Skip to main content

Showing 1–18 of 18 results for author: Mavroeidis, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.06907  [pdf, other

    cs.CR

    Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure

    Authors: Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Fysarakis

    Abstract: The threat landscape of industrial infrastructures has expanded exponentially over the last few years. Such infrastructures include services such as the smart meter data exchange that should have real-time availability. Smart meters constitute the main component of the Advanced Metering Infrastructure, and their measurements are also used as historical data for forecasting the energy demand to avo… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  2. arXiv:2403.05210  [pdf, other

    cs.CR

    TIPS: Threat Sharing Information Platform for Enhanced Security

    Authors: Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J Buchanan, Jawad Ahmad, Audun Josang, Vasileios Mavroeidis, Mouad Lemoudden

    Abstract: There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  3. arXiv:2307.06932  [pdf, other

    cs.CR

    PHOENI2X -- A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange

    Authors: Konstantinos Fysarakis, Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, George Lyberopoulos, Ignasi Garcia-Milà Vidal, José Carles Terés i Casals, Eva Rodriguez Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, George Drivas, Vangelis Photiou, George Spanoudakis, Odysseas Koufopavlou

    Abstract: As digital technologies become more pervasive in society and the economy, cybersecurity incidents become more frequent and impactful. According to the NIS and NIS2 Directives, EU Member States and their Operators of Essential Services must establish a minimum baseline set of cybersecurity capabilities and engage in cross-border coordination and cooperation. However, this is only a small step towar… ▽ More

    Submitted 18 July, 2023; v1 submitted 13 July, 2023; originally announced July 2023.

  4. The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification

    Authors: Norbert Tihanyi, Tamas Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis

    Abstract: This paper presents the FormAI dataset, a large collection of 112, 000 AI-generated compilable and independent C programs with vulnerability classification. We introduce a dynamic zero-shot prompting technique constructed to spawn diverse programs utilizing Large Language Models (LLMs). The dataset is generated by GPT-3.5-turbo and comprises programs with varying levels of complexity. Some program… ▽ More

    Submitted 28 March, 2024; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: https://github.com/FormAI-Dataset PLEASE USE PUBLISHED VERSION FOR CITATION: https://doi.org/10.1145/3617555.3617874

    Journal ref: PROMISE 2023: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering December 2023 Pages 33 to 43

  5. Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks

    Authors: Mateusz Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos

    Abstract: As cyber systems become increasingly complex and cybersecurity threats become more prominent, defenders must prepare, coordinate, automate, document, and share their response methodologies to the extent possible. The CACAO standard was developed to satisfy the above requirements, providing a common machine-readable framework and schema for documenting cybersecurity operations processes, including… ▽ More

    Submitted 10 September, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

  6. arXiv:2204.11368  [pdf

    cs.CR

    Enhancing the STIX Representation of MITRE ATT&CK for Group Filtering and Technique Prioritization

    Authors: Mateusz Zych, Vasileios Mavroeidis

    Abstract: In this paper, we enhance the machine-readable representation of the ATT&CK Groups knowledge base provided by MITRE in STIX 2.1 format to make available and queryable additional types of contextual information. Such information includes the motivations of activity groups, the countries they have originated from, and the sectors and countries they have targeted. We demonstrate how to utilize the en… ▽ More

    Submitted 26 April, 2022; v1 submitted 24 April, 2022; originally announced April 2022.

  7. arXiv:2203.04136  [pdf

    cs.CR

    Cybersecurity Playbook Sharing with STIX 2.1

    Authors: Vasileios Mavroeidis, Mateusz Zych

    Abstract: Understanding that interoperable security playbooks will become a fundamental component of defenders' arsenal to decrease attack detection and response times, it is time to consider their position in structured sharing efforts. This report documents the process of extending Structured Threat Information eXpression (STIX) version 2.1, using the available extension definition mechanism, to enable sh… ▽ More

    Submitted 26 August, 2022; v1 submitted 22 January, 2022; originally announced March 2022.

  8. arXiv:2110.10540  [pdf, other

    cs.CR

    On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence

    Authors: Vasileios Mavroeidis, Pavel Eis, Martin Zadnik, Marco Caselli, Bret Jordan

    Abstract: Motivated by the introduction of CACAO, the first open standard that harmonizes the way we document courses of action in a machine-readable format for interoperability, and the benefits for cybersecurity operations derived from utilizing, and coupling and sharing course of action playbooks with cyber threat intelligence, we introduce a uniform metadata template that supports managing and integrati… ▽ More

    Submitted 22 November, 2021; v1 submitted 20 October, 2021; originally announced October 2021.

  9. Data-Driven Threat Hunting Using Sysmon

    Authors: Vasileios Mavroeidis, Audun Jøsang

    Abstract: Threat actors can be persistent, motivated and agile, and leverage a diversified and extensive set of tactics and techniques to attain their goals. In response to that, defenders establish threat intelligence programs to stay threat-informed and lower risk. Actionable threat intelligence is integrated into security information and event management systems (SIEM) or is accessed via more dedicated t… ▽ More

    Submitted 28 March, 2021; originally announced March 2021.

  10. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence

    Authors: Vasileios Mavroeidis, Siri Bromander

    Abstract: Cyber threat intelligence is the provision of evidence-based knowledge about existing or emerging threats. Benefits from threat intelligence include increased situational awareness, efficiency in security operations, and improved prevention, detection, and response capabilities. To process, correlate, and analyze vast amounts of threat information and data and derive intelligence that can be share… ▽ More

    Submitted 28 August, 2023; v1 submitted 5 March, 2021; originally announced March 2021.

  11. Threat Actor Type Inference and Characterization within Cyber Threat Intelligence

    Authors: Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang

    Abstract: As the cyber threat landscape is constantly becoming increasingly complex and polymorphic, the more critical it becomes to understand the enemy and its modus operandi for anticipatory threat reduction. Even though the cyber security community has developed a certain maturity in describing and sharing technical indicators for informing defense components, we still struggle with non-uniform, unstruc… ▽ More

    Submitted 20 September, 2021; v1 submitted 3 March, 2021; originally announced March 2021.

    Journal ref: 2021 13th International Conference on Cyber Conflict (CyCon)

  12. arXiv:2012.09662  [pdf, other

    cs.CV

    Firearm Detection via Convolutional Neural Networks: Comparing a Semantic Segmentation Model Against End-to-End Solutions

    Authors: Alexander Egiazarov, Fabio Massimo Zennaro, Vasileios Mavroeidis

    Abstract: Threat detection of weapons and aggressive behavior from live video can be used for rapid detection and prevention of potentially deadly incidents such as terrorism, general criminal offences, or even domestic violence. One way for achieving this is through the use of artificial intelligence and, in particular, machine learning for image analysis. In this paper we conduct a comparison between a tr… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: 10 pages, 5 figures, presented at CyberHunt workshop at IEEE Big Data Conference

  13. arXiv:2003.00805  [pdf, other

    cs.CV cs.LG

    Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks

    Authors: Alexander Egiazarov, Vasileios Mavroeidis, Fabio Massimo Zennaro, Kamer Vishi

    Abstract: In recent years we have seen an upsurge in terror attacks around the world. Such attacks usually happen in public places with large crowds to cause the most damage possible and get the most attention. Even though surveillance cameras are assumed to be a powerful tool, their effect in preventing crime is far from clear due to either limitation in the ability of humans to vigilantly monitor video su… ▽ More

    Submitted 11 February, 2020; originally announced March 2020.

    Comments: 8 pages, 8 figures, 2 tables, 2019 European Intelligence and Security Informatics Conference (EISIC)

    MSC Class: 68T01 ACM Class: I.2.6; I.2.10; J.7

  14. arXiv:1811.08531  [pdf, other

    cs.CR

    Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR

    Authors: Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen

    Abstract: Big data has become a great asset for many organizations, promising improved operations and new business opportunities. However, big data has increased access to sensitive information that when processed can directly jeopardize the privacy of individuals and violate data protection laws. As a consequence, data controllers and data processors may be imposed tough penalties for non-compliance that c… ▽ More

    Submitted 20 November, 2018; originally announced November 2018.

    Comments: 7 pages, 1 figure, GDPR, Privacy, Cyber Threat Intelligence, Biometrics. To be appeared in the Proceedings of the 2018 IEEE International Conference on Big Data

  15. arXiv:1809.09434  [pdf

    cs.CR

    A Framework for Data-Driven Physical Security and Insider Threat Detection

    Authors: Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang

    Abstract: This paper presents PS0, an ontological framework and a methodology for improving physical security and insider threat detection. PS0 can facilitate forensic data analysis and proactively mitigate insider threats by leveraging rule-based anomaly detection. In all too many cases, rule-based anomaly detection can detect employee deviations from organizational security policies. In addition, PS0 can… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

    Comments: 8 pages, 4 figures, conference, workshop, snast, 4 sparql queries

  16. arXiv:1805.10666  [pdf, other

    cs.CR

    An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics

    Authors: Kamer Vishi, Vasileios Mavroeidis

    Abstract: Biometric systems have to address many requirements, such as large population coverage, demographic diversity, varied deployment environment, as well as practical aspects like performance and spoofing attacks. Traditional unimodal biometric systems do not fully meet the aforementioned requirements making them vulnerable and susceptible to different types of attacks. In response to that, modern bio… ▽ More

    Submitted 27 May, 2018; originally announced May 2018.

    Comments: 10 pages, 5 figures, 3 tables, conference, NISK 2017

  17. The Impact of Quantum Computing on Present Cryptography

    Authors: Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych, Audun Jøsang

    Abstract: The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and… ▽ More

    Submitted 31 March, 2018; originally announced April 2018.

    Comments: 10 pages, 1 figure, 3 tables, journal article - IJACSA

    MSC Class: 81P94; 11T71; 94A60; 14G50

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), 9(3), 405-414, March 2018

  18. arXiv:1709.07102  [pdf, other

    cs.CR

    Automatic Detection of Malware-Generated Domains with Recurrent Neural Models

    Authors: Pierre Lison, Vasileios Mavroeidis

    Abstract: Modern malware families often rely on domain-generation algorithms (DGAs) to determine rendezvous points to their command-and-control server. Traditional defence strategies (such as blacklisting domains or IP addresses) are inadequate against such techniques due to the large and continuously changing list of domains produced by these algorithms. This paper demonstrates that a machine learning appr… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

    Comments: Submitted to NISK 2017