Zum Hauptinhalt springen

Showing 1–10 of 10 results for author: Kallitsis, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.03998  [pdf, other

    cs.CR

    OpenVPN is Open to VPN Fingerprinting

    Authors: Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi

    Abstract: VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using "dual use" DPI technology. To investigate the potential for VPN blocking, we develop mechanisms for accurately fingerprinting connections using OpenVPN, the most popula… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: In: USENIX Security Symposium 2022 (USENIX Security '22)

    Journal ref: 31st USENIX Security Symposium (USENIX Security 22). 2022

  2. Cloud Watching: Understanding Attacks Against Cloud-Hosted Services

    Authors: Liz Izhikevich, Manda Tran, Michalis Kallitsis, Aurore Fass, Zakir Durumeric

    Abstract: Cloud computing has dramatically changed service deployment patterns. In this work, we analyze how attackers identify and target cloud services in contrast to traditional enterprise networks and network telescopes. Using a diverse set of cloud honeypots in 5~providers and 23~countries as well as 2~educational networks and 1~network telescope, we analyze how IP address assignment, geography, networ… ▽ More

    Submitted 28 September, 2023; v1 submitted 23 September, 2023; originally announced September 2023.

    Comments: Proceedings of the 2023 ACM Internet Measurement Conference (IMC '23), October 24--26, 2023, Montreal, QC, Canada

  3. arXiv:2305.07193  [pdf, other

    cs.NI

    Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization

    Authors: Aniket Anand, Michalis Kallitsis, Jackson Sippe, Alberto Dainotti

    Abstract: Aggressive network scanners, i.e., ones with immoderate and persistent behaviors, ubiquitously search the Internet to identify insecure and publicly accessible hosts. These scanners generally lie within two main categories; i) benign research-oriented probers; ii) nefarious actors that forage for vulnerable victims and host exploitation. However, the origins, characteristics and the impact on real… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  4. arXiv:2211.04918  [pdf, other

    cs.CR stat.AP stat.ME

    Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals

    Authors: Rafail Kartsioukas, Rajat Tandon, Zheng Gao, Jelena Mirkovic, Michalis Kallitsis, Stilian Stoev

    Abstract: Network operators and system administrators are increasingly overwhelmed with incessant cyber-security threats ranging from malicious network reconnaissance to attacks such as distributed denial of service and data breaches. A large number of these attacks could be prevented if the network operators were better equipped with threat intelligence information that would allow them to block or throttl… ▽ More

    Submitted 22 June, 2023; v1 submitted 9 November, 2022; originally announced November 2022.

  5. arXiv:2108.00079  [pdf, other

    cs.CR cs.LG

    Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes

    Authors: Michalis Kallitsis, Vasant Honavar, Rupesh Prajapati, Dinghao Wu, John Yen

    Abstract: Network telescopes or "Darknets" provide a unique window into Internet-wide malicious activities associated with malware propagation, denial of service attacks, scanning performed for network reconnaissance, and others. Analyses of the resulting data can provide actionable insights to security analysts that can be used to prevent or mitigate cyber-threats. Large Darknets, however, observe millions… ▽ More

    Submitted 5 August, 2021; v1 submitted 28 July, 2021; originally announced August 2021.

    Comments: 30 pages, 14 tables, 12 figures, arXiv.org perpetual, non-exclusive license

  6. arXiv:1509.00268  [pdf, other

    cs.NI math.PR math.ST

    AMON: An Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multi-gigabit Streams

    Authors: Michael Kallitsis, Stilian Stoev, Shrijita Bhattacharya, George Michailidis

    Abstract: The Internet, as a global system of interconnected networks, carries an extensive array of information resources and services. Key requirements include good quality-of-service and protection of the infrastructure from nefarious activity (e.g. distributed denial of service--DDoS--attacks). Network monitoring is essential to network engineering, capacity planning and prevention / mitigation of threa… ▽ More

    Submitted 27 January, 2016; v1 submitted 1 September, 2015; originally announced September 2015.

  7. arXiv:1412.6148  [pdf, other

    cs.CR cs.DS cs.NI

    Hashing Pursuit for Online Identification of Heavy-Hitters in High-Speed Network Streams

    Authors: Michael Kallitsis, Stilian Stoev, George Michailidis

    Abstract: Distributed Denial of Service (DDoS) attacks have become more prominent recently, both in frequency of occurrence, as well as magnitude. Such attacks render key Internet resources unavailable and disrupt its normal operation. It is therefore of paramount importance to quickly identify malicious Internet activity. The DDoS threat model includes characteristics such as: (i) heavy-hitters that transm… ▽ More

    Submitted 3 December, 2014; originally announced December 2014.

    Comments: 14 pages

  8. arXiv:1306.5793  [pdf, other

    eess.SY cs.NI stat.AP stat.ML

    A State-Space Approach for Optimal Traffic Monitoring via Network Flow Sampling

    Authors: Michael Kallitsis, Stilian Stoev, George Michailidis

    Abstract: The robustness and integrity of IP networks require efficient tools for traffic monitoring and analysis, which scale well with traffic volume and network size. We address the problem of optimal large-scale flow monitoring of computer networks under resource constraints. We propose a stochastic optimization framework where traffic measurements are done by exploiting the spatial (across network link… ▽ More

    Submitted 24 June, 2013; originally announced June 2013.

    Comments: preliminary work, short paper

  9. arXiv:1203.0543   

    cs.DS cs.NI math.ST

    Efficient Approximation Algorithms for Optimal Large-scale Network Monitoring

    Authors: Michalis Kallitsis, Stilian Stoev, George Michailidis

    Abstract: The growing amount of applications that generate vast amount of data in short time scales render the problem of partial monitoring, coupled with prediction, a rather fundamental one. We study the aforementioned canonical problem under the context of large-scale monitoring of communication networks. We consider the problem of selecting the "best" subset of links so as to optimally predict the quant… ▽ More

    Submitted 3 December, 2013; v1 submitted 2 March, 2012; originally announced March 2012.

    Comments: Paper withdrawn since the official journal paper is now available. arXiv admin note: substantial text overlap with arXiv:1108.3048

  10. arXiv:1108.3048   

    cs.DS

    Fast Approximation Algorithms for Near-optimal Large-scale Network Monitoring

    Authors: Michael Kallitsis, Stilian Stoev, George Michailidis

    Abstract: We study the problem of optimal traffic prediction and monitoring in large-scale networks. Our goal is to determine which subset of K links to monitor in order to "best" predict the traffic on the remaining links in the network. We consider several optimality criteria. This can be formulated as a combinatorial optimization problem, belonging to the family of subset selection problems. Similar NP-h… ▽ More

    Submitted 3 December, 2013; v1 submitted 15 August, 2011; originally announced August 2011.

    Comments: Paper withdrawn since the official journal paper is now available