Sitemap
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
publications
ICN PATTA: ICN Privacy Attack Through Traffic Analysis
Published in 2021 IEEE 46th Conference on Local Computer Networks (LCN), 2021
PATTA is the first privacy attack based on network traffic analysis in Information-Centric Networking. PATTA aims to automatically identify the category of requested content by sniffing the communication towards the first hop router. PATTA applies text processing and machine learning techniques to content names in content-oriented architectures.
Recommended citation: Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk (2021). "ICN PATTA: ICN privacy attack through traffic analysis." 2021 IEEE 46th Conference on Local Computer Networks (LCN). IEEE, 2021.
Download Paper
Sim2Testbed Transfer: NDN Performance Evaluation
Published in Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022
The paper proposes a setup of an NDN testbed composed of Raspberry Pi devices. After that, we conduct performance analysis for crucial NDN features such as name-based forwarding, in-network caching, and data packet signing.
Recommended citation: Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal (2022). "Sim2Testbed Transfer: NDN Performance Evaluation." Proceedings of the 17th International Conference on Availability, Reliability and Security. 2022.
Download Paper
GNN4IFA: Interest Flooding Attack Detection with Graph Neural Networks
Published in 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023
In the context of Information-Centric Networking, Interest Flooding Attacks (IFAs) represent a new and dangerous sort of distributed denial of service. Since existing proposals targeting IFAs mainly focus on local information, in this paper we propose GNN4IFA as the first mechanism exploiting complex non-local knowledge for IFA detection by leveraging Graph Neural Networks (GNNs) handling the overall network topology.
Recommended citation: Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini (2023) "GNN4IFA: Interest flooding attack detection with graph neural networks." 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). IEEE, 2023.
Download Paper
Security and Privacy of IP-ICN coexistence: A Comprehensive Survey
Published in IEEE Communications Surveys & Tutorials, 2023
This article provides the first comprehensive Security and Privacy (SP) analysis of the state-of-the-art IP-ICN coexistence architectures by horizontally comparing the SP features among three deployment approaches – i.e., overlay, underlay, and hybrid – and vertically comparing among the ten considered SP features.
Recommended citation: Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk (2023). "Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey." IEEE Commun. Surv. Tutorials 25(4): 2427-2455 (2023)
Download Paper
Anonymous Federated Learning via Named-Data Networking
Published in Future Generation Computer Systems, 2024
This paper contributes with a novel anonymous-by-design FL framework with a customised communication protocol leveraging NDN. The proposed communication scheme encompasses an ad-hoc FL-oriented naming convention and anonymity-driven forwarding and enrollment procedures.
Recommended citation: Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Nicolò Dal Fabbro, Riccardo Lazzeretti (2024). "Anonymous Federated Learning via Named-Data Networking." Future Gener. Comput. Syst. 152: 288-303 (2024)
Download Paper
Caravan: Practical Online Learning of {In-Network}{ML} Models with Labeling Agents
Published in 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24), 2024
This paper presents CARAVAN, a practical online learning system for in-network ML models. We tackle two primary challenges in facilitating online learning for networking: (a) the automatic labeling of evolving traffic and (b) the efficient monitoring and detection of model performance degradation to trigger retraining.
Recommended citation: Qizheng Zhang, Ali Imran, Enkeleda Bardhi, Tushar Swamy, Nathan Zhang, Muhammad Shahbaz, Kunle Olukotun (2024). "Caravan: Practical Online Learning of {In-Network}{ML} Models with Labeling Agents." 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). 2024.
Download Paper
Is AI a Trick or T(h)reat for Securing Programmable Data Planes?
Published in IEEE Network Magazine, 2024
This article discusses AI-based security solutions in programmable networks, focusing on the explored modalities of integrating AI models in programmable constrained network devices. Moreover, we elaborate on the challenges and risks of relying on AI for such mechanisms. Lastly, the article brings a visionary glimpse for future trends in this regard, raising some essential questions on the indispensability of AI for security functionalities and providing some alternative solutions.
Recommended citation: Enkeleda Bardhi, Mauro Conti, and Riccardo Lazzeretti. "Is AI a Trick or T (h) reat for Securing Programmable Data Planes?." IEEE Network (2024).
Download Paper
talks
Presentation of the paper ICN PATTA: ICN Privacy Attack Thorugh Traffic Analysis
Published:
Access the presentation here Access the project source code here
The Future of the Internet: Security and Privacy of Current and Future Networking Paradigms
Published:
Presentation of the paper GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks
Published:
Access the presentation here Access the project source code here
Presentation of the paper Sim2Testbed Transfer: NDN Performance Evaluation
Published:
Access the presentation here Access the project source code here
teaching
Future Internet Architectures
Guest Lecture, Sistemi di Calcolo course of Engineering in Computer Science Department at Sapienza University of Rome, 2020
The Road Ahead Future Internet: From IP to ICN
Guest Lecture, Sistemi di Calcolo course of Engineering in Computer Science Department at Sapienza University of Rome, 2021
The Road Ahead Future Internet: From IP to ICN
Guest Lecture, Computer Network Security course of Department of Mathematics at University of Padua, 2021
Security and Privacy of Future Internet Technologies - Part 1
Guest Lecture, Advanced Information System Security and Blockchain course of Computer Science Engineering Department at Sapienza University of Rome, 2022
Security and Privacy of Future Internet Technologies - Part 2
Guest Lecture, Advanced Information System Security and Blockchain course of Computer Science Engineering Department at Sapienza University of Rome, 2022
Digitisation for Human Resources
Teaching assistant, Faculty of Law at Sapienza University of Rome, 2022
Some Network Security Fundamentals
Guest Lecture, Computer Network fall course at the Department of Computer Science, Purdue University, 2023