scispace - formally typeset
S

S. Suin

Researcher at University of Pisa

Publications -  9
Citations -  259

S. Suin is an academic researcher from University of Pisa. The author has contributed to research in topics: Network management & Network security. The author has an hindex of 8, co-authored 9 publications receiving 259 citations.

Papers
More filters
Journal ArticleDOI

Effective traffic measurement using ntop

TL;DR: Ntop enables users to track relevant network activities including traffic characterization, network utilization, network protocol usage, and congestion detection and its native security flaw detection facilities allow ntop to detect potentially dangerous traffic conditions and to dynamically and autonomously adapt network configuration to tackle the identified problems.

Design and Implementation of an Anomaly Detection System: an Empirical Approach

TL;DR: This paper focuses on network-based intrusion detection and it explores a different approach to the problem, showing that in every network there are some global variables that can be profitably used for detecting network anomalies, regardless of the type of network users and equipment.

Hierarchical Model Based Risk Management of Critical Infrastructures

TL;DR: A risk management strategy that considers a sequence of hierarchical models, each describing dependencies among infrastructure components, is presented and how this notion supports the formal definition of risk mitigation plan and the evaluation of the infrastructure robustness is discussed.
Proceedings ArticleDOI

Monitoring networks using ntop

TL;DR: The design and implementation of ntop is described, a simple, open-source, portable traffic measurement and monitoring tool, which supports various management activities, including network optimisation and planning, and detection of network security violations.
Book ChapterDOI

Ntop: Beyond ping and traceroute

TL;DR: In this article, the authors present ntop, an open-source web-based network usage monitor that enables users to track relevant network activities including network utilisation, established connections, network protocol usage and traffic classification.