Skip to main content

Showing 1–7 of 7 results for author: Gouglidis, A

.
  1. arXiv:2304.05776  [pdf

    cs.CR cs.NI

    A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments

    Authors: Igor Ivkić, Dominik Thiede, Nicholas Race, Matthew Broadbent, Antonios Gouglidis

    Abstract: The importance of cloud computing has grown over the last years, which resulted in a significant increase of Data Center (DC) network requirements. Virtualisation is one of the key drivers of that transformation and enables a massive deployment of computing resources, which exhausts server capacity limits. Furthermore, the increased network endpoints need to be handled dynamically and centrally to… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: In Proceedings of the 13th International Conference on Cloud Computing and Services Science (CLOSER 2023). Prague, Czech Republic

  2. arXiv:2303.16688  [pdf, other

    cs.CR

    Model Checking Access Control Policies: A Case Study using Google Cloud IAM

    Authors: Antonios Gouglidis, Anna Kagia, Vincent C. Hu

    Abstract: Authoring access control policies is challenging and prone to misconfigurations. Access control policies must be conflict-free. Hence, administrators should identify discrepancies between policy specifications and their intended function to avoid violating security principles. This paper aims to demonstrate how to formally verify access control policies. Model checking is used to verify access con… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  3. arXiv:2303.08544  [pdf, other

    cs.GT cs.CR cs.NI

    Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems

    Authors: Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Qiang Ni, Antonios Gouglidis, Wissam Mallouli, Heng Siong Lim

    Abstract: Network connectivity exposes the network infrastructure and assets to vulnerabilities that attackers can exploit. Protecting network assets against attacks requires the application of security countermeasures. Nevertheless, employing countermeasures incurs costs, such as monetary costs, along with time and energy to prepare and deploy the countermeasures. Thus, an Intrusion Response System (IRS) s… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 12 pages, 8 figures

  4. arXiv:2209.14795  [pdf, other

    cs.CR

    ThreatPro: Multi-Layer Threat Analysis in the Cloud

    Authors: Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri

    Abstract: Many effective Threat Analysis (TA) techniques exist that focus on analyzing threats to targeted assets (e.g., components, services). These techniques consider static interconnections among the assets. However, in dynamic environments, such as the Cloud, resources can instantiate, migrate across physical hosts, or decommission to provide rapid resource elasticity to the users. It is evident that e… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: 32 pages, 14 figures

  5. arXiv:2107.07784  [pdf, other

    cs.CR cs.PF

    A Security Cost Modelling Framework for Cyber-Physical Systems

    Authors: Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber

    Abstract: Cyber-Physical Systems (CPS) are formed through interconnected components capable of computation, communication, sensing and changing the physical world. The development of these systems poses a significant challenge since they have to be designed in a way to ensure cyber-security without impacting their performance. This article presents the Security Cost Modelling Framework (SCMF) and shows supp… ▽ More

    Submitted 21 September, 2021; v1 submitted 16 July, 2021; originally announced July 2021.

  6. arXiv:2107.07745  [pdf, other

    cs.OH

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Authors: Patrizia Sailer, Igor Ivkic, Markus Tauber, Andreas Mauthe, Antonios Gouglidis

    Abstract: The importance of Cyber Physical Systems (CPS) and Internet of Things (IoT) applications is constantly increasing, especially in the context of Industry 4.0. Architectural decisions are crucial not just for performance, security and resilience reasons but also regarding costs and resource usage. In this paper we analyse two of the fundamental approaches to design control loops (i.e. time-driven an… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: IEEE Link: https://ieeexplore.ieee.org/document/9464065

  7. Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Authors: Antonios Gouglidis, Christos Grompanopoulos, Anastasia Mavridou

    Abstract: Usage control models provide an integration of access control, digital rights, and trust management. To achieve this integration, usage control models support additional concepts such as attribute mutability and continuity of decision. However, these concepts may introduce an additional level of complexity to the underlying model, rendering its definition a cumbersome and prone to errors process.… ▽ More

    Submitted 26 June, 2018; originally announced June 2018.

    Comments: In Proceedings MeTRiD 2018, arXiv:1806.09330

    Journal ref: EPTCS 272, 2018, pp. 52-64