Skip to main content

Showing 1–8 of 8 results for author: Crichigno, J

Searching in archive cs. Search in all archives.
.
  1. A Comprehensive Survey on SmartNICs: Architectures, Development Models, Applications, and Research Directions

    Authors: Elie Kfoury, Samia Choueiri, Ali Mazloum, Ali AlSabeh, Jose Gomez, Jorge Crichigno

    Abstract: The end of Moore's Law and Dennard Scaling has slowed processor improvements in the past decade. While multi-core processors have improved performance, they are limited by the application's level of parallelism, as prescribed by Amdahl's Law. This has led to the emergence of domain-specific processors that specialize in a narrow range of functions. Smart Network Interface Cards (SmartNICs) can be… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: This work has been submitted to the IEEE for possible publication

  2. arXiv:2306.14090  [pdf, other

    cs.CR

    Federated Learning Approach for Distributed Ransomware Analysis

    Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno

    Abstract: Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions to tackle the latest threats, many of which may have relatively fewer samples to analyze. This paper presents a machine learning (ML) framework for early ransom… ▽ More

    Submitted 24 June, 2023; originally announced June 2023.

    Comments: 8 figures, 4 tables

  3. IoT Threat Detection Testbed Using Generative Adversarial Networks

    Authors: Farooq Shaikh, Elias Bou-Harb, Aldin Vehabovic, Jorge Crichigno, Aysegul Yayimli, Nasir Ghani

    Abstract: The Internet of Things(IoT) paradigm provides persistent sensing and data collection capabilities and is becoming increasingly prevalent across many market sectors. However, most IoT devices emphasize usability and function over security, making them very vulnerable to malicious exploits. This concern is evidenced by the increased use of compromised IoT devices in large scale bot networks (botnets… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 8 pages, 5 figures

  4. Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution

    Authors: Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno

    Abstract: Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions to tackle the latest threats, many of which may have relatively fewer samples to analyze. This paper presents a machine learning(ML) framework for early ransomw… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 6 pages, 5 figures

  5. Ransomware Detection and Classification Strategies

    Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli

    Abstract: Ransomware uses encryption methods to make data inaccessible to legitimate users. To date a wide range of ransomware families have been developed and deployed, causing immense damage to governments, corporations, and private users. As these cyberthreats multiply, researchers have proposed a range of ransomware detection and classification schemes. Most of these methods use advanced machine learnin… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: 9 pages, 2 figures

  6. An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

    Authors: Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb

    Abstract: Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols. This closed-design paradigm has limited the capability of the switches to proprietary implementations which are hardcoded by vendors, inducing a lengthy, costly, and inflexible process. Recently, data plane programmability has attracted significant attention from both the researc… ▽ More

    Submitted 7 June, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

  7. arXiv:1811.09706  [pdf, other

    cs.NI

    Green Communication with Geolocation

    Authors: Gautam Srivastava, Andrew Fisher, Robert Bryce, Jorge Crichigno

    Abstract: Green communications is the practice of selecting energy efficient communications, networking technologies and products. This process is followed by minimizing resource use whenever possible in all branches of communications. In this day and age, green communication is vital to the footprint we leave on this planet as we move into a completely digital age. One such communication tool is Message Qu… ▽ More

    Submitted 23 November, 2018; originally announced November 2018.

    Comments: 14 pages, 5 figures

  8. arXiv:0909.3558  [pdf, ps, other

    cs.GT cs.NI

    Route Distribution Incentives

    Authors: Joud Khoury, Chaouki T. Abdallah, Kate Krause, Jorge Crichigno

    Abstract: We present an incentive model for route distribution in the context of path vector routing protocols and we focus on the Border Gateway Protocol (BGP). BGP is the de-facto protocol for interdomain routing on the Internet. We model BGP route distribution and computation using a game in which a BGP speaker advertises its prefix to its direct neighbors promising them a reward for further distributi… ▽ More

    Submitted 19 September, 2009; originally announced September 2009.

    Comments: 15 page, lncs format, 2 figures, workshop

    ACM Class: C.2.2; J.4