Skip to main content

Showing 1–6 of 6 results for author: Vasilomanolakis, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2111.12472  [pdf, other

    cs.CR cs.CY

    COVID-19 vaccination certificates in the Darkweb

    Authors: Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis

    Abstract: COVID-19 vaccines have been rolled out in many countries and with them a number of vaccination certificates. For instance, the EU is utilizing a digital certificate in the form of a QR-code that is digitally signed and can be easily validated throughout all EU countries. In this paper, we investigate the current state of the COVID-19 vaccination certificate market in the darkweb with a focus on th… ▽ More

    Submitted 25 November, 2021; v1 submitted 24 November, 2021; originally announced November 2021.

  2. arXiv:2109.10652  [pdf, other

    cs.CR

    Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting

    Authors: Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis

    Abstract: Honeypots are decoy systems that lure attackers by presenting them with a seemingly vulnerable system. They provide an early detection mechanism as well as a method for learning how adversaries work and think. However, over the last years, a number of researchers have shown methods for fingerprinting honeypots. This significantly decreases the value of a honeypot; if an attacker is able to recogni… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  3. arXiv:1909.07694  [pdf, other

    cs.CR cs.LG cs.NI stat.ML

    Network entity characterization and attack prediction

    Authors: Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis

    Abstract: The devastating effects of cyber-attacks, highlight the need for novel attack detection and prevention techniques. Over the last years, considerable work has been done in the areas of attack detection as well as in collaborative defense. However, an analysis of the state of the art suggests that many challenges exist in prioritizing alert data and in studying the relation between a recently discov… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: 30 pages, 8 figures

    Journal ref: Future Generation Computer Systems 97 (2019) 674-686

  4. arXiv:1905.03571  [pdf, other

    cs.CR

    TRIDEnT: Building Decentralized Incentives for Collaborative Security

    Authors: Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Stephane Le Roux, Steven Rowe, Max Mühlhäuser

    Abstract: Sophisticated mass attacks, especially when exploiting zero-day vulnerabilities, have the potential to cause destructive damage to organizations and critical infrastructure. To timely detect and contain such attacks, collaboration among the defenders is critical. By correlating real-time detection information (alerts) from multiple sources (collaborative intrusion detection), defenders can detect… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 28 pages

  5. arXiv:1905.00304  [pdf, other

    cs.CR

    On generating network traffic datasets with synthetic attacks for intrusion detection

    Authors: Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani

    Abstract: Most research in the area of intrusion detection requires datasets to develop, evaluate or compare systems in one way or another. In this field, however, finding suitable datasets is a challenge on to itself. Most publicly available datasets have negative qualities that limit their usefulness. In this article, we propose ID2T (Intrusion Detection Dataset Toolkit) to tackle this problem. ID2T facil… ▽ More

    Submitted 1 May, 2019; originally announced May 2019.

    Comments: 31 pages

  6. arXiv:1712.03713  [pdf, other

    cs.CR

    I Trust my Zombies: A Trust-enabled Botnet

    Authors: Emmanouil Vasilomanolakis, Jan Helge Wolf, Leon Böck, Shankar Karuppayah, Max Mühlhäuser

    Abstract: Defending against botnets has always been a cat and mouse game. Cyber-security researchers and government agencies attempt to detect and take down botnets by playing the role of the cat. In this context, a lot of work has been done towards reverse engineering certain variants of malware families as well as understanding the network protocols of botnets to identify their weaknesses (if any) and exp… ▽ More

    Submitted 11 December, 2017; originally announced December 2017.