Skip to main content

Showing 1–25 of 25 results for author: Mellia, M

  1. arXiv:2405.10545  [pdf, other

    cs.NI

    Dynamic Cluster Analysis to Detect and Track Novelty in Network Telescopes

    Authors: Kai Huang, Luca Gioacchini, Marco Mellia, Luca Vassio

    Abstract: In the context of cybersecurity, tracking the activities of coordinated hosts over time is a daunting task because both participants and their behaviours evolve at a fast pace. We address this scenario by solving a dynamic novelty discovery problem with the aim of both re-identifying patterns seen in the past and highlighting new patterns. We focus on traffic collected by Network Telescopes, a pri… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  2. arXiv:2405.02649  [pdf, other

    cs.LG cs.AI

    Generic Multi-modal Representation Learning for Network Traffic Analysis

    Authors: Luca Gioacchini, Idilio Drago, Marco Mellia, Zied Ben Houidi, Dario Rossi

    Abstract: Network traffic analysis is fundamental for network management, troubleshooting, and security. Tasks such as traffic classification, anomaly detection, and novelty discovery are fundamental for extracting operational information from network data and measurements. We witness the shift from deep packet inspection and basic machine learning to Deep Learning (DL) approaches where researchers define a… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

  3. arXiv:2402.18321  [pdf, other

    cs.CY

    Privacy Policies and Consent Management Platforms: Growth and Users' Interactions over Time

    Authors: Nikhil Jha, Martino Trevisan, Marco Mellia, Daniel Fernandez, Rodrigo Irarrazaval

    Abstract: In response to growing concerns about user privacy, legislators have introduced new regulations and laws such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) that force websites to obtain user consent before activating personal data collection, fundamental to providing targeted advertising. The cornerstone of this consent-seeking process involves the… ▽ More

    Submitted 29 February, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  4. arXiv:2312.13784  [pdf, other

    cs.NE cs.SI

    Benchmarking Evolutionary Community Detection Algorithms in Dynamic Networks

    Authors: Giordano Paoletti, Luca Gioacchini, Marco Mellia, Luca Vassio, Jussara M. Almeida

    Abstract: In dynamic complex networks, entities interact and form network communities that evolve over time. Among the many static Community Detection (CD) solutions, the modularity-based Louvain, or Greedy Modularity Algorithm (GMA), is widely employed in real-world applications due to its intuitiveness and scalability. Nevertheless, addressing CD in dynamic graphs remains an open problem, since the evolut… ▽ More

    Submitted 11 January, 2024; v1 submitted 21 December, 2023; originally announced December 2023.

    Comments: Accepted at the 4th Workshop on Graphs and more Complex structures for Learning and Reasoning (GCLR) at AAAI 2024

    Journal ref: 4th Workshop on Graphs and more Complex structures for Learning and Reasoning (GCLR) at AAAI 2024

  5. arXiv:2310.07005  [pdf, other

    cs.CR cs.LG

    Sound-skwatter (Did You Mean: Sound-squatter?) AI-powered Generator for Phishing Prevention

    Authors: Rodolfo Valentim, Idilio Drago, Marco Mellia, Federico Cerutti

    Abstract: Sound-squatting is a phishing attack that tricks users into malicious resources by exploiting similarities in the pronunciation of words. Proactive defense against sound-squatting candidates is complex, and existing solutions rely on manually curated lists of homophones. We here introduce Sound-skwatter, a multi-language AI-based system that generates sound-squatting candidates for proactive defen… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  6. LogPrécis: Unleashing Language Models for Automated Malicious Log Analysis

    Authors: Matteo Boffa, Rodolfo Vieira Valentim, Luca Vassio, Danilo Giordano, Idilio Drago, Marco Mellia, Zied Ben Houidi

    Abstract: The collection of security-related logs holds the key to understanding attack behaviors and diagnosing vulnerabilities. Still, their analysis remains a daunting challenge. Recently, Language Models (LMs) have demonstrated unmatched potential in understanding natural and programming languages. The question arises whether and how LMs could be also useful for security experts since their logs contain… ▽ More

    Submitted 22 March, 2024; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: 18 pages, Computer&Security (https://www.sciencedirect.com/science/article/pii/S0167404824001068), code available at https://github.com/SmartData-Polito/logprecis, models available at https://huggingface.co/SmartDataPolito

    Journal ref: Computers & Security, 2024, 103805, ISSN 0167-4048

  7. arXiv:2306.05094  [pdf, other

    cs.CY cs.CR

    On the Robustness of Topics API to a Re-Identification Attack

    Authors: Nikhil Jha, Martino Trevisan, Emilio Leonardi, Marco Mellia

    Abstract: Web tracking through third-party cookies is considered a threat to users' privacy and is supposed to be abandoned in the near future. Recently, Google proposed the Topics API framework as a privacy-friendly alternative for behavioural advertising. Using this approach, the browser builds a user profile based on navigation history, which advertisers can access. The Topics API has the possibility of… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: Privacy Enhancing Technologies Symposium (PETS) 2023

  8. arXiv:2303.11746  [pdf, other

    cs.IR cs.CY cs.LG

    Recommendation Systems in Libraries: an Application with Heterogeneous Data Sources

    Authors: Alessandro Speciale, Greta Vallero, Luca Vassio, Marco Mellia

    Abstract: The Reading&Machine project exploits the support of digitalization to increase the attractiveness of libraries and improve the users' experience. The project implements an application that helps the users in their decision-making process, providing recommendation system (RecSys)-generated lists of books the users might be interested in, and showing them through an interactive Virtual Reality (VR)-… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted at 7th International workshop on Data Analytics solutions for Real-LIfe APplications - 28th March-31st March, 2023, Ioannina, Greece. The paper will be published in the Proceedings of EDBT/ICDT 2023 Joint Conference

  9. arXiv:2303.04073  [pdf, other

    cs.NI

    Operationalizing AI in Future Networks: A Bird's Eye View from the System Perspective

    Authors: Qiong Liu, Tianzhu Zhang, Masoud Hemmatpour, Han Qiu, Dong Zhang, Chung Shue Chen, Marco Mellia, Armen Aghasaryan

    Abstract: Modern Artificial Intelligence (AI) technologies, led by Machine Learning (ML), have gained unprecedented momentum over the past decade. Following this wave of "AI summer", the network research community has also embraced AI/ML algorithms to address many problems related to network operations and management. However, compared to their counterparts in other domains, most ML-based solutions have yet… ▽ More

    Submitted 25 June, 2024; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  10. arXiv:2111.06161  [pdf, other

    cs.NI cs.LG cs.SI

    Understanding mobility in networks: A node embedding approach

    Authors: Matheus F. C. Barros, Carlos H. G. Ferreira, Bruno Pereira dos Santos, Lourenço A. P. Júnior, Marco Mellia, Jussara M. Almeida

    Abstract: Motivated by the growing number of mobile devices capable of connecting and exchanging messages, we propose a methodology aiming to model and analyze node mobility in networks. We note that many existing solutions in the literature rely on topological measurements calculated directly on the graph of node contacts, aiming to capture the notion of the node's importance in terms of connectivity and m… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  11. On the Dynamics of Political Discussions on Instagram: A Network Perspective

    Authors: Carlos H. G. Ferreira, Fabricio Murai, Ana P. C. Silva, Jussara M. Almeida, Martino Trevisan, Luca Vassio, Marco Mellia, Idilio Drago

    Abstract: Instagram has been increasingly used as a source of information especially among the youth. As a result, political figures now leverage the platform to spread opinions and political agenda. We here analyze online discussions on Instagram, notably in political topics, from a network perspective. Specifically, we investigate the emergence of communities of co-commenters, that is, groups of users who… ▽ More

    Submitted 13 September, 2022; v1 submitted 19 September, 2021; originally announced September 2021.

    Journal ref: Online Social Networks and Media, Volume 25, 2021, ISSN 2468-6964

  12. arXiv:2109.00395  [pdf, other

    cs.CR cs.NI

    The Internet with Privacy Policies: Measuring The Web Upon Consent

    Authors: Nikhil Jha, Martino Trevisan, Luca Vassio, Marco Mellia

    Abstract: To protect users' privacy, legislators have regulated the usage of tracking technologies, mandating the acquisition of users' consent before collecting data. Consequently, websites started showing more and more consent management modules -- i.e., Privacy Banners -- the visitors have to interact with to access the website content. They challenge the automatic collection of Web measurements, primari… ▽ More

    Submitted 13 September, 2022; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: ACM Transactions on the Web (2022)

  13. z-anonymity: Zero-Delay Anonymization for Data Streams

    Authors: Nikhil Jha, Thomas Favale, Luca Vassio, Martino Trevisan, Marco Mellia

    Abstract: With the advent of big data and the birth of the data markets that sell personal information, individuals' privacy is of utmost importance. The classical response is anonymization, i.e., sanitizing the information that can directly or indirectly allow users' re-identification. The most popular solution in the literature is the k-anonymity. However, it is hard to achieve k-anonymity on a continuous… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Journal ref: In 2020 IEEE International Conference on Big Data (Big Data), pp. 3996-4005. IEEE, 2020

  14. RL-IoT: Reinforcement Learning to Interact with IoT Devices

    Authors: Giulia Milan, Luca Vassio, Idilio Drago, Marco Mellia

    Abstract: Our life is getting filled by Internet of Things (IoT) devices. These devices often rely on closed or poorly documented protocols, with unknown formats and semantics. Learning how to interact with such devices in an autonomous manner is the key for interoperability and automatic verification of their capabilities. In this paper, we propose RL-IoT, a system that explores how to automatically intera… ▽ More

    Submitted 10 September, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: 9 pages, 11 figures, 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)

  15. Campus Traffic and e-Learning during COVID-19 Pandemic

    Authors: Thomas Favale, Francesca Soro, Martino Trevisan, Idilio Drago, Marco Mellia

    Abstract: The COVID-19 pandemic led to the adoption of severe measures to counteract the spread of the infection. Social distancing and lockdown measures modifies people's habits, while the Internet gains a major role to support remote working, e-teaching, online collaboration, gaming, video streaming, etc. All these sudden changes put unprecedented stress on the network. In this paper we analyze the impact… ▽ More

    Submitted 8 May, 2020; v1 submitted 28 April, 2020; originally announced April 2020.

    Comments: Please cite this article as: Thomas Favale, Francesca Soro, Martino Trevisan, Idilio Drago, Marco Mellia, Campus Traffic and e-Learning during COVID-19 Pandemic, Computer Networks (2020), DOI: https://doi.org/10.1016/j.comnet.2020.107290

  16. EXPLAIN-IT: Towards Explainable AI for Unsupervised Network Traffic Analysis

    Authors: Andrea Morichetta, Pedro Casas, Marco Mellia

    Abstract: The application of unsupervised learning approaches, and in particular of clustering techniques, represents a powerful exploration means for the analysis of network measurements. Discovering underlying data characteristics, grouping similar measurements together, and identifying eventual patterns of interest are some of the applications which can be tackled through clustering. Being unsupervised,… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

    Journal ref: 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks (Big-DAMA 2019)

  17. A Survey on Big Data for Network Traffic Monitoring and Analysis

    Authors: Alessandro D'Alconzo, Idilio Drago, Andrea Morichetta, Marco Mellia, Pedro Casas

    Abstract: Network Traffic Monitoring and Analysis (NTMA) represents a key component for network management, especially to guarantee the correct operation of large-scale networks such as the Internet. As the complexity of Internet services and the volume of traffic continue to increase, it becomes difficult to design scalable NTMA applications. Applications such as traffic classification and policing require… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

    Journal ref: IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 800-813, Sept. 2019

  18. arXiv:2001.06420  [pdf, other

    cs.NI cs.CR

    IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing

    Authors: Maurizio Aiello, Enrico Cambiaso, Roberto Canonico, Leonardo Maccari, Marco Mellia, Antonio Pescapè, Ivan Vaccari

    Abstract: Online trackers personalize ads campaigns, exponentially increasing their efficacy compared to traditional channels. The downside of this is that thousands of mostly unknown systems own our profiles and violate our privacy without our awareness. IPPO turns the table and re-empower users of their data, through anonymised data publishing via a Blockchain-based Decentralized Data Marketplace. We also… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

  19. Towards Understanding Political Interactions on Instagram

    Authors: Martino Trevisan, Luca Vassio, Idilio Drago, Marco Mellia, Fabricio Murai, Flavio Figueiredo, Ana Paula Couto da Silva, Jussara M. Almeida

    Abstract: Online Social Networks (OSNs) allow personalities and companies to communicate directly with the public, bypassing filters of traditional medias. As people rely on OSNs to stay up-to-date, the political debate has moved online too. We witness the sudden explosion of harsh political debates and the dissemination of rumours in OSNs. Identifying such behaviour requires a deep understanding on how peo… ▽ More

    Submitted 4 May, 2021; v1 submitted 26 April, 2019; originally announced April 2019.

    Comments: 5 pages, 8 figures, Proceedings of the 30th ACM Conference on Hypertext and Social Media, https://dl.acm.org/doi/10.1145/3342220.3343657

    Journal ref: HT19: Proceedings of the 30th ACM Conference on Hypertext and Social Media. September 2019. Pages 247-251. Association for Computing Machinery

  20. arXiv:1806.07158  [pdf, other

    cs.CY cs.NI

    You, the Web and Your Device: Longitudinal Characterization of Browsing Habits

    Authors: Luca Vassio, Idilio Drago, Marco Mellia, Zied Ben Houidi, Mohamed Lamine Lamali

    Abstract: Understanding how people interact with the web is key for a variety of applications, e.g., from the design of effective web pages to the definition of successful online marketing campaigns. Browsing behavior has been traditionally represented and studied by means of clickstreams, i.e., graphs whose vertices are web pages, and edges are the paths followed by users. Obtaining large and representativ… ▽ More

    Submitted 4 May, 2021; v1 submitted 19 June, 2018; originally announced June 2018.

    Comments: 30 pages. ACM Transactions on the Web. 12, 4, Article 24 (November 2018), 30 pages

    Journal ref: ACM Trans. Web 12, 4, Article 24 (November 2018), 30 pages

  21. Uncovering the Flop of the EU Cookie Law

    Authors: Martino Trevisan, Stefano Traverso, Hassan Metwalley, Marco Mellia

    Abstract: In 2002, the European Union (EU) introduced the ePrivacy Directive to regulate the usage of online tracking technologies. Its aim is to make tracking mechanisms explicit while increasing privacy awareness in users. It mandates websites to ask for explicit consent before using any kind of profiling methodology, e.g., cookies. Starting from 2013 the Directive is mandatory, and now most of European w… ▽ More

    Submitted 2 May, 2019; v1 submitted 24 May, 2017; originally announced May 2017.

    Comments: An updated version of this study has been accepted at PoPETS 2019 and it is available at: https://petsymposium.org/2019/files/papers/issue2/popets-2019-0023.pdf

    Journal ref: Proceedings on Privacy Enhancing Technologies, Volume 2019, Issue 2

  22. arXiv:1602.06678  [pdf, other

    cs.HC cs.SI

    WeBrowse: Mining HTTP logs online for network-based content recommendation

    Authors: Giuseppe Scavo, Zied Ben Houidi, Stefano Traverso, Renata Teixeira, Marco Mellia

    Abstract: A powerful means to help users discover new content in the overwhelming amount of information available today is sharing in online communities such as social networks or crowdsourced platforms. This means comes short in the case of what we call communities of a place: people who study, live or work at the same place. Such people often share common interests but either do not know each other or fai… ▽ More

    Submitted 25 February, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: 13 pages, 10 figures, 4 tables, 1 algorithm

  23. arXiv:1505.00946  [pdf

    cs.NI

    A First Look at Anycast CDN Traffic

    Authors: Danilo Cicalese, Danilo Giordano, Alessandro Finamore, Marco Mellia, Maurizio Munafò, Dario Rossi, Diana Joumblatt

    Abstract: Anycast routing is an IP solution that allows packets to be routed to the topologically nearest server. Over the last years it has been commonly adopted to manage some services running on top of UDP, e.g., public DNS resolvers, multicast rendez-vous points, etc. However, recently the Internet have witnessed the growth of new Anycast-enabled Content Delivery Networks (A-CDNs) such as CloudFlare and… ▽ More

    Submitted 12 March, 2021; v1 submitted 5 May, 2015; originally announced May 2015.

    Comments: D. Giordano, D. Cicalese, A. Finamore, M. Mellia, M. Munafò, D. Z. Joumblatt, et al., "A first characterization of anycast traffic from passive traces", Proceedings of the IFIP Traffic Monitoring and Analysis Workshop (TMA), 2016

  24. arXiv:1503.05426  [pdf, other

    cs.NI

    YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes

    Authors: Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar, Sabyasachi Saha

    Abstract: YouTube relies on a massively distributed Content Delivery Network (CDN) to stream the billions of videos in its catalogue. Unfortunately, very little information about the design of such CDN is available. This, combined with the pervasiveness of YouTube, poses a big challenge for Internet Service Providers (ISPs), which are compelled to optimize end-users' Quality of Experience (QoE) while having… ▽ More

    Submitted 18 March, 2015; originally announced March 2015.

  25. arXiv:1502.07106  [pdf, ps, other

    cs.CY cs.CR cs.NI

    CrowdSurf: Empowering Informed Choices in the Web

    Authors: Hassan Metwalley, Stefano Traverso, Marco Mellia, Stanislav Miskovic, Mario Baldi

    Abstract: When surfing the Internet, individuals leak personal and corporate information to third parties whose (legitimate or not) businesses revolve around the value of collected data. The implications are serious, from a person unwillingly exposing private information to an unknown third party, to a company unable to manage the flow of its information to the outside world. The point is that individuals a… ▽ More

    Submitted 25 February, 2015; originally announced February 2015.