-
A Proactive Uncertainty driven Model for Tasks Offloading
Authors:
Maria Papathanasaki,
Panagiotis Fountas,
Kostas Kolomvatsos
Abstract:
The ever-increasing demands of end-users on the Internet of Things (IoT), often cause great congestion in the nodes that serve their requests. Therefore, the problem of node overloading arises. In this article we attempt to solve the problem of heavy traffic in a node, by proposing a mechanism that keeps the node from overloading, regardless of the load entering in it, and which takes into conside…
▽ More
The ever-increasing demands of end-users on the Internet of Things (IoT), often cause great congestion in the nodes that serve their requests. Therefore, the problem of node overloading arises. In this article we attempt to solve the problem of heavy traffic in a node, by proposing a mechanism that keeps the node from overloading, regardless of the load entering in it, and which takes into consideration both the priority and the task demand. More specifically, we introduce a proactive, self-healing mechanism that utilizes fuzzy systems, in combination to a non-parametric statistic method. Through our approach, we manage to ensure the uninterrupted service of high demand or priority tasks, regardless of the load the node may receive, based on a proactive approach. Also, we ensure the fastest possible result delivery to the requestors, through the high priority and high demand sensitive mechanism. A series of experimental scenarios are used to evaluate the performance of the suggested model, while we present the relevant numerical results.
△ Less
Submitted 16 July, 2022;
originally announced September 2022.
-
Cybersecurity Revisited: Honeytokens meet Google Authenticator
Authors:
Vasilis Papaspirou,
Maria Papathanasaki,
Leandros Maglaras,
Ioanna Kantzavelou,
Christos Douligeris,
Mohamed Amine Ferrag,
Helge Janicke
Abstract:
Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor authentication process. The current implementation c…
▽ More
Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor authentication process. The current implementation collaborates with Google authenticator. The novelty and simplicity of the presented approach aims at providing additional layers of security and protection into a system and thus making it more secure through a stronger and more efficient authentication mechanism.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
From Cyber Terrorism to Cyber Peacekee**: Are we there yet?
Authors:
Maria Papathanasaki,
Georgios Dimitriou,
Leandros Maglaras,
Ismini Vasileiou,
Helge Janicke
Abstract:
In Cyberspace nowadays, there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. In this…
▽ More
In Cyberspace nowadays, there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. In this article, we discuss what Cyberterrorism is and how it can lead to Cyberwarfare.
△ Less
Submitted 27 September, 2020;
originally announced October 2020.