Dr. Emmanouil Vasilomanolakis

nameEmmanouil Vasilomanolakis
position

Senior Researcher

Postdoc (Smart Protection in Infrastructures and Networks (SPIN))

emailvasilomano@tk.tu-darmstadt.de
phone+49 (6151) 16 - 23199
fax

+49 (6151) 16 - 23202

office

S2|02 A312

postal address

TU Darmstadt - FB 20
FG Telekooperation
Hochschulstraße 10
D-64289 Darmstadt
Germany

Research Interests

  • Collaborative Intrusion Detection
  • Honeypots
  • Botnet monitoring

Short Bio

I am a senior researcher (post-doc) at Technische Universität Darmstadt. My research interests include collaborative intrusion detection, honeypots and alert data correlation.

I received a PhD (Dr. rer. nat.) from the Technische Universität Darmstadt in 2016 for my dissertation "On Collaborative Intrusion Detection". Heretofore, I received my diploma (Dipl.-Inform.) and MSc from the University of the Aegean (Greece) in 2008 and 2011 respectively. My master thesis, in the area of honeypots, was conducted in cooperation with the National Center of Scientific Research “Demokritos”. Lastly, I worked as a researcher for AGT International, on the field of IoT security, from 2014-2015.

Publications

Additional Attributes

Type

I Trust my Zombies: a Trust-enabled Botnet

Emmanouil Vasilomanolakis, Jan Helge Wolf, Leon Böck, Max Mühlhäuser, Shankar Karuppayah
In: Blackhat Europe, December 2017
[Online-Edition: https://www.blackhat.com/eu-17]
[Inproceedings]

ID2T - The Intrusion Detection Dataset Generation Toolkit

Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser
December 2017
[Online-Edition: https://www.blackhat.com/eu-17]
[Misc]

Towards Blockchain-Based Collaborative Intrusion Detection Systems

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Max Mühlhäuser
In: International Conference on Critical Information Infrastructures Security, October 2017
Springer-Verlag
[Online-Edition: http://www.critis2017.org]
[Inproceedings]

Challenges and Available Solutions against Organized Cyber-Crime and Terrorist Networks

Andrea Tundis, Florian Huber, Bernhard Jäger, Jörg Daubert, Emmanouil Vasilomanolakis, Max Mühlhäuser
In: International Conference on Safety and Security Engineering, September 2017
[Inproceedings]

TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Tamara Frieß, Max Mühlhäuser
In: USENIX Security Symposium Poster Session, August 2017
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
[Misc]

Towards Trust-aware Collaborative Intrusion Detection: challenges and solutions

Emmanouil Vasilomanolakis, Sheikh Mahbub Habib, Rabee Sohail Malik, Pavlos Milaszewicz, Max Mühlhäuser
In: International Conference on Trust Management (IFIPTM), Vol. 505, p. 94-109, June 2017
Springer International Publishing
[Online-Edition: http://wp.portal.chalmers.se/ifiptm2017/]
[Inproceedings]

Defending Against Probe-Response Attacks

Emmanouil Vasilomanolakis, Noorulla Sharief, Max Mühlhäuser
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), p. 1046 - 1051, May 2017
IEEE
[Online-Edition: http://www.dissect.vcu.edu/2017/]
[Inproceedings]

On Probe-Response Attacks in Collaborative Intrusion Detection Systems

Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser
In: IEEE Conference on Communications and Network Security, p. 279 - 286, October 2016
IEEE
[Online-Edition: http://cns2016.ieee-cns.org/]
[Inproceedings]

On Collaborative Intrusion Detection

Emmanouil Vasilomanolakis
July 2016
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5596/]
[Phdthesis]

BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets

Shankar Karuppayah, Emmanouil Vasilomanolakis, Steffen Haas, Mathias Fischer, Max Mühlhäuser
In: IEEE ICC Communication and Information Systems Security Symposium, p. 1-7, May 2016
IEEE
[Online-Edition: http://icc2016.ieee-icc.org/]
[Inproceedings]

To top

Community Services

Journals

Editor

Reviewer

  • Journal of Network and Computer Applications, ELSEVIER
  • Computer Science Review, ELSEVIER
  • Information Fusion, ELSEVIER
  • IEEE Transactions on Cognitive Communications and Networking

Conferences & Workshops

Organizer/Chair

TPC member

Reviewer

  • IEEE GLOBECOM
  • IEEE International Conference on Communications (ICC)

Posters, Demos and Talks

  • 10-11.06.2014 Collaborative Intrusion Detection using Mobile Honeypots
    Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Max Muhlhauser
    Intel Workshop on Cyberphysical and Mobile Security, Darmstadt, Germany (poster)
  • 21.04.2013 A short introduction to honeypots
    FOSSCOMM 2013, Athens, Greece (invited talk)

Summer/Winter Schools & Workshops

  • European Intensive Program on Information and Communication Security (IPICS), University of Regensburg, Germany, 2008
  • 4th Summer School on Network & Information Security (NIS): The Challenge of the Changing Risk Landscape, jointly organized by ENISA and FORTH, Greece, 2011
  • Honeynet Project Workshop (Under a full scholarship offered by the Honeynet Project), Warsaw Poland, 2014

Topics for Bachelor and Master Theses

Please check the list bellow for open Bachelor or Master thesis topics. Our group always offers a selection of challenging topics in the area of intrusion detection and Cyber Security. If you see an open topic that appears to be interesting for you, kindly drop me an email.

Theses

3 Entries found


Extended probe-response attacks on cyber-incident monitors

Master Thesis

finished


A Toolkit for Synthetic Injection of Attacks into Network Data

Bachelor Thesis

finished


Nowadays Intrusion Detection Systems (IDS) have established as a mandatory line of defense in critical
networks. One main aspect during the development of a IDS is the evaluation and optimization of
the detection algorithms. Currently there is no standardized model for the evaluation of the detection
efficiency. A common approach has been the use of static datasets, but the publicly available datasets
have flaws in many regards, like their actuality, the absence of up-to-date attacks and the lack of realism
due to synthetically injected attacks. This makes it difficult to gather meaningful results and compare
algorithms with each other.

Comparison and Evaluation of Honeypots

Master Thesis

finished


The number of cyber attacks is increasing rapidly both in numbers but also in their sophistication. Besides traditional passive defence mechanisms, e.g., intrusion detection systems and firewalls, one can utilize more active approaches. Honeypots are special systems whose value lies in being probed attacked and compromised. They can provide a unique way to detect novel/unknown attacks and also to study the adversaries' behaviour.


Teaching

Winter Term 2017/2018

Winter Term 2016/2017

  • Seminar Telekooperation
  • Protection in Networked Systems ‒ Trust, Resilience, and Privacy (course web page)

Winter Term 2015/2016

  • Seminar Telekooperation (course web page)
  • Bachelor Students Traineeship / Bachelorpraktikum
  • Oberseminar TK (link)

Winter Term 2014/2015

  • Seminar Telekooperation (course web page)
    Advisor for topics: "Analysis of collaborative data correlation algorithms with a focus on alert data correlation", "A survey of the security features of IoT platforms and architectures", "A Survey on Security in the Internet of Thing’s Machine-to-Machine Platforms"
  • Projectpraktikum
    Supervision: HosTaGe

Summer Term 2014

  • Seminar Telekooperation (course web page)
    Advisor for topic "
    Alert Correlation and Aggregation for Collaborative Intrusion Detection"
  • Simulation und Evaluation von Computernetzwerken (SECoN) (course web page)
    Assistant

Winter Term 2013/2014

  • Seminar Telekooperation (course web page)
    Advisor for topics "Mobile Honeypots: A survey" and (Co-advisor) "Mobile Live Forensics"
  • Bachelor Students Traineeship / Bachelorpraktikum
    Co-supervision "HOsTaGe: 2.0"
  • Projectpraktikum
    Co-supervision "HOsTaGe: Arm and Loaded"

Summer Term 2013

Winter Term 2012/2013

  • Seminar Security, Privacy, and Trust
    Advisor for topic “Attacks on Intrusion Detection Systems
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang