Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alberto Dainotti is active.

Publication


Featured researches published by Alberto Dainotti.


IEEE Network | 2012

Issues and future directions in traffic classification

Alberto Dainotti; Antonio Pescapé; Kimberly C. Claffy

Traffic classification technology has increased in relevance this decade, as it is now used in the definition and implementation of mechanisms for service differentiation, network design and engineering, security, accounting, advertising, and research. Over the past 10 years the research community and the networking industry have investigated, proposed and developed several classification approaches. While traffic classification techniques are improving in accuracy and efficiency, the continued proliferation of different Internet application behaviors, in addition to growing incentives to disguise some applications to avoid filtering or blocking, are among the reasons that traffic classification remains one of many open problems in Internet research. In this article we review recent achievements and discuss future directions in traffic classification, along with their trade-offs in applicability, reliability, and privacy. We outline the persistently unsolved challenges in the field over the last decade, and suggest several strategies for tackling these challenges to promote progress in the science of Internet traffic classification.


Computer Networks | 2012

A tool for the generation of realistic network workload for emerging networking scenarios

Alessio Botta; Alberto Dainotti; Antonio Pescapé

Internet workload is a mix of many and complex sources. Therefore, its accurate and realistic replication is a difficult and challenging task. Such difficulties are exacerbated by the multidimensional heterogeneity and scale of the current Internet combined with its constant evolution. The study and generation of network workload is a moving target, both in terms of actors (devices, access networks, protocols, applications, services) and in terms of case studies (the interest expands from performance analysis to topics like network neutrality and security). In order to keep up with the new questions that arise and with the consequent new technical challenges, networking research needs to continuously update its tools. In this paper, we describe the main properties that a network workload generator should have today, and we present a tool for the generation of realistic network workload that can be used for the study of emerging networking scenarios. In particular, we discuss (i) how it tackles the main issues challenging the representative replication of network workload, and (ii) our design choices and its advanced features that make it suitable to analyze complex and emerging network scenarios. To highlight how our tool advances the state-of-the-art, we finally report some experimental results related to the study of hot topics like (a) broadband Internet performance and network neutrality violations; (b) RFC-based security and performance assessment of home network devices; (c) performance analysis of multimedia communications.


Computer Networks | 2009

Traffic analysis of peer-to-peer IPTV communities

Thomas Silverston; Olivier Fourmaux; Alessio Botta; Alberto Dainotti; Antonio Pescapé; Giorgio Ventre; Kavé Salamatian

The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communities. In this work we present a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network. In particular, we provide novel results on the (i) ports and protocols used; (ii) differences between signaling and video traffic; (iii) behavior of the traffic at different time scales; (iv) differences between TCP and UDP traffic; (v) traffic generated and received by peers; (vi) peers neighborhood and session duration. The knowledge gained thanks to this analysis is useful for several tasks, e.g. traffic identification, understanding the performance of different P2P IPTV technologies and the impact of such traffic on network nodes and links, and building more realistic models for simulations.


global communications conference | 2008

Classification of Network Traffic via Packet-Level Hidden Markov Models

Alberto Dainotti; W. de Donato; Antonio Pescapé; P. Salvo Rossi

Traffic classification and identification is a fertile research area. Beyond Quality of Service, service differentiation, and billing, one of the most important applications of traffic classification is in the field of network security. This paper proposes a packet-level traffic classification approach based on Hidden Markov Model (HMM). Classification is performed by using real network traffic and estimating - in a combined fashion - Packet Size (PS) and Inter Packet Time (IPT) characteristics, thus remaining applicable to encrypted traffic too. The effectiveness of the proposed approach is evaluated by considering several traffic typologies: we applied our model to real traffic traces of Age of Mythology and Counter Strike (two Multi Player Network Games), HTTP, SMTP, Edonkey, PPlive (a peer-to-peer IPTV application), and MSN Messenger. An analytical basis and the mathematical details regarding the model are given. Results show how the proposed approach is able to classify network traffic by using packet-level statistical properties and therefore it is a good candidate as a component for a multi-classification framework.


traffic monitoring and analysis | 2011

Early classification of network traffic through multi-classification

Alberto Dainotti; Antonio Pescapé; Carlo Sansone

In thiswork we present and evaluate different automated combination techniques for traffic classification. We consider six intelligent combination algorithms applied to both traditional and more recent traffic classification techniques using either packet content or statistical properties of flows. Preliminary results show that, when selecting complementary classifiers, some combination algorithms allow a further improvement - in terms of classification accuracy - over already well-performing standalone classification techniques. Moreover, our experiments show that the positive impact of combination is particularly significant when there are early-classification constraints, that is, when the classification of a flow must be obtained in its early stage (e.g. first 1-4 packets) in order to perform network operations online.


Computer Networks | 2008

Internet traffic modeling by means of Hidden Markov Models

Alberto Dainotti; Antonio Pescapé; Pierluigi Salvo Rossi; Francesco Palmieri; Giorgio Ventre

In this work, we propose a Hidden Markov Model for Internet traffic sources at packet level, jointly analyzing Inter Packet Time and Packet Size. We give an analytical basis and the mathematical details regarding the model, and we test the flexibility of the proposed modeling approach with real traffic traces related to common Internet services with strong differences in terms of both applications/users and protocol behavior: SMTP, HTTP, a network game, and an instant messaging platform. The presented experimental analysis shows that, even maintaining a simple structure, the model is able to achieve good results in terms of estimation of statistical parameters and synthetic series generation, taking into account marginal distributions, mutual, and temporal dependencies. Moreover we show how, by exploiting such temporal dependencies, the model is able to perform short-term prediction by observing traffic from real sources.


IEEE Communications Magazine | 2010

Do you trust your software-based traffic generator?

Alessio Botta; Alberto Dainotti; Antonio Pescapé

Networking research often relies on synthetic traffic generation in its experimental activities; from generation of realistic workload to active measurements. Often researchers adopt software-based generators because of their flexibility. However, despite the increasing number of features (e.g., replication of complex traffic models), they are still suffering problems that can undermine the correctness of experiments: what is generated is sometimes far from what is requested by the operator. In this article, by analyzing four of the most used packet-level traffic generators in literature, we show how they fail to follow the requested profiles. Moreover, we identify and discuss key concepts affecting their accuracy as well as mechanisms commonly adopted to improve it. This contribution goes toward improving the knowledge researchers and practitioners should have of the tools used in experimental works, and at the same time illustrates some directions for the use and design of software-based traffic generators.


traffic monitoring and analysis | 2009

TIE: A Community-Oriented Traffic Classification Platform

Alberto Dainotti; Walter de Donato; Antonio Pescapé

The research on network traffic classification has recently become very active. The research community, moved by increasing difficulties in the automated identification of network traffic, started to investigate classification approaches alternative to port-based and payload-based techniques. Despite the large quantity of works published in the past few years on this topic, very few implementations targeting alternative approaches have been made available to the community. Moreover, most approaches proposed in literature suffer of problems related to the ability of evaluating and comparing them. In this paper we present a novel community-oriented software for traffic classification called TIE, which aims at becoming a common tool for the fair evaluation and comparison of different techniques and at fostering the sharing of common implementations and data. Moreover, TIE supports the combination of more classification plugins in order to build multi-classifier systems, and its architecture is designed to allow online traffic classification.


traffic monitoring and analysis | 2013

Reviewing traffic classification

Silvio Valenti; Dario Rossi; Alberto Dainotti; Antonio Pescapé; Alessandro Finamore; Marco Mellia

Traffic classification has received increasing attention in the last years. It aims at offering the ability to automatically recognize the application that has generated a given stream of packets from the direct and passive observation of the individual packets, or stream of packets, flowing in the network. This ability is instrumental to a number of activities that are of extreme interest to carriers, Internet service providers and network administrators in general. Indeed, traffic classification is the basic block that is required to enable any traffic management operations, from differentiating traffic pricing and treatment (e.g., policing, shaping, etc.), to security operations (e.g., firewalling, filtering, anomaly detection, etc.). Up to few years ago, almost any Internet application was using well-known transport layer protocol ports that easily allowed its identification. More recently, the number of applications using random or non-standard ports has dramatically increased (e.g. Skype, BitTorrent, VPNs, etc.). Moreover, often network applications are configured to use well-known protocol ports assigned to other applications (e.g. TCP port 80 originally reserved for Web traffic) attempting to disguise their presence. For these reasons, and for the importance of correctly classifying traffic flows, novel approaches based respectively on packet inspection, statistical and machine learning techniques, and behavioral methods have been investigated and are becoming standard practice. In this chapter, we discuss the main trend in the field of traffic classification and we describe some of the main proposals of the research community. We complete this chapter by developing two examples of behavioral classifiers: both use supervised machine learning algorithms for classifications, but each is based on different features to describe the traffic. After presenting them, we compare their performance using a large dataset, showing the benefits and drawback of each approach.


IEEE Network | 2014

Traffic identification engine: an open platform for traffic classification

Walter de Donato; Antonio Pescapé; Alberto Dainotti

The availability of open source traffic classification systems designed for both experimental and operational use, can facilitate collaboration, convergence on standard definitions and procedures, and reliable evaluation of techniques. In this article, we describe Traffic Identification Engine (TIE), an open source tool for network traffic classification, which we started developing in 2008 to promote sharing common implementations and data in this field. We designed TIE¿s architecture and functionalities focusing on the evaluation, comparison, and combination of different traffic classification techniques, which can be applied to both live traffic and previously captured traffic traces. Through scientific collaborations, and thanks to the support of the open source community, this platform gradually evolved over the past five years, supporting an increasing number of functionalities, some of which we highlight in this article through sample use cases.

Collaboration


Dive into the Alberto Dainotti's collaboration.

Top Co-Authors

Avatar

Antonio Pescapé

University of Naples Federico II

View shared research outputs
Top Co-Authors

Avatar

Alistair King

University of California

View shared research outputs
Top Co-Authors

Avatar

Giorgio Ventre

Information Technology University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Karyn Benson

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alessio Botta

University of Naples Federico II

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

kc claffy

University of California

View shared research outputs
Top Co-Authors

Avatar

Walter de Donato

University of Naples Federico II

View shared research outputs
Researchain Logo
Decentralizing Knowledge