Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mirco Marchetti is active.

Publication


Featured researches published by Mirco Marchetti.


IEEE Transactions on Parallel and Distributed Systems | 2014

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

Luca Ferretti; Michele Colajanni; Mirco Marchetti

Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.


CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security | 2012

Supporting security and consistency for cloud database

Luca Ferretti; Michele Colajanni; Mirco Marchetti

Typical Cloud database services guarantee high availability and scalability, but they rise many concerns about data confidentiality. Combining encryption with SQL operations is a promising approach although it is characterized by many open issues. Existing proposals, which are based on some trusted intermediate server, limit availability and scalability of original cloud database services. We propose an alternative architecture that avoids any intermediary component, thus achieving availability and scalability comparable to that of unencrypted cloud database services. Moreover, our proposal guarantees data consistency in scenarios in which independent clients concurrently execute SQL queries, and the structure of the database can be modified.


cyber security and information intelligence research workshop | 2009

Defending financial infrastructures through early warning systems: the intelligence cloud approach

Giorgia Lodi; Leonardo Querzoni; Roberto Baldoni; Mirco Marchetti; Michele Colajanni; Vita Bortnikov; Eliezer Dekel; Gennady Laventman; Alexey Roytman

Recent evidence of successful Internet-based attacks and frauds involving financial institutions highlights the inadequacy of the existing protection mechanisms, in which each instutition implements its own isolated monitoring and reaction strategy. Analyzing on-line activity and detecting attacks on a large scale is an open issue due to the huge amounts of events that should be collected and processed. In this paper, we propose a large-scale distributed event processing system, called intelligence cloud, allowing the financial entities to participate in a widely distributed monitoring and detection effort through the exchange and processing of information locally available at each participating site. We expect this approach to be able to handle large amounts of events arriving at high rates from multiple domains of the financial scenario. We describe a framework based on the intelligence cloud where each participant can receive early alerts enabling them to deploy proactive countermeasures and mitigation strategies.


ieee international conference on cloud computing technology and science | 2014

Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services

Luca Ferretti; Fabio Pierazzi; Michele Colajanni; Mirco Marchetti

The success of the cloud database paradigm is strictly related to strong guarantees in terms of service availability, scalability and security, but also of data confidentiality. Any cloud provider assures the security and availability of its platform, while the implementation of scalable solutions to guarantee confidentiality of the information stored in cloud databases is an open problem left to the tenant. Existing solutions address some preliminary issues through SQL operations on encrypted data. We propose the first complete architecture that combines data encryption, key management, authentication and authorization solutions, and that addresses the issues related to typical threat scenarios for cloud database services. Formal models describe the proposed solutions for enforcing access control and for guaranteeing confidentiality of data and metadata. Experimental evaluations based on standard benchmarks and real Internet scenarios show that the proposed architecture satisfies also scalability and performance requirements.


international conference on information security | 2009

Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale

Mirco Marchetti; Michele Messori; Michele Colajanni

The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system where each component collaborates to the intrusion and malware detection and to the dissemination of the local analyses. The proposed architecture is based on a decentralized, peer-to-peer and sensor-agnostic design that addresses dependability and load unbalance issues affecting existing systems based on centralized and hierarchical schemes. Load balancing properties, ability to tolerate churn, self-organization capabilities and scalability are demonstrated through a prototype integrating different open source defensive software.


Computer Networks | 2016

Analysis of high volumes of network traffic for Advanced Persistent Threat detection

Mirco Marchetti; Fabio Pierazzi; Michele Colajanni; Alessandro Guido

Abstract Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the most challenging attacks to detect. They span over long periods of time, use encrypted connections and mimic normal behaviors in order to evade detection based on traditional defensive solutions. We propose an innovative approach that is able to analyze efficiently high volumes of network traffic to reveal weak signals related to data exfiltrations and other suspect APT activities. The final result is a ranking of the most suspicious internal hosts; this rank allows security specialists to focus their analyses on a small set of hosts out of the thousands of machines that typically characterize large organizations. Experimental evaluations in a network environment consisting of about 10K hosts show the feasibility and effectiveness of the proposed approach. Our proposal based on security analytics paves the way to novel forms of automatic defense aimed at early detection of APTs in large and continuously varying networked systems.


computer and information technology | 2010

Selective and Early Threat Detection in Large Networked Systems

Michele Colajanni; Mirco Marchetti; Michele Messori

The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the cooperation of multiple components. Similar solutions cause a multiplication of alerts, thus increasing the time needed for alert management and hiding the few critical alerts as needles in a hay stack. We propose an innovative distributed architecture for intrusion detection that is able to provide system administrators with selective and early security warnings. This architecture is suitable to large networks composed by several departments because it leverages hierarchical and peer-to-peer cooperation schemes among distributed NIDSes. Moreover, it embeds a distributed alert ranking system that makes it possible to evaluate the real level of risk represented by a security alert generated by a NIDS, and it allows independent network departments to exchange early warnings about critical threats. Thanks to these features, a system administrator can focus on the few alerts that represent a real threat for the controlled infrastructure and can be notified about the most dangerous intrusions before his department is attacked.


Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware | 2008

BFT: the time is now

Allen Clement; Mirco Marchetti; Edmund L. Wong; Lorenzo Alvisi; Michael Dahlin

Data centers strive to provide reliable access to the data and services that they host. This reliable access requires the hosted data and services hosted by the data center to be both consistent and available. Byzantine fault tolerance (BFT) replication offers the promise of services that are consistent and available despite arbitrary failures by a bounded number of servers and an unbounded number of clients.


information security conference | 2008

Collaborative architecture for malware detection and analysis

Michele Colajanni; Daniele Gozzi; Mirco Marchetti

The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections have already spread. In this paper, we present an innovative collaborative architecture for malware analysis that aims to early detection and timely deployment of countermeasures. The proposed system is a multi-tier architecture where the sensor nodes are geographically distributed over multiple organizations. These nodes send alerts to intermediate managers that, in their turn, communicate with one logical collector and analyzer. Relevant information, that is determined by the automatic analysis of the malware behavior in a sandbox, and countermeasures are sent to all the cooperating networks. There are many other novel features in the proposal. The architecture is extremely scalable and flexible because multiple levels of intermediate managers can be utilized depending on the complexity of the network of the participating organization. Cyphered communications among components help preventing the leakage of sensitive information and allow the pairwise authentication of the nodes involved in the information sharing. The feasibility of the proposed architecture is demonstrated through an operative prototype realized using open source software.


network computing and applications | 2007

Dynamic load balancing for network intrusion detection systems based on distributed architectures

Mauro Andreolini; Sara Casolari; Michele Colajanni; Mirco Marchetti

Increasing traffic and the necessity of stateful analyses impose strong computational requirements on network intrusion detection systems (NIDS), and motivate the need of distributed architectures with multiple sensors. In a context of high traffic with heavy tailed characteristics, static rules for dispatching traffic slices among distributed sensors cause severe imbalance. Hence, the distributed NIDS architecture must be combined with adequate mechanisms for dynamic load redistribution. In this paper, we propose and compare different policies for the activation/deactivation of the dynamic load balancer. In particular, we consider and compare single vs. double threshold schemes, and load representations based on resource measures vs. load aggregation models. Our experimental results show that the best combination of a double threshold scheme with a linear aggregation of resource measures is able to achieve a really satisfactory balance of the sensor loads together with a sensible reduction of the number of load balancer activations.

Collaboration


Dive into the Mirco Marchetti's collaboration.

Top Co-Authors

Avatar

Michele Colajanni

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Luca Ferretti

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Fabio Pierazzi

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Alessandro Guido

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Dario Stabili

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Michele Messori

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Giovanni Apruzzese

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Andrea Balboni

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Daniele Gozzi

University of Modena and Reggio Emilia

View shared research outputs
Top Co-Authors

Avatar

Mauro Andreolini

University of Modena and Reggio Emilia

View shared research outputs
Researchain Logo
Decentralizing Knowledge