{"id":1412,"date":"2018-08-01T20:03:46","date_gmt":"2018-08-01T20:03:46","guid":{"rendered":"http:\/\/cricca.disi.unitn.it\/montresor\/?page_id=1412"},"modified":"2018-08-01T21:06:49","modified_gmt":"2018-08-01T21:06:49","slug":"autonomic-security","status":"publish","type":"page","link":"http:\/\/cricca.disi.unitn.it\/montresor\/research\/topics\/autonomic-security\/","title":{"rendered":"Autonomic security"},"content":{"rendered":"<p class=\"noindent\">Thanks to an Italian-fun\u00added pro\u00adject cal\u00adled&nbsp;<span class=\"cmti-10\">Autonomic Security<\/span>, we have inve\u00adsti\u00adga\u00adted the secu\u00adri\u00adty impli\u00adca\u00adtions of lar\u00adge-sca\u00adle, decen\u00adtra\u00adli\u00adzed, open distri\u00adbu\u00adted systems. Three resul\u00adts have been published:<\/p>\n<ul class=\"itemize1\">\n<li class=\"itemize\">Secure peer sam\u00adpling&nbsp;<span class=\"cite\">[<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/cops09.pdf\"><span class=\"caps\">COPS09<\/span><\/a>][<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/comnet10.pdf\">ComNet10<\/a>]<\/span><\/li>\n<li class=\"itemize\">Botnet mode\u00adli\u00adza\u00adtion&nbsp;<span class=\"cite\">[<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/icc10.pdf\"><span class=\"caps\">ICC10<\/span><\/a>]<\/span><\/li>\n<li>Security in video strea\u00adming ser\u00advi\u00adces&nbsp;<span class=\"cite\">[<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/ppna10.pdf\"><span class=\"caps\">PPNA11<\/span><\/a>]<\/span><\/li>\n<\/ul>\n<hr>\n<p><span class=\"biblabel\">[<span class=\"caps\">COPS09<\/span>]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span>Gian&nbsp;Paolo Jesi and Alberto Montresor. Secure peer sam\u00adpling ser\u00advi\u00adce: the mosqui\u00adto attack. In&nbsp;<span class=\"cmti-10\">Proc. of the 5th <span class=\"caps\">WETICE<\/span> Workshop on<\/span>&nbsp;<span class=\"cmti-10\">Collaborative Peer-to-Peer Systems (<span class=\"caps\">COPS<\/span>\u201909)<\/span>. <span class=\"caps\">IEEE<\/span>, Groningen, The Netherlands, July 2009.&nbsp;<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/cops09.pdf\">[<span class=\"caps\">PDF<\/span>]<\/a>,<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/refs\/cops09.bib\">[Bibtex]<\/a>.<\/p>\n<p><span class=\"biblabel\">[ComNet10]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span>Gian&nbsp;Paolo Jesi, Alberto Montresor, and Maarten van Steen. Secure peer sam\u00adpling.&nbsp;<span class=\"cmti-10\">Computer Networks<\/span>, 54(13):2086\u20132098, June 2010.&nbsp;<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/comnet10.pdf\">[<span class=\"caps\">PDF<\/span>]&nbsp;<\/a>,&nbsp;<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/refs\/comnet10.bib\">[Bibtex]<\/a>.<\/p>\n<p><span class=\"biblabel\">[<span class=\"caps\">ICC10<\/span>]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span>Marco Ajelli, Renato&nbsp;Lo Cigno, and Alberto Montresor. Modeling bot\u00adne\u00adts and epi\u00adde\u00admic mal\u00adware. In&nbsp;<span class=\"cmti-10\">Proc. of the Int. Communications<\/span>&nbsp;<span class=\"cmti-10\">Conference (<span class=\"caps\">ICC<\/span>\u201910)<\/span>. <span class=\"caps\">IEEE<\/span>, May 2010.&nbsp;<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/icc10.pdf\">[<span class=\"caps\">PDF<\/span>]<\/a>,&nbsp;<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/refs\/icc10.bib\">[Bibtex]<\/a><\/span><\/p>\n<p><span class=\"biblabel\">[<span class=\"caps\">PPNA11<\/span>]<span class=\"bibsp\">&nbsp;&nbsp;&nbsp;<\/span><\/span>Gabriela Gheorghe, Renato&nbsp;Lo Cigno, and Alberto Montresor. Security and pri\u00adva\u00adcy issues in <span class=\"caps\">P2P<\/span> strea\u00adming systems: A sur\u00advey.&nbsp;<span class=\"cmti-10\">Peer-to-Peer Networking and Application<\/span>, 4(2):75\u201391, 2011.&nbsp;<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/papers\/ppna10.pdf\">[<span class=\"caps\">PDF<\/span>]<\/a>,&nbsp;<a href=\"http:\/\/disi.unitn.it\/~montreso\/pubs\/refs\/ppna11.bib\">[Bibtex]<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thanks to an Italian-fun\u00ad\u00added pro\u00adject cal\u00adled&nbsp;Autonomic Security, we have inve\u00adsti\u00adga\u00adted the secu\u00adri\u00adty impli\u00adca\u00adtions of lar\u00ad\u00adge-sca\u00ad\u00adle, decen\u00adtra\u00adli\u00adzed, open distri\u00adbu\u00adted systems. Three resul\u00adts have been publi\u00adshed: Secure peer sam\u00adpling&nbsp;[<span class=\"caps\">COPS09<\/span>][ComNet10] Botnet mode\u00adli\u00adza\u00adtion&nbsp;[<span class=\"caps\">ICC10<\/span>] Security in video strea\u00adming ser\u00advi\u00adces&nbsp;[<span class=\"caps\">PPNA11<\/span>] [<span class=\"caps\">COPS09<\/span>]&nbsp;&nbsp;&nbsp;Gian&nbsp;Paolo Jesi and Alberto Montresor. Secure peer sam\u00adpling ser\u00advi\u00adce: the mosqui\u00adto attack. In&nbsp;Proc. of the 5th <span class=\"caps\">WETICE<\/span> Workshop on&nbsp;Collaborative Peer-to-Peer Systems&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1394,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"footnotes":""},"class_list":["post-1412","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/pages\/1412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/comments?post=1412"}],"version-history":[{"count":5,"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/pages\/1412\/revisions"}],"predecessor-version":[{"id":1442,"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/pages\/1412\/revisions\/1442"}],"up":[{"embeddable":true,"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/pages\/1394"}],"wp:attachment":[{"href":"http:\/\/cricca.disi.unitn.it\/montresor\/wp-json\/wp\/v2\/media?parent=1412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}