Match!
Marios Anagnostopoulos
University of the Aegean
10Publications
5H-index
112Citations
Publications 10
Newest
view all 4 authors...
Source
Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks. Through these channels, they are capable of communicating in a stealthy way, unnoticed by the defenders and bypassing the security mechanisms of protected networks. The covert channels facilitate the hidden distribution of data to internal agents. For instance, a stealthy covert channel could be beneficial for the purposes of a botmaster that desires to send commands to their bot army, or for ex...
Source
#1Marios Anagnostopoulos (SUTD: Singapore University of Technology and Design)H-Index: 5
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.David K. Y. Yau (SUTD: Singapore University of Technology and Design)H-Index: 31
view all 4 authors...
DNS amplification attack is a significant and persistent threat to the Internet. Authoritative name servers (ANSes) of popular domains, especially the DNSSEC-enabled ones, give attractive leverage for attackers in distributed denial-of-service (DDoS) attacks. Particularly, the ANS list of top-level domains (TLD) is publicly accessible, including by would-be attackers, in the form of a root.zone file. In this work, we examine the potential of TLD ANSes to be exploited as unknowing agents in DNS a...
Source
#1Marios Anagnostopoulos (SUTD: Singapore University of Technology and Design)H-Index: 5
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.David K. Y. Yau (SUTD: Singapore University of Technology and Design)H-Index: 31
view all 6 authors...
Botnet armies constitute a major and continuous threat to the Internet. Their number, diversity, and power grows with each passing day, and the last years we are witnessing their rapid expansion to mobile and even IoT devices. The work at hand focuses on botnets which comprise mobile devices (e.g. smartphones), and aims to raise the alarm on a couple of advanced Command and Control (CC first to further obfuscate their identity and minimize the botnet’s forensic signal, and second to augment the ...
Source
#1Marios Anagnostopoulos (University of the Aegean)H-Index: 5
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 31
view all 3 authors...
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the...
27 CitationsSource
Sep 1, 2015 in TrustBus (Trust and Privacy in Digital Business)
#1Zisis Tsiatsikas (University of the Aegean)H-Index: 3
#2Marios Anagnostopoulos (University of the Aegean)H-Index: 5
Last.Dimitris Geneiatakis (A.U.Th.: Aristotle University of Thessaloniki)H-Index: 13
view all 5 authors...
Covert channels pose a significant threat for networking systems. In this paper, we examine the exploitation of Session Description Protocol (SDP) information residing in Session Initiation Protocol (SIP) requests with the aim to hide data in plain sight. While a significant mass of works in the literature cope with covert communication channels, only a very limited number of them rely on SIP to realize its goals. Also, none of them concentrates on SDP data contained in SIP messages to implement...
2 CitationsSource
#1Marios Anagnostopoulos (University of the Aegean)H-Index: 5
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 31
view all 5 authors...
It is without doubt that the Domain Name System (DNS) is one of the most decisive elements of the Internet infrastructure; even a slight disruption to the normal operation of a DNS server could cause serious impairment to network services and thus hinder access to network resources. Hence, it is straightforward that DNS nameservers are constantly under the threat of Denial of Service (DoS) attacks. This paper presents a new, stealthy from the attacker's viewpoint, flavor of DNSSEC-powered amplif...
44 CitationsSource
Oct 1, 2013 in UbiComp (Ubiquitous Computing)
#1Dimitrios Damopoulos (University of the Aegean)H-Index: 10
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.Jong Hyuk Park (Seoul National University of Science and Technology)H-Index: 30
view all 5 authors...
Perhaps, the most important parameter for any mobile application or service is the way it is delivered and experienced by the end-users, who usually, in due course, decide to keep it on their software portfolio or not. Most would agree that security and privacy have both a crucial role to play toward this goal. In this context, the current paper revolves around a key question: Do modern mobile applications respect the privacy of the end-user? The focus is on the iPhone platform security and espe...
20 CitationsSource
#1Marios Anagnostopoulos (University of the Aegean)H-Index: 5
#2Georgios Kambourakis (University of the Aegean)H-Index: 24
Last.Stefanos Gritzalis (University of the Aegean)H-Index: 31
view all 4 authors...
6 CitationsSource
#1Georgios Kambourakis (University of the Aegean)H-Index: 24
#2Elisavet Konstantinou (University of the Aegean)H-Index: 10
Last.Georgios Fotiadis (University of the Aegean)H-Index: 5
view all 5 authors...
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitioning, and wireless connections. These properties make traditional wireline security solutions not straightforwardly applicable in MANETs, and of course, constitute the establishment of a Public Key Infrastructure (PKI) in such networks a cumbersome task. After surveying related work, we propose a novel public key manage...
13 CitationsSource
1