Walter de Donato

Walter de Donato
University of Naples Federico II | UNINA · Department of Electrical Engineering and Information Technology

PhD

About

32
Publications
48,643
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,560
Citations
Introduction
Skills and Expertise

Publications

Publications (32)
Poster
Full-text available
The process of associating (labeling) network traffic with specific applications or application types, known as Traffic Classification (TC), is increasingly challenged by the growing usage of smartphones, which is profoundly changing the kind of traffic that travels over home and enterprise networks and the Internet. TC comes with its own challenge...
Article
Full-text available
Cloud computing and Internet of Things (IoT) are two very different technologies that are both already part of our life. Their adoption and use are expected to be more and more pervasive, making them important components of the Future Internet. A novel paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a...
Article
Full-text available
Cloud computing and Internet of Things (IoT), two very different technologies, are both already part of our life. Their massive adoption and use is expected to increase further, making them important components of the Future Internet. A novel paradigm where Cloud and IoT are merged together is foreseen as disruptive and an enabler of a large number...
Conference Paper
Full-text available
In the last years the problem of measuring and monitoring broadband performance has attracted a lot of attention. In this paper we present our recent work in this area, providing the following main contributions: firstly, we analyze the literature, illustrating the different existing approaches and the main requirements of platforms implementing th...
Article
Full-text available
The availability of open source traffic classification systems designed for both experimental and operational use, can facilitate collaboration, convergence on standard definitions and procedures, and reliable evaluation of techniques. In this article, we describe Traffic Identification Engine (TIE), an open source tool for network traffic classifi...
Conference Paper
Full-text available
Traceroute is one of the most famous and widely adopted diagnostic tool for computer networks. Although traceroute is often used to infer links between Autonomous Systems (ASes), the presence of the so-called third-party (TP) addresses may induce the inference of false AS-level links. In this paper, we propose a novel active probing technique based...
Article
Approaches and systems for network workload generation are useful and effective only when they produce network traffic that is realistic and representative as much as possible of the real workload of the network scenario under study. Distributed Internet Traffic Generator (D-ITG) [1] is a platform capable to produce IPv4 and IPv6 traffic by accurat...
Article
Full-text available
We present the results from the first study of Internet access link performance measured directly from home routers. In conjunction with the Federal Communication Commission's study of broadband Internet access in the United States, we investigate the throughput and latency of network access links from about 4000 routers across eight ISPs. Our find...
Conference Paper
Full-text available
Despite its importance for operating Cloud systems, Cloud monitoring has received limited attention from the research community. In this position paper, we provide an analysis of Cloud monitoring. More precisely, we discuss the main motivations, basic concepts and definitions, and point out open research issues and future directions for Cloud monit...
Conference Paper
Full-text available
Understanding the ever-changing scenario of computer networks and how they operate in the real world implies measuring and analyzing their characteristics. This in turn requires a set of advanced tools and methodologies to be shared among researches, along with the data derived from such activities. In this paper we first present some of the main i...
Article
Full-text available
Traceroute is probably the most famous computer networks diagnostic tool, widely adopted for both performance troubleshooting and research. Unfortunately, traceroute is not free of inaccuracies. In this poster, we present our ongoing work to address the inaccuracy caused by third-party addresses.We discuss the impact of third-party addresses on tra...
Article
We propose a demonstration of BISmark, a platform for measuring broadband Internet performance from the home gateway device. BISmark overcomes shortcomings of other broadband performance measurement approaches by 1) conducting measurements continuously over time to allow for longitudinal studies of performance, and 2) conducting measurements from t...
Conference Paper
Full-text available
In the last years, network measurements have shown a growing interest in active probing techniques. Recent works propose approaches based on the IP prespecified timestamp option and consider its support to be enough for their purposes. On the other hand, other works found that IP options are usually filtered, poorly implemented, or not widely suppo...
Article
We present the first study of network access link performance measured directly from home gateway devices. Policymakers, ISPs, and users are increasingly interested in studying the performance of Internet access links. Because of many confounding factors in a home network or on end hosts, however, thoroughly understanding access network performance...
Conference Paper
Full-text available
We present the first study of network access link performance measured directly from home gateway devices. Policymakers, ISPs, and users are increasingly interested in studying the performance of Internet access links. Because of many confounding factors in a home network or on end hosts, however, thoroughly understanding access network performance...
Article
Full-text available
When purchasing home broadband access from Internet service providers (ISPs), users must decide which service plans are most appropriate for their needs. Today, ISPs advertise their available service plans using only generic upload and download speeds. Un-fortunately, these metrics do not always accurately reflect the vary-ing performance that home...
Conference Paper
Full-text available
Traffic classification approaches based on deep packet inspection (DPI) are considered very accurate, however, two major drawbacks are their invasiveness with respect to users privacy, and their significant computational cost. Both are a consequence of the amount of per-flow payload data - we refer to it as "deepness" - typically inspected by such...
Conference Paper
Full-text available
The network measurement community has proposed multiple machine learning (ML) methods for traffic classification during the last years. Although several research works have reported accuracies over 90%, most network operators still use either obsolete (e.g., port-based) or extremely expensive (e.g., pattern matching) methods for traffic classificat...
Article
Full-text available
Technological developments of the last few years have favoured the creation of distributed networking infrastruc-tures (usually referred to as Community Networks) where the resources are made available to the members of a community of people. With emerging large-scale community infrastructures the opportunities for new commercial services and for i...
Conference Paper
Full-text available
The research on network traffic classification has recently become very active. The research community, moved by increasing difficulties in the automated identification of network traffic, started to investigate classification approaches alternative to port-based and payload-based techniques. Despite the large quantity of works published in the pas...
Conference Paper
Full-text available
Traffic classification and identification is a fertile research area. Beyond Quality of Service, service differentiation, and billing, one of the most important applications of traffic classification is in the field of network security. This paper proposes a packet-level traffic classification approach based on Hidden Markov Model (HMM). Classifica...
Article
Full-text available
We are assisting to the evolution of new generation applica-tions and services, progressively providing -through a single interface -more interactions among the users and between the users and the network. This is promoting the devel-opment of multi-channel applications (e.g. Skype, Cloud Computing Platforms, Facebook, ...) that are specifically de...
Conference Paper
Full-text available
Networked embedded systems are gaining more and more attention and their use in current network scenarios is of indisputable importance. Research community and industry are proposing novel embedded solutions, often based on network processors, for network connectivity, data processing and service delivery. Despite this, quantitative performance com...
Conference Paper
Full-text available
Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliability of network infrastructures, effective and efficient approaches and tools for discovering large topologies are gaining more and more attention from both Application Service...
Article
Full-text available
In this Technical Report we report our activities on the Design, Implementation, and Testing of a Hybrid Tool for Network Topology Discovery we called Hynetd.
Article
Full-text available
I. INTRODUZIONE L'eterogeneitá dei contenuti offerti in Interne e estrema-mente elevata e possibile tuttavia individuare delle comu-nitá di utenti [1] definite come tali sia per quanto riguarda l'infrastruttura utilizzata per l'accesso alla rete, sia per quanto riguarda gli interessi dai quali sono accomunati. Molto spesso le comunitá di utenti son...

Network

Cited By