Skip to main content

Showing 1–8 of 8 results for author: Mitrokotsa, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1306.1066  [pdf, other

    stat.ML cs.LG

    Bayesian Differential Privacy through Posterior Sampling

    Authors: Christos Dimitrakakis, Blaine Nelson, and Zuhe Zhang, Aikaterini Mitrokotsa, Benjamin Rubinstein

    Abstract: Differential privacy formalises privacy-preserving mechanisms that provide access to a database. We pose the question of whether Bayesian inference itself can be used directly to provide private access to data, with no modification. The answer is affirmative: under certain conditions on the prior, sampling from the posterior distribution can be used to achieve a desired level of privacy and utilit… ▽ More

    Submitted 23 December, 2016; v1 submitted 5 June, 2013; originally announced June 2013.

    Comments: 38 pages; An earlier version of this article was published in ALT 2014. This version has corrections and additional results

  2. arXiv:1208.5641  [pdf, ps, other

    cs.CR stat.AP

    Near-Optimal Blacklisting

    Authors: Christos Dimitrakakis, Aikaterini Mitrokotsa

    Abstract: Many applications involve agents sharing a resource, such as networks or services. When agents are honest, the system functions well and there is a net profit. Unfortunately, some agents may be malicious, but it may be hard to detect them. We consider the intrusion response problem of how to permanently blacklist agents, in order to maximise expected profit. This is not trivial, as blacklisting ma… ▽ More

    Submitted 29 July, 2013; v1 submitted 28 August, 2012; originally announced August 2012.

    Comments: Submitted to INFOCOM 2014, 10 pages, 3 figures

  3. arXiv:1009.0278  [pdf, ps, other

    cs.CR cs.NI

    Expected loss analysis of thresholded authentication protocols in noisy conditions

    Authors: Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay

    Abstract: A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error correction. This requires assigning an acceptable threshold for the number of detected errors. This paper describes a framework enabling an expected loss analysis for all the protocols in this family. Furthermore, computatio… ▽ More

    Submitted 1 September, 2010; originally announced September 2010.

    Comments: 17 pages, 2 figures; draft

  4. arXiv:0910.0483  [pdf, ps, other

    stat.ML cs.LG stat.AP

    Statistical Decision Making for Authentication and Intrusion Detection

    Authors: Christos Dimitrakakis, Aikaterini Mitrokotsa

    Abstract: User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose a novel alternative based on a principled statistical decision-making view point. We examine the technique on a toy problem… ▽ More

    Submitted 5 October, 2009; originally announced October 2009.

    Comments: 13 pages, 2 figures, to be presented at ICMLA 2009

    Report number: IAS-UVA-09-02

  5. arXiv:0906.4618  [pdf, other

    cs.CR

    Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

    Authors: Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa, Juan M. E. Tapiador

    Abstract: The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance f… ▽ More

    Submitted 20 June, 2010; v1 submitted 25 June, 2009; originally announced June 2009.

    Comments: 31 pages, 10 figures, 1 table

  6. arXiv:0807.2053  [pdf

    cs.CR cs.NI

    Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

    Authors: Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris

    Abstract: In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on a class of neural networks called eSOM. The… ▽ More

    Submitted 13 July, 2008; originally announced July 2008.

    Comments: 8 pages, 9 figures, presented at MedHocNet07

  7. arXiv:0807.2049  [pdf, ps, other

    cs.CR cs.NI

    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

    Authors: Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris

    Abstract: In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naive Bayes classifier and the Support Vector Machine (SVM). The performance of the classification algorithms is evaluated… ▽ More

    Submitted 13 July, 2008; originally announced July 2008.

    Comments: 12 pages, 7 figures, presented at MedHocNet 2008

  8. arXiv:0807.2043  [pdf

    cs.CR cs.CV cs.NI

    Intrusion Detection Using Cost-Sensitive Classification

    Authors: Aikaterini Mitrokotsa, Christos Dimitrakakis, Christos Douligeris

    Abstract: Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not detecting at- tacks. For this reason, we examine how cost-sensitive classification methods can be used in Intrusion Detection systems. The performance of the approach is evaluated under different experimental conditio… ▽ More

    Submitted 13 July, 2008; originally announced July 2008.

    Comments: 13 pages, 6 figures, presented at EC2ND 2007