4.2 Article

Mobile executions of Slow DoS Attacks

期刊

LOGIC JOURNAL OF THE IGPL
卷 24, 期 1, 页码 54-67

出版社

OXFORD UNIV PRESS
DOI: 10.1093/jigpal/jzv043

关键词

Denial of service; slow dos attacks; mobile; cyberwarfare

向作者/读者索取更多资源

Denial of Service attacks are executed to prevent the access to an Internet service by legitimate users. Recently, such attacks evolved to the so called Slow DoS attacks, which are able to reach their goal by using tiny amounts of network bandwidth. In this article we focus on such category of threats: we design an innovative offensive tool, SlowDroid, that may affect multiple protocols requiring minimal resources to the attacker. In virtue of this, the attack can even be executed from a mobile device. We compare the attack with similar already existing tools, measuring the results obtained based on new metrics we introduce, proving that the proposed threat represents a serious menace.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Chemistry, Analytical

A Generative Adversarial Network (GAN) Technique for Internet of Medical Things Data

Ivan Vaccari, Vanessa Orani, Alessia Paglialonga, Enrico Cambiaso, Maurizio Mongelli

Summary: The application of machine learning and artificial intelligence in the medical field is expanding, with a focus on remote monitoring and data augmentation for accurate algorithms. By using generative adversarial networks (GANs) to create synthetic datasets, and validating them through machine learning approaches, the accuracy of the synthetic data can be demonstrated.

SENSORS (2021)

Article Chemistry, Analytical

Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach

Syed Ghazanfar Abbas, Ivan Vaccari, Faisal Hussain, Shahzaib Zahid, Ubaid Ullah Fayyaz, Ghalib A. Shah, Taimur Bakhshi, Enrico Cambiaso

Summary: The Internet of Things (IoT) allows objects to connect to the Internet for meaningful purposes, but also faces increasing security threats, particularly phishing attacks targeting IoT devices. This paper proposes a threat modelling approach to identify and mitigate cyber-threats that may cause phishing attacks, focusing on smart autonomous vehicular systems and smart homes as significant IoT use cases. The proposed approach aims to support IoT researchers, engineers, and policymakers in securing IoT devices and systems during the early design stages for secure deployment in critical infrastructures.

SENSORS (2021)

Article Chemistry, Analytical

Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System

Muhammad Husnain, Khizar Hayat, Enrico Cambiaso, Ubaid U. Fayyaz, Maurizio Mongelli, Habiba Akram, Syed Ghazanfar Abbas, Ghalib A. Shah

Summary: In this paper, a MQTT parsing engine is designed and developed to serve as an initial layer in network-based IDS for extensive checking of IoT protocol vulnerabilities and improper usage. By rigorously validating packet fields, the proposed solution effectively detects and prevents the exploitation of vulnerabilities on IoT protocols.

SENSORS (2022)

Article Biochemical Research Methods

Comparison Between Franz Diffusion Cell and a novel Micro-physiological System for In Vitro Penetration Assay Using Different Skin Models

Ilaria Pulsoni, Markus Lubda, Maurizio Aiello, Arianna Fedi, Monica Marzagalli, Joerg von Hagen, Silvia Scaglione

Summary: In vitro diffusive models are important for evaluating the penetration ability of active ingredients in different formulations. This study compared the Franz Diffusion Cell with a novel fluid-dynamic platform and assessed the penetration ability of caffeine and LIP1. The results showed similar penetration kinetics in both diffusive systems and the fluid-dynamic platform showed better prediction for lipophilic molecules.

SLAS TECHNOLOGY (2022)

Article Biotechnology & Applied Microbiology

A multi-organ-on-chip to recapitulate the infiltration and the cytotoxic activity of circulating NK cells in 3D matrix-based tumor model

Monica Marzagalli, Giorgia Pelizzoni, Arianna Fedi, Chiara Vitale, Fabrizio Fontana, Silvia Bruno, Alessandro Poggi, Alessandra Dondero, Maurizio Aiello, Roberta Castriconi, Cristina Bottino, Silvia Scaglione

Summary: The success of immunotherapeutic approaches depends on the interaction between immune cells and cancer cells. Conventional cell cultures and animal models cannot fully represent the complexity of the tumor microenvironment and the human immune system. Therefore, it is crucial to develop reliable and predictive preclinical models for screening immunotherapeutic approaches. This study presents an organ-on-chip (OOC)-based approach that can mimic the migration of natural killer (NK) cells, infiltration into a 3D tumor matrix, and activation against neuroblastoma cancer cells in a fluid-dynamic environment. The proposed immune-tumor OOC-based model shows promise in faithfully replicating human pathology and effectively testing immunotherapies, potentially in a personalized perspective.

FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY (2022)

Article Computer Science, Artificial Intelligence

Sensitivity of Logic Learning Machine for Reliability in Safety-Critical Systems

Sara Narteni, Vanessa Orani, Ivan Vaccari, Enrico Cambiaso, Maurizio Mongelli

Summary: Nowadays, artificial intelligence is rapidly developing in many fields, leading to the emergence of reliable AI that ensures the safety of autonomous decisions. Sensitivity analysis of explainable AI models can help design safety regions in the feature space with statistical zero error.

IEEE INTELLIGENT SYSTEMS (2022)

Proceedings Paper Computer Science, Information Systems

On The Detection Of Adversarial Attacks Through Reliable AI

Ivan Vaccari, Alberto Carlevaro, Sara Narteni, Enrico Cambiaso, Maurizio Mongelli

Summary: Adversarial machine learning manipulates datasets to deceive machine learning algorithm decisions. In this study, a new approach based on eXplainable and Reliable AI is proposed to detect adversarial attacks. Experimental results demonstrate that canonical algorithms may struggle to identify attacks, while the proposed approach is capable of accurately identifying different adversarial settings.

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)

Article Computer Science, Software Engineering

Web security and data dumping: The Cookidump case

Enrico Cambiaso, Maurizio Aiello

Summary: In this paper, the authors discuss the impact of legitimate data dumping activities, specifically scraping/storing data shown on browsers, in the web security field. They propose Cookidump as a tool to evaluate the dumping of all available recipes on the Cookidoo (c) website portal. Although the focus is on recipe dumping, the authors also discuss the potential impact of such activities for other web applications hosting sensitive information.

SOFTWARE IMPACTS (2022)

Article Computer Science, Information Systems

eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics

Ivan Vaccari, Alberto Carlevaro, Sara Narteni, Enrico Cambiaso, Maurizio Mongelli

Summary: This article discusses the wide adoption of machine learning algorithms and the concept of adversarial machine learning attacks. The research proposes new approaches to detect and mitigate these attacks and compares their performance to traditional algorithms.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

On the Intersection of Explainable and Reliable AI for Physical Fatigue Prediction

Sara Narteni, Vanessa Orani, Enrico Cambiaso, Matteo Rucco, Maurizio Mongelli

Summary: In this study, the use of eXplainable AI (XAI) in detecting physical fatigue during manual material handling task simulation is explored. Global rule-based XAI models (LLM and DT) are compared to black-box models (NN, SVM, XGBoost) in terms of performance, and global models are also compared to local ones (LIME over XGBoost). Surprisingly, both global and local approaches yield similar conclusions in terms of feature importance.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Information Systems

DoS Attacks in Available MQTT Implementations

Umberto Morelli, Ivan Vaccari, Silvio Ranise, Enrico Cambiaso

Summary: The Internet of Things is a widely adopted and pervasive technology that is also vulnerable to attacks due to the volume of shared data and the availability of insecure products. This paper investigates two denial of service attacks targeting MQTT message queues, demonstrating their effectiveness and proposing mitigations in open-source MQTT implementations. The research results are integrated into the MQTTSA tool to improve security awareness in MQTT-based deployments.

ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (2021)

Proceedings Paper Computer Science, Artificial Intelligence

From Explainable to Reliable Artificial Intelligence

Sara Narteni, Melissa Ferretti, Vanessa Orani, Ivan Vaccari, Enrico Cambiaso, Maurizio Mongelli

Summary: This study proposes a solution based on eXplainable AI models to define safety regions in the feature space, aiming to reduce false negatives. The results show that the effectiveness of the algorithms strongly depends on the level of noise in the dataset.

MACHINE LEARNING AND KNOWLEDGE EXTRACTION (CD-MAKE 2021) (2021)

Article Computer Science, Information Systems

Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities

Ivan Vaccari, Sara Narteni, Maurizio Aiello, Maurizio Mongelli, Enrico Cambiaso

Summary: The Internet of Things is a widely adopted technology that is also highly relevant in cybersecurity due to the volume and sensitivity of data shared and the availability of affordable but insecure products. This paper proposes a novel cyber threat using the MQTT protocol for tunneling attacks in IoT networks, which could be used by malicious users to steal sensitive information. Experimental results show that using MQTT for tunneling purposes is effective, especially for payloads up to 3000 bytes. Additionally, the study presents a machine learning-based approach to detect the proposed MQTT tunneling attack, with some algorithms achieving over 95% accuracy in identifying the attack.

IEEE ACCESS (2021)

暂无数据