12 results

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

An Enhanced Cyber Attack Attribution Framework

Conference Proceeding
Pitropakis, N., Panaousis, E., Giannakoulias, A., Kalpakis, G., Rodriguez, R. D., & Sarigiannidis, P. (2018)
An Enhanced Cyber Attack Attribution Framework. In S. Furnell, H. Mouratidis, & G. Pernul (Eds.), Trust, Privacy and Security in Digital Business. TrustBus 2018, 213-228. https://doi.org/10.1007/978-3-319-98385-1_15
Advanced Persistent Threats (APTs) are considered as the threats that are the most challenging to detect and defend against. As APTs use sophisticated attack methods, cyber si...

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture

Journal Article
Chrysoulas, C., & Pitropakis, N. (2018)
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Ambient Systems, 4(12), 153551. https://doi.org/10.4108/eai.10-1-2018.153551
QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’...

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

Conference Proceeding
Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-Gómez, R., Pitropakis, N., …Antonakakis, M. (2017)
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. In CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Securityhttps://doi.org/10.1145/3133956.3134002
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific typ...

Secure and Scalable Identity Management for the Aviation Industry

Presentation / Conference
Kintis, P., Kountouras, A., Pitropakis, N., Dagon, D., Antonakakis, M., Markou, C., & Buchner, P. (2017, May)
Secure and Scalable Identity Management for the Aviation Industry
No abstract available.

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

Conference Proceeding
Pitropakis, N., Lyvas, C., & Lambrinoudakis, C. (2017)
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. In C. Becker Westphall, Y. Woo Lee, B. Duncan, R. Ege, A. Olmsted, M. Vassilakopoulos, …S. Katsikas (Eds.), CLOUD COMPUTING 2017 - The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization
The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their qu...

Cloud Security, Privacy, and Trust Baselines

Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016)
Cloud Security, Privacy, and Trust Baselines. In Cloud Computing Security Foundations and Challenges. Boca Raton: CRC Press (Taylor and Francis Group
According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident...

The Far Side of Mobile Application Integrated Development Environments

Conference Proceeding
Lyvas, C., Pitropakis, N., & Lambrinoudakis, C. (2016)
The Far Side of Mobile Application Integrated Development Environments. In S. Katsikas, C. Lambrinoudakis, & S. Furnell (Eds.), Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science, 111-122. https://doi.org/10.1007/978-3-319-44341-6_8
Smart phones are, nowadays, a necessity for the vast majority of individuals around the globe. In addition to the ubiquitous computing paradigm supported by such devices, ther...

Towards an augmented authenticator in the Cloud

Conference Proceeding
Pitropakis, N., Yfantopoulos, N., Geneiatakis, D., & Lambrinoudakis, C. (2015)
Towards an augmented authenticator in the Cloud. In 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)doi:10.1109/isspit.2014.7300603
Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive informati...

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Journal Article
Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014)
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. Journal of cloud computing advances, systems and applications, 3(1), https://doi.org/10.1186/s13677-014-0020-6
Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in t...