Skip to main content

Showing 1–10 of 10 results for author: Doriguzzi-Corin, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.05936  [pdf, other

    cs.CR cs.NI

    Introducing Packet-Level Analysis in Programmable Data Planes to Advance Network Intrusion Detection

    Authors: Roberto Doriguzzi-Corin, Luis Augusto Dias Knob, Luca Mendozzi, Domenico Siracusa, Marco Savi

    Abstract: Programmable data planes offer precise control over the low-level processing steps applied to network packets, serving as a valuable tool for analysing malicious flows in the field of intrusion detection. Albeit with limitations on physical resources and capabilities, they allow for the efficient extraction of detailed traffic information, which can then be utilised by Machine Learning (ML) algori… ▽ More

    Submitted 4 January, 2024; v1 submitted 12 July, 2023; originally announced July 2023.

  2. Resource-aware Cyber Deception for Microservice-based Applications

    Authors: Marco Zambianco, Claudio Facchinetti, Roberto Doriguzzi-Corin, Domenico Siracusa

    Abstract: Cyber deception can be a valuable addition to traditional cyber defense mechanisms, especially for modern cloud-native environments with a fading security perimeter. However, pre-built decoys used in classical computer networks are not effective in detecting and mitigating malicious actors due to their inability to blend with the variety of applications in such environments. On the other hand, dec… ▽ More

    Submitted 6 May, 2024; v1 submitted 6 March, 2023; originally announced March 2023.

  3. FLAD: Adaptive Federated Learning for DDoS Attack Detection

    Authors: Roberto Doriguzzi-Corin, Domenico Siracusa

    Abstract: Federated Learning (FL) has been recently receiving increasing consideration from the cybersecurity community as a way to collaboratively train deep learning models with distributed profiles of cyber threats, with no disclosure of training data. Nevertheless, the adoption of FL in cybersecurity is still in its infancy, and a range of practical aspects have not been properly addressed yet. Indeed,… ▽ More

    Submitted 20 November, 2023; v1 submitted 13 May, 2022; originally announced May 2022.

  4. arXiv:2201.13102  [pdf, other

    cs.CR

    GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection

    Authors: Maged Abdelaty, Sandra Scott-Hayward, Roberto Doriguzzi-Corin, Domenico Siracusa

    Abstract: Machine Learning (ML) has proven to be effective in many application domains. However, ML methods can be vulnerable to adversarial attacks, in which an attacker tries to fool the classification/prediction mechanism by crafting the input data. In the case of ML-based Network Intrusion Detection Systems (NIDSs), the attacker might use their knowledge of the intrusion detection logic to generate mali… ▽ More

    Submitted 31 January, 2022; originally announced January 2022.

  5. Hybrid SDN Evolution: A Comprehensive Survey of the State-of-the-Art

    Authors: Sajad Khorsandroo, Adrian Gallego Sanchez, Ali Saman Tosun, Jose' Manuel Arco Rodriguez, Roberto Doriguzzi-Corin

    Abstract: Software-Defined Networking (SDN) is an evolutionary networking paradigm which has been adopted by large network and cloud providers, among which are Tech Giants. However, embracing a new and futuristic paradigm as an alternative to well-established and mature legacy networking paradigm requires a lot of time along with considerable financial resources and technical expertise. Consequently, many e… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

  6. DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems

    Authors: Maged Abdelaty, Roberto Doriguzzi-Corin, Domenico Siracusa

    Abstract: Deep Learning is emerging as an effective technique to detect sophisticated cyber-attacks targeting Industrial Control Systems (ICSs). The conventional approach to detection in literature is to learn the "normal" behaviour of the system, to be then able to label noteworthy deviations from it as anomalies. However, during operations, ICSs inevitably and continuously evolve their behaviour, due to e… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

  7. arXiv:2004.02876  [pdf, other

    cs.NI cs.CR cs.LG

    Methods and Techniques for Dynamic Deployability of Software-Defined Security Services

    Authors: Roberto Doriguzzi-Corin

    Abstract: With the recent trend of "network softwarisation", enabled by emerging technologies such as Software-Defined Networking (SDN) and Network Function Virtualisation (NFV), system administrators of data centres and enterprise networks have started replacing dedicated hardware-based middleboxes with virtualised network functions running on servers and end hosts. This radical change has facilitated the… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2002.04902, arXiv:1901.01704

  8. LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

    Authors: Roberto Doriguzzi-Corin, Stuart Millar, Sandra Scott-Hayward, Jesus Martinez-del-Rincon, Domenico Siracusa

    Abstract: Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's Internet, disrupting the availability of essential services. The challenge of DDoS detection is the combination of attack approaches coupled with the volume of live traffic to be analysed. In this paper, we present a practical, lightweight deep learning DDoS detection system called LUCID, which exploits the… ▽ More

    Submitted 28 August, 2020; v1 submitted 12 February, 2020; originally announced February 2020.

    Comments: Accepted for publication in the IEEE Transactions on Network and Service Management

  9. Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions

    Authors: Roberto Doriguzzi-Corin, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi, Elio Salvadori

    Abstract: A promising area of application for Network Function Virtualization is in network security, where chains of Virtual Security Network Functions (VSNFs), i.e., security-specific virtual functions such as firewalls or Intrusion Prevention Systems, can be dynamically created and configured to inspect, filter or monitor the network traffic. However, the traffic handled by VSNFs could be sensitive to sp… ▽ More

    Submitted 18 March, 2021; v1 submitted 7 January, 2019; originally announced January 2019.

  10. arXiv:1707.09558  [pdf, other

    cs.NI

    Lessons learnt from the NetIDE project: Taking SDN programming to the next level

    Authors: Pedro A. Aranda Gutierrez, Roberto Doriguzzi-Corin, Elisa Rojas

    Abstract: SDN promises to overcome vendor lock-in by enabling a multi-vendor hardware and software ecosystem in operator networks. However, we observe that this is currently not happening. A framework allowing to compose SDN applications combining different frameworks can help revert the trend. In this paper, we analyze the challenges in the current SDN landscape and then present the multi-controller SDN fr… ▽ More

    Submitted 29 July, 2017; originally announced July 2017.

    Comments: 6 pages, 4 figures

    ACM Class: C.2; C.2.1