Konstantinos Kyriakopoulos

Konstantinos Kyriakopoulos
Loughborough University | Lough · Wolfson School of Mechanical, Electrical and Manufacturing Engineering

PhD , MSc in E&E Eng.

About

51
Publications
8,910
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
592
Citations
Introduction
In the past, I focused on detecting injection type of attacks in Wireless networks fusing metrics across the TCP/IP stack. Currently, my responsibilities involve administration of the extended computer network in HSN. This involved setting up, configuring and maintaining services under the Linux environment such as DHCP, DNS, Dynamic DNS, SAMBA, Apache etc. Virtualisation technologies, such as vmWare vSphere and KVM are explored for setting up virtual networks.

Publications

Publications (51)
Article
Full-text available
In recent years, there has been an immense research interest in applying Machine Learning for defending networked systems from cyber threats. A particular challenge in this domain is the identification and selection of appropriate features that ensure prompt and correct cyber threat detection. This work proposes a novel approach that leverages rece...
Article
With the rapid growth of security threats in computer networks, the need for developing efficient security‐warning systems is substantially increasing. Distributed denial‐of‐service (DDoS) and DoS attacks are still among the most effective and dreadful attacks that require robust detection. In this work, we propose a new method to detect TCP DoS/DD...
Article
Full-text available
With the rapid growth of security threats in computer networks, the need for developing efficient security-warning systems is substantially increasing. Distributed Denial-of-Service (DDoS) and Denial-of-Service (DoS) attacks are still among the most effective and dreadful attacks that require robust detection. In this work, we propose a new method...
Article
Full-text available
The global surge of cyber-attacks in the form of sequential network attacks has propelled the need for robust intrusion detection and prediction systems. Such attacks are difficult to reveal using current intrusion detection systems, since each individual attack phase may appear benign when examined outside of its context. In addition, there are ch...
Article
The detection of anomalies in network traffic is an important task in today's Internet. Among various anomaly detection methods, the techniques based on examination of the long‐range dependence (LRD) behavior of network traffic stands out to be powerful. In this paper, we reveal anomalies in aggregated network traffic by examining the LRD behavior...
Article
Full-text available
The rapid growth in computation and processing power of end-user devices has transitioned network functionalities from the core network to the Fog, thus, reducing response times and ultimately improving user experience. The Information-Centric Networking paradigm aims to transform conventional content caching and delivery approaches by enabling Fog...
Article
Full-text available
Hidden Markov Models have been extensively used for determining computer systems under a Multi-Stage Network Attack (MSA), however, acquisition of optimal model training parameters remains a formidable challenge. This paper critically analyses the detection and prediction accuracy of a wide range of training and initialisation algorithms including...
Chapter
Full-text available
As mobile communications increase their presence in our life, service availability becomes a crucial player for the next generation of cellular networks. However, both 4G and 5G systems lack of full protection against Denial-of-Service (DoS) attacks, due to the need of designing radio-access protocols focused on providing seamless connectivity. Thi...
Article
Full-text available
Cyber security has become a matter of a global interest and several attacks target industrial companies and governmental organisations. The Advanced Persistent Threats (APTs) have emerged as a new and complex version of Multi-Stage Attacks (MSAs), targeting selected companies and organisations. Current APT detection systems focus on raising the det...
Article
Full-text available
The broadcast nature of Wireless Local Area Networks (WLANs) has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer, deauthentication and rogue access point attacks. The implementation of novel Intrusion Detection Systems (IDSs) is fundamental to provide stronger protection against...
Conference Paper
Full-text available
In recent content delivery mechanisms, popular contents tend to be placed closer to the users for better delivery performance and lower network resource occupation. Caching mechanisms in Content Delivery Networks (CDN), Mobile Edge Clouds (MECs) and fog computing have implemented edge caching paradigm for different application scenarios. However, s...
Article
Full-text available
As the complexity of cyber-attacks keeps increasing, new robust detection mechanisms need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be able to adapt their detection characteristics based not only on the measureable network traffic, but also on the available highlevel information related to the protected netwo...
Article
Wireless communications are vulnerable to certain number of cyber-attacks and intrusion attempts due to the intrinsic openness of the communication channel. Virtual jamming attack stands out among other attacks. This type of attack is easy to implement, energy-efficient to be launched, and represents one of the most important threats to the securit...
Conference Paper
Full-text available
In the last few years there has been considerable increase in the efficiency of Intrusion Detection Systems (IDSs). However, networks are still the victim of attacks. As the complexity of these attacks keeps increasing, new and more robust detection mechanisms need to be developed. The next generation of IDSs should be designed incorporating reason...
Conference Paper
Print Request Permissions Wireless communications are potentially exposed to jamming due to the openness of the medium and, in particular, to virtual jamming, which allows more energy-efficient attacks. In this paper we tackle the problem of virtual jamming attacks on IEEE 802.11 networks and present a data fusion solution for the detection of a ty...
Conference Paper
One of the problems that hinders large scale network management tasks is the number of possible heterogeneous data sources that provide network information and how to focus on a desired network segment without requiring a deep knowledge of the network structure. This work investigates how to intelligently and efficiently refine and manage a vast am...
Conference Paper
Correctly labelled datasets are commonly required. Three particular scenarios are highlighted, which showcase this need. One of these scenarios is when using supervised Intrusion Detection Systems (TDSs). These systems need labelled datasets for their training process. Also, the real nature of analysed datasets must be known when evaluating the eff...
Conference Paper
Full-text available
Correctly labelled datasets are commonly required. Three particular scenarios are highlighted, which showcase this need. When using supervised Intrusion Detection Systems (IDSs), these systems need labelled datasets to be trained. Also, the real nature of the analysed datasets must be known when evaluating the efficiency of the IDSs when detecting...
Article
Full-text available
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent research on Intrusion Detection Systems for wireless attacks either focuses on just one layer of observation or uses a limited number of metrics without proper data fusion techniques. However, the true status of a network is rarely accurately detectable b...
Conference Paper
Full-text available
One of the main problems in open wireless networks is the inability of authenticating the identity of a wireless client or Access Point (AP). This issue is a concern because, a malicious entity could masquerade as the legal AP and entice a wireless client to establish a connection with a Rogue AP. Previous work by the authors has developed the algo...
Article
Full-text available
Wireless networks are becoming susceptible to increasingly more sophisticated threats. Most of the current Intrusion Detection Systems (IDSs) that employ multi-layer techniques for mitigating network attacks offer better performance than IDSs that employ single layer approach. However, few of the current multi-layer IDSs could be used off-the-shelf...
Conference Paper
Full-text available
Wireless networks are increasingly becoming susceptible to more sophisticated threats. An attacker may spoof the identity of legitimate users before implementing more serious attacks. Most of the current Intrusion Detection Systems (IDS) that employ multi-layer approach to help towards mitigating network attacks, offer high detection accuracy rate...
Conference Paper
Full-text available
Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status...
Conference Paper
Full-text available
Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status...
Article
Full-text available
Wi-Fi networks are the first and sometimes only choice for the video streaming in homes, airports, malls, public areas and museums. However, Wi-Fi networks are vulnerable to interference, noise and have bandwidth limitations. Due to the intrinsic vulnerability of the communication channel, and the large number of variables involved, simulation alon...
Conference Paper
Full-text available
Wireless networks such as WiFi suffer communication performance issues in addition to those seen on wired networks due to the characteristics of the radio communication channel used by their Physical Layers (PHY). Understanding these issues is a complex but necessary task given the importance of wireless networks for the transfer of wide ranging pa...
Article
Full-text available
Monitoring and measuring various metrics of high-speed networks produces a vast amount of information over a long period of time making the storage of the metrics a serious issue. Previous work has suggested stream aware compression algorithms, among others, that is, methodologies that try to organise the network packets in a compact way in order t...
Article
Full-text available
Despite the huge development and usage of devices compliant with IEEE 802.11g, their performance is still hard to predict and to guarantee. A lot of work has focused on performance evaluation based on simulations, but it is not sufficient, due to the great number of variables involved. Others have focused on linking the application performance with...
Article
Full-text available
This is a conference paper [© IEEE] and is also available online at: http://dx.doi.org/10.1109/ICSNC.2009.70 Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any...
Article
Full-text available
This article was published in the journal, IET Communications [© Institution of Engineering and Technology] and the definitive version is available at: http://dx.doi.org/10.1049/iet-com.2008.0068 The production of a large-scale monitoring system for a high-speed network leads to a number of challenges. These challenges are not purely technical but...
Conference Paper
Full-text available
This paper formulates a framework for wireless network performance measurements with the scope of being as generic as possible. The methodology utilises a cross-layer approach in order to address the limitations of traditional layered techniques. A lot of work in the research community uses the channel power (Cp) to predict performance metrics in h...
Article
Full-text available
This is a conference paper [© IEEE]. It is also available from: http://ieeexplore.ieee.org/ Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted comp...
Article
Full-text available
G networks and Wi-Fi networks could complement each other as each has different advantages of coverage and access capacity. A combined 3G and Wi-Fi network is one part of a heterogeneous IP network which has ubiquitous access capacity. However, the characteristics of the lower layers in the wireless network portion of such a heterogeneous IP networ...
Article
Full-text available
This article was published in the International Journal of Internet Protocol Technology (IJIPT) [© Inderscience] and the definitive version is available at: www.inderscience.com/ijipt Measuring various metrics of high speed and high capacity networks pro- duces a vast amount of information over a long period of time, making the conventional storage...
Conference Paper
Full-text available
Monitoring and measuring various metrics of high speed and high capacity networks produces a vast amount of information over a long period of time. For the collected monitoring data to be useful to administrators, these measurements need to be analyzed and processed in order to detect interesting characteristics such as sudden changes. In this pape...
Conference Paper
Full-text available
This is a conference paper. The original version is available at www.springerlink.com Monitoring high-speed networks for a long period of time produces a high volume of data, making the storage of this information practically inefficient. To this end, there is a need to derive an efficient method of data analysis and reduction in order to archive a...
Article
Full-text available
This is a conference paper Wavelet transform is a recent signal analysis tool that is already been successfully used in image, video and speech compression applications. This paper looks at the Wavelet transform as a method of compressing computer network measurements produced from high-speed networks. Such networks produce a large amount of inform...
Article
Full-text available
This is a conference paper This paper examines the impact of compression methods on the long-range dependence of communication network traffic measurements. The two compression methods that are examined are based on the Wavelet transformation and the Discrete Cosine Transformation (DCT). In order to measure the length of long-range dependence of a...
Article
Full-text available
This conference paper is Restricted Access Monitoring high-speed networks produces a large amount of network performance measurements over a long period of time making their storage impractical. This paper looks at the Wavelet Transform as a method of compressing the information describing network delay measurements while maintaining quality of imp...
Article
A doctoral thesis submitted in partial fulfillment of the requirements for the award of Doctor of Philosophy of Loughborough University. Monitored network data allows network managers and operators to gain valuable insight into the health and status of a network. Whilst such data is useful for real-time analysis, there is often a need to post-proce...

Network

Cited By

Projects

Project (1)