Skip to main content

Showing 1–11 of 11 results for author: Drago, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.03225  [pdf, other

    cs.CR cs.AI

    AutoPenBench: Benchmarking Generative Agents for Penetration Testing

    Authors: Luca Gioacchini, Marco Mellia, Idilio Drago, Alexander Delsanto, Giuseppe Siracusano, Roberto Bifulco

    Abstract: Generative AI agents, software systems powered by Large Language Models (LLMs), are emerging as a promising approach to automate cybersecurity tasks. Among the others, penetration testing is a challenging field due to the task complexity and the diverse strategies to simulate cyber-attacks. Despite growing interest and initial studies in automating penetration testing with generative agents, there… ▽ More

    Submitted 28 October, 2024; v1 submitted 4 October, 2024; originally announced October 2024.

    Comments: Codes for the benchmark: https://github.com/lucagioacchini/auto-pen-bench Codes for the paper experiments: https://github.com/lucagioacchini/genai-pentest-paper

  2. arXiv:2405.02649  [pdf, other

    cs.LG cs.AI

    Generic Multi-modal Representation Learning for Network Traffic Analysis

    Authors: Luca Gioacchini, Idilio Drago, Marco Mellia, Zied Ben Houidi, Dario Rossi

    Abstract: Network traffic analysis is fundamental for network management, troubleshooting, and security. Tasks such as traffic classification, anomaly detection, and novelty discovery are fundamental for extracting operational information from network data and measurements. We witness the shift from deep packet inspection and basic machine learning to Deep Learning (DL) approaches where researchers define a… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

  3. arXiv:2310.07005  [pdf, other

    cs.CR cs.LG

    Sound-skwatter (Did You Mean: Sound-squatter?) AI-powered Generator for Phishing Prevention

    Authors: Rodolfo Valentim, Idilio Drago, Marco Mellia, Federico Cerutti

    Abstract: Sound-squatting is a phishing attack that tricks users into malicious resources by exploiting similarities in the pronunciation of words. Proactive defense against sound-squatting candidates is complex, and existing solutions rely on manually curated lists of homophones. We here introduce Sound-skwatter, a multi-language AI-based system that generates sound-squatting candidates for proactive defen… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  4. LogPrécis: Unleashing Language Models for Automated Malicious Log Analysis

    Authors: Matteo Boffa, Rodolfo Vieira Valentim, Luca Vassio, Danilo Giordano, Idilio Drago, Marco Mellia, Zied Ben Houidi

    Abstract: The collection of security-related logs holds the key to understanding attack behaviors and diagnosing vulnerabilities. Still, their analysis remains a daunting challenge. Recently, Language Models (LMs) have demonstrated unmatched potential in understanding natural and programming languages. The question arises whether and how LMs could be also useful for security experts since their logs contain… ▽ More

    Submitted 22 March, 2024; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: 18 pages, Computer&Security (https://www.sciencedirect.com/science/article/pii/S0167404824001068), code available at https://github.com/SmartData-Polito/logprecis, models available at https://huggingface.co/SmartDataPolito

    Journal ref: Computers & Security, 2024, 103805, ISSN 0167-4048

  5. On the Dynamics of Political Discussions on Instagram: A Network Perspective

    Authors: Carlos H. G. Ferreira, Fabricio Murai, Ana P. C. Silva, Jussara M. Almeida, Martino Trevisan, Luca Vassio, Marco Mellia, Idilio Drago

    Abstract: Instagram has been increasingly used as a source of information especially among the youth. As a result, political figures now leverage the platform to spread opinions and political agenda. We here analyze online discussions on Instagram, notably in political topics, from a network perspective. Specifically, we investigate the emergence of communities of co-commenters, that is, groups of users who… ▽ More

    Submitted 13 September, 2022; v1 submitted 19 September, 2021; originally announced September 2021.

    Journal ref: Online Social Networks and Media, Volume 25, 2021, ISSN 2468-6964

  6. RL-IoT: Reinforcement Learning to Interact with IoT Devices

    Authors: Giulia Milan, Luca Vassio, Idilio Drago, Marco Mellia

    Abstract: Our life is getting filled by Internet of Things (IoT) devices. These devices often rely on closed or poorly documented protocols, with unknown formats and semantics. Learning how to interact with such devices in an autonomous manner is the key for interoperability and automatic verification of their capabilities. In this paper, we propose RL-IoT, a system that explores how to automatically intera… ▽ More

    Submitted 10 September, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: 9 pages, 11 figures, 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)

  7. Measuring HTTP/3: Adoption and Performance

    Authors: Martino Trevisan, Danilo Giordano, Idilio Drago, Ali Safari Khatouni

    Abstract: The third version of the Hypertext Transfer Protocol (HTTP) is currently in its final standardization phase by the IETF. Besides better security and increased flexibility, it promises benefits in terms of performance. HTTP/3 adopts a more efficient header compression schema and replaces TCP with QUIC, a transport protocol carried over UDP, originally proposed by Google and currently under standard… ▽ More

    Submitted 10 November, 2021; v1 submitted 24 February, 2021; originally announced February 2021.

    Journal ref: 19th Mediterranean Communication and Computer Networking Conference (2021)

  8. Campus Traffic and e-Learning during COVID-19 Pandemic

    Authors: Thomas Favale, Francesca Soro, Martino Trevisan, Idilio Drago, Marco Mellia

    Abstract: The COVID-19 pandemic led to the adoption of severe measures to counteract the spread of the infection. Social distancing and lockdown measures modifies people's habits, while the Internet gains a major role to support remote working, e-teaching, online collaboration, gaming, video streaming, etc. All these sudden changes put unprecedented stress on the network. In this paper we analyze the impact… ▽ More

    Submitted 8 May, 2020; v1 submitted 28 April, 2020; originally announced April 2020.

    Comments: Please cite this article as: Thomas Favale, Francesca Soro, Martino Trevisan, Idilio Drago, Marco Mellia, Campus Traffic and e-Learning during COVID-19 Pandemic, Computer Networks (2020), DOI: https://doi.org/10.1016/j.comnet.2020.107290

  9. A Survey on Big Data for Network Traffic Monitoring and Analysis

    Authors: Alessandro D'Alconzo, Idilio Drago, Andrea Morichetta, Marco Mellia, Pedro Casas

    Abstract: Network Traffic Monitoring and Analysis (NTMA) represents a key component for network management, especially to guarantee the correct operation of large-scale networks such as the Internet. As the complexity of Internet services and the volume of traffic continue to increase, it becomes difficult to design scalable NTMA applications. Applications such as traffic classification and policing require… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

    Journal ref: IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 800-813, Sept. 2019

  10. Towards Understanding Political Interactions on Instagram

    Authors: Martino Trevisan, Luca Vassio, Idilio Drago, Marco Mellia, Fabricio Murai, Flavio Figueiredo, Ana Paula Couto da Silva, Jussara M. Almeida

    Abstract: Online Social Networks (OSNs) allow personalities and companies to communicate directly with the public, bypassing filters of traditional medias. As people rely on OSNs to stay up-to-date, the political debate has moved online too. We witness the sudden explosion of harsh political debates and the dissemination of rumours in OSNs. Identifying such behaviour requires a deep understanding on how peo… ▽ More

    Submitted 4 May, 2021; v1 submitted 26 April, 2019; originally announced April 2019.

    Comments: 5 pages, 8 figures, Proceedings of the 30th ACM Conference on Hypertext and Social Media, https://dl.acm.org/doi/10.1145/3342220.3343657

    Journal ref: HT19: Proceedings of the 30th ACM Conference on Hypertext and Social Media. September 2019. Pages 247-251. Association for Computing Machinery

  11. arXiv:1806.07158  [pdf, other

    cs.CY cs.NI

    You, the Web and Your Device: Longitudinal Characterization of Browsing Habits

    Authors: Luca Vassio, Idilio Drago, Marco Mellia, Zied Ben Houidi, Mohamed Lamine Lamali

    Abstract: Understanding how people interact with the web is key for a variety of applications, e.g., from the design of effective web pages to the definition of successful online marketing campaigns. Browsing behavior has been traditionally represented and studied by means of clickstreams, i.e., graphs whose vertices are web pages, and edges are the paths followed by users. Obtaining large and representativ… ▽ More

    Submitted 4 May, 2021; v1 submitted 19 June, 2018; originally announced June 2018.

    Comments: 30 pages. ACM Transactions on the Web. 12, 4, Article 24 (November 2018), 30 pages

    Journal ref: ACM Trans. Web 12, 4, Article 24 (November 2018), 30 pages