the two worlds, only limited benefits have been achieved. We envision in this paper that future TN (as well as any other ICT application) will interact with the SG, enabling (1) the TN to know the energy source and cost that is currently powering its equipment, (2) to turn the TN into an active client which can request to the SG the quantity and quality (e.g. green) of energy that it needs, and (3) a service orchestration between SG supply system and TN operations. As a consequence, the enabled interoperability between TN and SG would allow TN to take energy-aware management decisions in function of energyrelated information provided by the SG. For example, TN can route packets with the objective of optimizing green criteria, while SG can route the energy towards the TN clients with the objective of not wasting surpluses of green energy. These new energy and data routing capabilities can be exploited not only by SG operators and telecom carriers but also by any energy consumer/ producer within the ICT world. This may include industry and institutional ICT premises, datacenters, home automation, wireless and mobile cellular networks, which will be able to implement their own energy-aware management and operations (M&O) by considering the quantity, quality and cost of the energy currently provided by the smart grid.

Research paper thumbnail of Evaluating energy savings in WoL-enabled networks of PCs

2013 IEEE International Symposium on Industrial Electronics, 2013

ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging th... more ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure power management capabilities for local or remote IP-based networks of personal computers (PCs). We also present a lightweight web-based platform implementing the remote management interface as less intrusively as possible. Finally, we model the mathematical saving functions to be used in order to evaluate through simulation the amount of potential energy savings, and hence the whole framework effectiveness, both in the general case and in a real case scenario. Results show that significant savings are achievable provided that the hardware supports the Wake-on-LAN specifications and that proper configuration of the Web server is set-up, allowing the WoL magic packet to travel to the destination hosts and wake them up only when they are really needed.

Research paper thumbnail of A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing

Knowledge-Based Systems, 2014

Big Data Analytics is considered an imperative aspect to be further improved in order to increase... more Big Data Analytics is considered an imperative aspect to be further improved in order to increase 11 the operating margin of both public and private enterprises, and represents the next frontier for their 12 innovation, competition, and productivity. Big Data are typically produced in different sectors of the above 13 organizations, often geographically distributed throughout the world, and are characterized by a large size 14 and variety. Therefore, there is a strong need for platforms handling larger and larger amounts of data, and dealing with the various issues related to efficiently disseminating and processing them according to the 16 well-known MapReduce paradigm. In such scenario, this work proposes a way to overcome two fundamental 17 issues: data heterogeneity and advanced processing capabilities. We present a Knowledge-based solution for 18 big data analytics, which consists in applying automatic schema mapping to face with data heterogeneity, as 19 well as ontology extraction and semantic inference to support innovative processing. Such a solution, based 20 on the publish/subscribe paradigm, has been evaluated within the context of a simple experimental proof 21 of concept in order to determine its performance and effectiveness. 22

Research paper thumbnail of An energy-aware engineered control plane for wavelength-routed networks

Transactions on Emerging Telecommunications Technologies, 2014

ABSTRACT Despite the significant degree of technological maturity reached by large-scale optical ... more ABSTRACT Despite the significant degree of technological maturity reached by large-scale optical transmission infrastructures, new critical issues are emerging as side effects associated to their energy consumption, environmental impact and related costs, now accounting for an important part of the networks’ operational expenditures. To face this problem, we propose a single-stage routing and wavelength assignment scheme, based on several network engineering extensions to the Generalised Multi-Protocol Label Switching (GMPLS) control plane protocols, mainly Open Shortest Path First, with new composed metrics and information transport facilities. It is structured according to a simple multi-objective optimisation approach aiming at containing the network's energy consumption and ecological impact while balancing the overall load and maintaining an acceptable connection demand satisfaction rate. The proposed solution is able to operate effectively in wide area wavelength routing scenarios, where multiple heterogeneous equipment, ranging from pure photonic to opaque routing/switching, amplification and regeneration devices are deployed in a GMPLS-empowered network. Copyright © 2014 John Wiley & Sons, Ltd.

Research paper thumbnail of A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems

International Journal of Parallel Programming, 2013

ABSTRACT Big Data processing architectures are now widely recognized as one of the most significa... more ABSTRACT Big Data processing architectures are now widely recognized as one of the most significant innovations in Computing in the last decade. Their enormous potential in collecting and processing huge volumes of data scattered throughout the Internet is opening the door to a new generation of fully distributed applications that, by leveraging the large amount of resources available on the network will be able to cope with very complex problems achieving performances never seen before. However, the Internet is known to have severe scalability limitations in moving very large quantities of data, and such limitations introduce the challenge of making efficient use of the computing and storage resources available on the network, in order to enable data-intensive applications to be executed effectively in such a complex distributed environment. This implies resource scheduling decisions which drive the execution of task towards the data by taking network load and capacity into consideration to maximize data access performance and reduce queueing and processing delays as possible. Accordingly, this work presents a data-centric meta-scheduling scheme for fully distributed Big Data processing architectures based on clustering techniques whose goal is aggregating tasks around storage repositories and driven by a new concept of “gravitational” attraction between the tasks and their data of interest. This scheme will benefit from heuristic criteria based on network awareness and advance resource reservation in order to suppress long delays in data transfer operations and result into an optimized use of data storage and runtime resources at the expense of a limited (polynomial) computational complexity.

Research paper thumbnail of Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility

Lecture Notes in Computer Science, 2003

... ing the e net-igrate the current -based it has ... and traffic engineering delivers the QoS t... more ... ing the e net-igrate the current -based it has ... and traffic engineering delivers the QoS that is re-quired to support Conversational, Streaming, and Interactive traffic, something ... The access have been properly located in our plant to obtain two semi-adjacent coverag with no overlap ...

Research paper thumbnail of An energy-aware dynamic RWA framework for next-generation wavelength-routed networks

Power demand in networking equipment is expected to become a main limiting factor and hence a fun... more Power demand in networking equipment is expected to become a main limiting factor and hence a fundamental challenge to ensure bandwidth scaling in the next generation Internet. Environmental effects of human activities, such as CO 2 emissions and the consequent global warming have risen as one of the major issue for the ICT sector and for the society. Therefore, it is not surprising that telecom operators are devoting much of their efforts to the reduction of energy consumption and of the related CO 2 emissions of their network infrastructures. In this work, we present a novel integrated routing and wavelength assignment framework that, while addressing the traditional network management objectives, introduces energy-awareness in its decision process to contain the power consumption of the underlying network infrastructure and make use of green energy sources wherever possible. This approach results in direct power, cost and CO 2 emissions savings in the short term, as demonstrated by our extensive simulation studies. with honors). He worked with the Federico II University and with the Italian National Institute for Nuclear Physics (INFN) within several national and international projects. His research interests are mainly focused on energy-aware RWA algorithms and protocols for telecommunication networks and energy-oriented optimizations for grid/cloud computing.

Research paper thumbnail of A nonlinear, recurrence-based approach to traffic classification

The ability to accurately classify and identify the network traffic associated with different app... more The ability to accurately classify and identify the network traffic associated with different applications is a central issue for many network operation and research topics including Quality of Service enforcement, traffic engineering, security, monitoring and intrusiondetection. However, traditional classification approaches for traffic to higher-level application mapping, such as those based on port or payload analysis, are highly inaccurate for many emerging applications and hence useless in actual networks. This paper presents a recurrence plot-based traffic classification approach based on the analysis of non-stationary ''hidden" transition patterns of IP traffic flows. Such nonlinear properties cannot be affected by payload encryption or dynamic port change and hence cannot be easily masqueraded. In performing a quantitative assessment of the above transition patterns, we used recurrence quantification analysis, a nonlinear technique widely used in many fields of science to discover the time correlations and the hidden dynamics of statistical time series. Our model proved to be effective for providing a deterministic interpretation of recurrence patterns derived by complex protocol dynamics in end-to-end traffic flows, and hence for developing qualitative and quantitative observations that can be reliably used in traffic classification.

Research paper thumbnail of Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam

Lecture Notes in Computer Science, 2005

With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a m... more With the increasing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates inconveniences for sites that have been used as a relay. This seems to be a growing problem, and without appropriate countermeasures, spam messages could eventually undermine the usability of e-mail. In this paper, we propose a cooperative spam-avoidance strategy based on the concept of restricting, at the network border and mail relay level, the mail sending function through properly authorized mail gateways registered as proper new Resource Records in the DNS System. If accepted and enforced by the largest number possible of network and mail administrators on the Internet, this strategy may result in a substantial reduction of the worldwide e-mail spam phenomenon.

Research paper thumbnail of EASyCoSe 2013

Research paper thumbnail of Guest Editorial: Special Issue on Advances in Security and Privacy in Sensor Networks

Research paper thumbnail of Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness

Research paper thumbnail of Multimedia-based battery drain attacks for Android devices

ABSTRACT People using smartphones to connect to the Internet for day-life activities has overtake... more ABSTRACT People using smartphones to connect to the Internet for day-life activities has overtaken the number of people using canonical PCs. This lead to a huge quantity of security threats that usually tend to penetrate the defenses of a smartphone in order to gain control of its resources. Differently, energy-based attacks have the objective of increasing the energy consumption of the victim device. It is important to highlight that this objective could be possibly achieved by just activating the system's defenses as a consequence of canonical attacks and letting the system defenses detect and (try to) defeat them. These activities consume additional energy and could led the mobile device to its complete uselessness. In this paper, an energy-based attack based on soliciting hardware-level encoding/decoding functions through properly crafted multimedia files is analyzed and its impact evaluated. Such kind of attacks are performed without accessing the device by taking advantage of the new HTML5 functionalities. A series of experiments have been performed in order to understand which are the codecs that have a more relevant impact on energy consumption, and, as a consequence, that make the attack more effective.

Research paper thumbnail of Advances in Security and Privacy in Sensor Networks

Research paper thumbnail of Modeling security requirements for cloud‐based system development

The Cloud Computing paradigm provides a new model for the more flexible utilization of computing ... more The Cloud Computing paradigm provides a new model for the more flexible utilization of computing and storage services. However, such enhanced flexibility, that implies outsourcing the data and business applications to a third party, may introduce critical security issues. Therefore, there is a clear necessity of new security paradigms able to face with all the problems introduced by the cloud approach. Although, in the last years, several solutions have been proposed, the implementation of secure cloud applications and services is still a complex and far from consolidated task. Starting from these considerations, this work fosters the development of a methodology that considers security concerns as an integral part of cloudbased applications design and implementation. Accordingly, we present a set of stereotypes that defines a vocabulary for annotating UML-based models with information relevant for integrating the specification of security requirements into cloud architectures. This approach can be used to significantly improve productivity and overall success in the development of secure distributed cloud applications and systems. The final publication is available at: . Prepared using cpeauth.cls [Version: 2010/05/13 v3.00] 2 M. FICCO ET AL.

Research paper thumbnail of Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures

This work analyzes a new and very subtle kind of security threat that can affect large scale clou... more This work analyzes a new and very subtle kind of security threat that can affect large scale cloudbased IT service infrastructures, by exploiting the computational resources of their component data center in order to waste as much energy as possible. The consequence of these threats range from increased costs in the energy bill, to penalization for exceeding the agreed quantity of green house gases (GHG) emissions, up to complete denial of service caused by electrical outages due to power budget exhaustion.

Research paper thumbnail of Text compression and encryption through smart devices for mobile communication

Research paper thumbnail of Secure and distributed video surveillance via portable devices

ABSTRACT In this work we present a system for distributed video surveillance based on the Client-... more ABSTRACT In this work we present a system for distributed video surveillance based on the Client-Server model. The system we present can be accessed via portable devices. In many real-world scenarios is useful, or sometimes necessary, to have portable devices that can receive real-time data from a selected camera, to prevent or to manage anomalous activities. The system provides reliable, high speed, secure and real-time communication among all its components, which are the Repository, the Node and the Portable Device. Both Repository and Node can act as a server. The Repository can provide services to both Nodes and Portable Devices, while the Nodes provide services only to the Portable Device. The portable device can only act as a client, using the services offered by the other two parts. In our system, a portable device is assumed to know only the location of the Repository which permits to get the list of nodes connected with one or more camera(s). When a portable device gets the list, it can choose which node intends to connect to, to get the images of its connected camera(s). The security of the interaction among Node-Repository and Node-Portable Device is guaranteed by using the SSL/TLS protocol. The interaction among nodes and portable devices is secured by using an invisible digital watermarking algorithm on each image, before that image is sent from a node to a portable device. The latter extracts the watermark from the image and verifies the identity of the node.

Research paper thumbnail of An energy-aware framework for reliable and secure end-to-end ubiquitous data communications

ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi cover... more ABSTRACT Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile data transfer services in everyday's life activities, it is still an open question. In particular, security becomes a key factor in such a scenario, since a large number of mobile terminal devices (smartphones, handhelds, tablets) simultaneously supporting multiple networking technologies, may be used to store, access, manipulate, or communicate sensitive data from everywhere and at any time. However, the computational efforts required for achieving security, due to the inherent complexity of cryptographic algorithms, heavily affect the power consumption of the involved terminals. Such energy demand, together with the amount of power already required to manage the communication activities carried out by using multiple network interfaces, make energy efficient secure communication among mobile hardware-constrained handheld devices, a really challenging topic. Based on above considerations, we present the architecture of a framework which enables secure end-to-end and reliable data transfer for heterogeneous mobile terminals by also describing and modeling its power demand, with the aim of achieving a robust and reliable ubiquitous data transfer service also minimizing the overall battery consumption in such devices.

Research paper thumbnail of A botnet-based command and control approach relying on swarm intelligence

ABSTRACT Survivability and scalability are the main emerging challenges in command and control of... more ABSTRACT Survivability and scalability are the main emerging challenges in command and control of ubiquitous networked entities operating in untrusted communication scenarios, due to the increasing sophistication of the detection and mitigation/defeating techniques together with the increasing number of elements to be controlled and their distribution over multiple heterogeneous communication infrastructures. Accordingly, this work focuses on a new more robust and scalable botnet-based command and control architecture, aiming at wiping off any rigid master-slave relationship and autonomizing the bot operating roles, with significant agility gains in the whole overlay communication infrastructure. It relies on swarm intelligence and in particular on stigmergic communication, ensuring spontaneous, implicit coordination and collaboration among the independent bot agents. The resulting architecture presents improved fault tolerance and dynamic adaptation to varying network conditions, by propagating control messages to any bot node through multiple short-range hops structured according to a dynamically built Degree Constrained Minimum Spanning Tree, whose distributed calculation is inspired to ant colony's foraging behavior. For this reason, it may constitute the basis for an evolutionary malware-based control and management scheme that can be used in several homeland security/defense scenarios where the botnet technology may be used as a support tool in strategic military or intelligence operations.

Research paper thumbnail of Towards service orchestration between smart grids and telecom networks

In the last years, the research efforts in smart grids (SG) and telecommunication networks (TN) h... more In the last years, the research efforts in smart grids (SG) and telecommunication networks (TN) have been considerable but never converged to a common view and, due to the lack of strong interactions between the two worlds, only limited benefits have been achieved. We envision in this paper that future TN (as well as any other ICT application) will interact with the SG, enabling (1) the TN to know the energy source and cost that is currently powering its equipment, (2) to turn the TN into an active client which can request to the SG the quantity and quality (e.g. green) of energy that it needs, and (3) a service orchestration between SG supply system and TN operations. As a consequence, the enabled interoperability between TN and SG would allow TN to take energy-aware management decisions in function of energyrelated information provided by the SG. For example, TN can route packets with the objective of optimizing green criteria, while SG can route the energy towards the TN clients with the objective of not wasting surpluses of green energy. These new energy and data routing capabilities can be exploited not only by SG operators and telecom carriers but also by any energy consumer/ producer within the ICT world. This may include industry and institutional ICT premises, datacenters, home automation, wireless and mobile cellular networks, which will be able to implement their own energy-aware management and operations (M&O) by considering the quantity, quality and cost of the energy currently provided by the smart grid.

Research paper thumbnail of Evaluating energy savings in WoL-enabled networks of PCs

2013 IEEE International Symposium on Industrial Electronics, 2013

ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging th... more ABSTRACT In this paper we present EnergySave, a smart energy-saving system that, by leveraging the consolidated WoL (Wake on LAN) technology, allows the remote wake-up of PCs from a centralized management server, providing easy and secure power management capabilities for local or remote IP-based networks of personal computers (PCs). We also present a lightweight web-based platform implementing the remote management interface as less intrusively as possible. Finally, we model the mathematical saving functions to be used in order to evaluate through simulation the amount of potential energy savings, and hence the whole framework effectiveness, both in the general case and in a real case scenario. Results show that significant savings are achievable provided that the hardware supports the Wake-on-LAN specifications and that proper configuration of the Web server is set-up, allowing the WoL magic packet to travel to the destination hosts and wake them up only when they are really needed.

Research paper thumbnail of A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing

Knowledge-Based Systems, 2014

Big Data Analytics is considered an imperative aspect to be further improved in order to increase... more Big Data Analytics is considered an imperative aspect to be further improved in order to increase 11 the operating margin of both public and private enterprises, and represents the next frontier for their 12 innovation, competition, and productivity. Big Data are typically produced in different sectors of the above 13 organizations, often geographically distributed throughout the world, and are characterized by a large size 14 and variety. Therefore, there is a strong need for platforms handling larger and larger amounts of data, and dealing with the various issues related to efficiently disseminating and processing them according to the 16 well-known MapReduce paradigm. In such scenario, this work proposes a way to overcome two fundamental 17 issues: data heterogeneity and advanced processing capabilities. We present a Knowledge-based solution for 18 big data analytics, which consists in applying automatic schema mapping to face with data heterogeneity, as 19 well as ontology extraction and semantic inference to support innovative processing. Such a solution, based 20 on the publish/subscribe paradigm, has been evaluated within the context of a simple experimental proof 21 of concept in order to determine its performance and effectiveness. 22

Research paper thumbnail of An energy-aware engineered control plane for wavelength-routed networks

Transactions on Emerging Telecommunications Technologies, 2014

ABSTRACT Despite the significant degree of technological maturity reached by large-scale optical ... more ABSTRACT Despite the significant degree of technological maturity reached by large-scale optical transmission infrastructures, new critical issues are emerging as side effects associated to their energy consumption, environmental impact and related costs, now accounting for an important part of the networks’ operational expenditures. To face this problem, we propose a single-stage routing and wavelength assignment scheme, based on several network engineering extensions to the Generalised Multi-Protocol Label Switching (GMPLS) control plane protocols, mainly Open Shortest Path First, with new composed metrics and information transport facilities. It is structured according to a simple multi-objective optimisation approach aiming at containing the network's energy consumption and ecological impact while balancing the overall load and maintaining an acceptable connection demand satisfaction rate. The proposed solution is able to operate effectively in wide area wavelength routing scenarios, where multiple heterogeneous equipment, ranging from pure photonic to opaque routing/switching, amplification and regeneration devices are deployed in a GMPLS-empowered network. Copyright © 2014 John Wiley & Sons, Ltd.

Research paper thumbnail of A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems

International Journal of Parallel Programming, 2013

ABSTRACT Big Data processing architectures are now widely recognized as one of the most significa... more ABSTRACT Big Data processing architectures are now widely recognized as one of the most significant innovations in Computing in the last decade. Their enormous potential in collecting and processing huge volumes of data scattered throughout the Internet is opening the door to a new generation of fully distributed applications that, by leveraging the large amount of resources available on the network will be able to cope with very complex problems achieving performances never seen before. However, the Internet is known to have severe scalability limitations in moving very large quantities of data, and such limitations introduce the challenge of making efficient use of the computing and storage resources available on the network, in order to enable data-intensive applications to be executed effectively in such a complex distributed environment. This implies resource scheduling decisions which drive the execution of task towards the data by taking network load and capacity into consideration to maximize data access performance and reduce queueing and processing delays as possible. Accordingly, this work presents a data-centric meta-scheduling scheme for fully distributed Big Data processing architectures based on clustering techniques whose goal is aggregating tasks around storage repositories and driven by a new concept of “gravitational” attraction between the tasks and their data of interest. This scheme will benefit from heuristic criteria based on network awareness and advance resource reservation in order to suppress long delays in data transfer operations and result into an optimized use of data storage and runtime resources at the expense of a limited (polynomial) computational complexity.