Skip to main content

Showing 1–5 of 5 results for author: Nespoli, P

.
  1. arXiv:2402.09191  [pdf, other

    cs.CR cs.NI cs.PF eess.SY

    Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots

    Authors: Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Perez

    Abstract: Cybersecurity is develo** rapidly, and new methods of defence against attackers are appearing, such as Cyber Deception (CYDEC). CYDEC consists of deceiving the enemy who performs actions without realising that he/she is being deceived. This article proposes designing, implementing, and evaluating a deception mechanism based on the stealthy redirection of TCP communications to an on-demand honey… ▽ More

    Submitted 20 February, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

  2. arXiv:2401.12594  [pdf, other

    cs.CR cs.CY

    SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification and Learning Analytics to Train Cybersecurity Competencies

    Authors: Pantaleone Nespoli, Mariano Albaladejo-González, José Antonio Pastor Valera, José A. Ruipérez-Valiente, Joaquin Garcia-Alfaro, Félix Gómez Mármol

    Abstract: It is undeniable that we are witnessing an unprecedented digital revolution. However, recent years have been characterized by the explosion of cyberattacks, making cybercrime one of the most profitable businesses on the planet. That is why training in cybersecurity is increasingly essential to protect the assets of cyberspace. One of the most vital tools to train cybersecurity competencies is the… ▽ More

    Submitted 20 February, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: 31 pages

  3. arXiv:2312.06229  [pdf, other

    cs.CR cs.AI

    Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision

    Authors: Sergio Bernardez Molina, Pantaleone Nespoli, Félix Gómez Mármol

    Abstract: There is no denying that the use of Information Technology (IT) is undergoing exponential growth in today's world. This digital transformation has also given rise to a multitude of security challenges, notably in the realm of cybercrime. In response to these growing threats, public and private sectors have prioritized the strengthening of IT security measures. In light of the growing security conc… ▽ More

    Submitted 29 May, 2024; v1 submitted 11 December, 2023; originally announced December 2023.

  4. Large-Language-Model-Powered Agent-Based Framework for Misinformation and Disinformation Research: Opportunities and Open Challenges

    Authors: Javier Pastor-Galindo, Pantaleone Nespoli, José A. Ruipérez-Valiente

    Abstract: This article presents the affordances that Generative Artificial Intelligence can have in misinformation and disinformation contexts, major threats to our digitalized society. We present a research framework to generate customized agent-based social networks for disinformation simulations that would enable understanding and evaluating the phenomena whilst discussing open challenges.

    Submitted 29 April, 2024; v1 submitted 11 October, 2023; originally announced October 2023.

    Journal ref: IEEE Security & Privacy, 2024

  5. Spotting political social bots in Twitter: A use case of the 2019 Spanish general election

    Authors: Javier Pastor-Galindo, Mattia Zago, Pantaleone Nespoli, Sergio López Bernal, Alberto Huertas Celdrán, Manuel Gil Pérez, José A. Ruipérez-Valiente, Gregorio Martínez Pérez, Félix Gómez Mármol

    Abstract: While social media has been proved as an exceptionally useful tool to interact with other people and massively and quickly spread helpful information, its great potential has been ill-intentionally leveraged as well to distort political elections and manipulate constituents. In the paper at hand, we analyzed the presence and behavior of social bots on Twitter in the context of the November 2019 Sp… ▽ More

    Submitted 12 October, 2020; v1 submitted 2 April, 2020; originally announced April 2020.