Alessio Botta

Alessio Botta
University of Naples Federico II | UNINA · DIETI

PhD

About

109
Publications
70,679
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,601
Citations
Additional affiliations
January 2005 - present
Consorzio Nazionale Interuniversitario per l'Informatica
January 2007 - present
University of Naples Federico II
Education
January 2006 - January 2009
University of Naples Federico II
Field of study
  • Computer Science

Publications

Publications (109)
Conference Paper
Full-text available
In the realm of computer fraud, phishing emails have emerged as the predominant threat, constituting over half of the total messaging traffic. Exploiting ingrained personality traits, cybercriminals often employ psychological tactics to deceive users. This work aims at identifying implicit correlations in the cognitive processes of individuals betw...
Chapter
Full-text available
As telcos increasingly adopt cloud-native solutions, classic resource management problems within cloud environments have surfaced. While considerable attention has been directed toward the conventional challenges of dynamically scaling resources to adapt to variable workloads, the 5G promises of Ultra-Reliable Low Latency Communication (URLLC) rema...
Article
The use of robots in the modern world is widespread, not only in medicine and automated vehicles, but also in national security, defense, and industry. Together with the growing number of robots there is also an increase of cyber attacks against robots and in general of their security issues. Thus, we consider cyber security and related issues such...
Article
Data communication networks have large importance for the immediate post-earthquake emergency management and community resilience. In this study, the framework of simulation-based probabilistic seismic risk analysis of data communication infrastructure is applied to the real case of the inter-university data network of the Campania region (southern...
Article
The process of constructing structural systems produces a huge amount of documentation that traces human activities on a construction site. While the building information modelling approach introduces common data environments (CDEs) to support document management, communication between them is limited, and mainly involves the use of email and activ...
Article
Full-text available
With the advances in networking technologies, robots can use the almost unlimited resources of large data centers, overcoming the severe limitations imposed by onboard resources: this is the vision of Cloud Robotics. In this context, we present DewROS, a framework based on the Robot Operating System (ROS) which embodies the three-layer, Dew-Robotic...
Article
The email threat landscape is constantly evolving and hence difficult to counteract even by carrier-grade spam filters. Dangerous spam emails may thus reach the users and then result in damaging attacks spreading through the corporate network. This paper describes a collaborative approach for early detection of malicious spam emails and its applica...
Article
Full-text available
With the growing adoption of cloud infrastructures to deliver a variety of IT services, monitoring cloud network performance has become crucial. However, cloud providers only disclose qualitative information about network performance, at most. This hinders efficient cloud adoption, resulting in uncertainties about the behavior of hosted services, a...
Conference Paper
Full-text available
The seismic risk assessment of spatially distributed infrastructures is gaining increasing research attention. Data communication networks, although less investigated than other infrastructures, have large importance for the immediate post-event emergency management and community resilience. In this study the framework of simulation-based probabili...
Conference Paper
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper...
Conference Paper
Full-text available
With the growing adoption of cloud infrastructures to deliver a variety of IT services, monitoring cloud network performance has become crucial. However, cloud providers only disclose qualitative info about network performance, at most. This hinders efficient cloud adoption, resulting in no performance guarantees, uncertainties about the behavior o...
Preprint
Today, due to the high number of attacks and of anomalous events in network traffic, the network anomaly detection has become an important research area. In fact it is necessary to detect all behaviors which do not comply with a well-defined notion of a normal behavior in order to avoid further harms. The two most spread network anomalies related t...
Conference Paper
Full-text available
The seismic risk assessment of spatially distributed infrastructures systems is gaining increasing research relevance. To date, data communication networks are less investigated than other networks, yet evidently important. This study focuses on framing the simulation-based probabilistic seismic risk analysis of data communication infrastructures s...
Article
Internet outages are inevitable, frequent, opaque, and expensive. To make things worse, they are poorly understood, while a deep understanding of them is essential for strengthening the role of the Internet as the world's communication substrate. The importance of research on Internet outages is demonstrated by the large body of literature focusing...
Article
Internet streaming is responsible for a significant fraction of Internet traffic. It has been reported to account up to 70% of peak traffic in North American fixed access networks, and this figure is expected to reach 80% by 2020 [1]. Regarding such a killer service of the Internet, much has been discussed regarding if and how video hosting provide...
Article
Full-text available
Nowadays there is no field research which is not flooded with data. Among the sciences, Astrophysics has always been driven by the analysis of massive amounts of data. The development of new and more sophisticated observation facilities, both ground-based and spaceborne, has led data more and more complex (Variety), an exponential growth of both da...
Article
Full-text available
Injecting purposely-created probing traffic makes it possible to detect the presence and location of performance issues or faults, to reveal the topology of the network, and to investigate related properties. While researchers and network operators still rely on traditional tools (e.g., traceroute or ping) to shed light on the Internet, here we pre...
Article
Software Defined Networking (SDN) is an emerging paradigm that is expected to revolutionize computer networks. Methods for measuring Quality of Service (QoS) parameters such as bandwidth utilization, packet loss, and delay have been recently introduced in literature for SDN-based scenarios, but they required almost invariably a completely different...
Article
According to current usage patterns, research trends, and latest reports, the performance of the wide-area networks interconnecting geographically distributed cloud nodes (i.e. inter-datacenter networks) is gaining more and more interest. In this paper we leverage only active approaches—thus we do not rely on information restricted to providers—and...
Conference Paper
Internet Censorship is unceasingly increasing in many countries worldwide in order to restrict web contents within the country premises. According to latest Open Net Initiative (ONI) report, almost 50 countries are involved in web censorship, including Pakistan. This paper presents the methodology and the measurement analysis based on publicly avai...
Conference Paper
Software Defined Networking (SDN) is an emerging paradigm that is expected to revolutionize computer networks. With the decoupling of data and control plane and the introduction of open communication interfaces between layers, SDN enables programmability over the entire network, promising rapid innovation in this area. The SDN concept was already p...
Conference Paper
Network neutrality is a hot topic since a few years and involves different aspects of interest (e.g. economic, regulatory and privacy) for a wide range of stakeholders, including policy makers, researchers, economists, and service providers. When referring to video streaming, a killer web service of the Internet, much has been discussed regarding i...
Article
The bursty nature of losses over the Internet is constantly asking for effective solutions. In this work, we use a comprehensive approach to study packet interleaving for coping with loss burstiness. Our aim is to assess if and how packet interleaving can be employed in real networks at the IP layer and what benefits real UDP-based applications may...
Article
Full-text available
Cloud computing and Internet of Things (IoT) are two very different technologies that are both already part of our life. Their adoption and use are expected to be more and more pervasive, making them important components of the Future Internet. A novel paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a...
Article
Cloud providers employ sophisticated virtualization techniques and strategies for sharing resources among a large number of largely uncoordinated and mutually untrusted customers. The shared networking environment, in particular, dictates the need for mechanisms to partition network resources among virtual machines. At the same time, the performanc...
Conference Paper
Censorship is becoming increasingly pervasive on the Internet, with the Open Net Initiative reporting nearly 50 countries practicing some form of censorship. Previous work has reported the existence of many forms of Internet censorship (e.g., DNS tampering, packet filtering, connection reset, content filtering), each of which may be composed to bui...
Article
Full-text available
Cloud computing and Internet of Things (IoT), two very different technologies, are both already part of our life. Their massive adoption and use is expected to increase further, making them important components of the Future Internet. A novel paradigm where Cloud and IoT are merged together is foreseen as disruptive and an enabler of a large number...
Article
Full-text available
This paper is a first step toward the goal of evaluating the measurement accuracy of the interdeparture times (IDTs) provided by software traffic generators. To provide evidences of the proposed methodology, in this paper, we focus our attention on the experimental characterization of the internal generation cycle of a well-known, open source gener...
Article
Full-text available
In the context of Internet access technologies, satellite networks have traditionally been considered for specific purposes or as a backup technology for users not reached by traditional access networks, such as 3G, cable or ADSL. In recent years, however, new satellite technologies have been pushed to the market, reopening the debate on the possib...
Conference Paper
Full-text available
In the last years the problem of measuring and monitoring broadband performance has attracted a lot of attention. In this paper we present our recent work in this area, providing the following main contributions: firstly, we analyze the literature, illustrating the different existing approaches and the main requirements of platforms implementing th...
Conference Paper
Full-text available
Researchers and operators often measure Round Trip Time when monitoring, troubleshooting, or otherwise assessing network paths. However, because it combines all hops traversed along both the forward and reverse path, it can be difficult to interpret or to attribute delay to particular path segments. In this work, we present an approach using a sing...
Conference Paper
Full-text available
The paper is the first step towards the goal of evaluating the measurement uncertainty of the inter-departure times (IDT) provided by software traffic generator. The paper is focused on the experimental characterization of the internal generation cycle of a well-known, open source generator, namely D-ITG, for different systems, and under the best p...
Article
Full-text available
Monitoring modern networks involves storing and transferring huge amounts of data. To cope with this problem, in this paper we propose a technique that allows to transform the measurement data in a representation format meeting two main objectives at the same time. Firstly, it allows to perform a number of operations directly on the transformed dat...
Conference Paper
Full-text available
In the context of Internet access technologies, satellite networks have traditionally been considered for specific purposes or as a backup technology for users not reached by traditional access networks, such as 3G, cable or ADSL. In recent years, however, new satellite technologies have been introduced in the market, reopening the debate on the po...
Article
Approaches and systems for network workload generation are useful and effective only when they produce network traffic that is realistic and representative as much as possible of the real workload of the network scenario under study. Distributed Internet Traffic Generator (D-ITG) [1] is a platform capable to produce IPv4 and IPv6 traffic by accurat...
Conference Paper
Full-text available
There are various parameters for analyzing the quality of network communication links and paths, one attracting particular attention is available bandwidth. In this chapter we describe a platform for the available bandwidth estimation, a comparison of different tools for the estimation of this parameter, and an application of such estimation in a r...
Conference Paper
Full-text available
Despite its importance for operating Cloud systems, Cloud monitoring has received limited attention from the research community. In this position paper, we provide an analysis of Cloud monitoring. More precisely, we discuss the main motivations, basic concepts and definitions, and point out open research issues and future directions for Cloud monit...
Conference Paper
Full-text available
Understanding the ever-changing scenario of computer networks and how they operate in the real world implies measuring and analyzing their characteristics. This in turn requires a set of advanced tools and methodologies to be shared among researches, along with the data derived from such activities. In this paper we first present some of the main i...
Article
Internet workload is a mix of many and complex sources. Therefore, its accurate and realistic replication is a difficult and challenging task. Such difficulties are exacerbated by the multidimensional heterogeneity and scale of the current Internet combined with its constant evolution. The study and generation of network workload is a moving target...
Article
In the field of network monitoring and measurement, the efficiency and accuracy of the adopted tools is strongly dependent on (i) structural and dynamic characteristics of the network scenario under measurement and (ii) on manual fine tuning of the involved parameters. This is, for example, the case of the end-to-end available bandwidth estimation,...
Chapter
Full-text available
This chapter summarises the results achieved by the ArtDeco project and presents the overall approach for developing the models that the large-scale middleware infrastructure designed during the project uses to drive the behaviours of the information systems of a sample networked enterprise operating in the domain of wine production. This domain is...
Article
Full-text available
In this article, we discuss trends, issues, requirements and solutions for customer service assurance (CSA) platforms for mobile broadband networks. We propose a distributed probe-based architecture called intelligent CSA (iCSA), and demonstrate how it is a key component of an advanced OSS. iCSA provides support to OSSs, addressing a number of impo...
Article
Full-text available
Monitoring modern networks involves storing and transferring huge amounts of data. For this reason, compression techniques are typically used in order to reduce the space and time needed for these operations. The main drawback of this approach is that, when data has to be processed, a preliminary decompression is necessary, which increases the time...
Conference Paper
Full-text available
The bursty nature of losses over the Internet is constantly asking for effective solutions. Packet interleaving or time diversity allows to cope with loss burstiness, at the cost of an additional delay. In this work, after determining the loss burstiness degree of real networks, we implement a real interleaver (we called TimeD), and we tackle the p...
Conference Paper
Full-text available
Monitoring and measurement of wireless networks play an important role for a number of reasons. In current networking scenarios, middleboxes (NAT, firewall, PEP, PCMS, ...) are more and more common. In this paper we present preliminary results of our ongoing work on the monitoring and measurement of the performance of real operational wireless netw...
Article
Full-text available
The use of multipath routing in overlay networks is a promising solution to improve performance and availability of Internet applications, without the replacement of the existing TCP/IP infrastructure. In this paper, we propose an approach to distribute data over multiple overlay paths that is able to improve Quality of Service (QoS) metrics, such...
Article
Full-text available
Networking research often relies on synthetic traffic generation in its experimental activities; from generation of realistic workload to active measurements. Often researchers adopt software-based generators because of their flexibility. However, despite the increasing number of features (e.g., replication of complex traffic models), they are stil...
Conference Paper
Full-text available
In the field of network monitoring and measurement, the efficiency and accuracy of the adopted tools is strongly dependent on (i) structural and dynamic characteristics of the network scenario under measure and (ii) on manual fine tuning of the involved parameters. This is, for example, the case of the end-to-end available bandwidth estimation, in...
Article
Full-text available
Distributed research testbeds play a fundamental role in the evaluation of disruptive innovations for the Future Internet. In recent years, the main research funding agencies have promoted several initiatives aimed at designing and building open, large scale, realistic experimental facilities that could be used to evaluate innovative networking arc...
Article
Full-text available
Cellular technology is widely used for Internet access, also because most operators are now offering Mbit/s data rates at affordable prices. Many studies analyzed the performance of these networks using analytical or simulation approaches. However, due to lack of data from operational environments, very little is known about the performance of real...
Article
The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities....