Ioannis Chochliouros - Academia.edu (original) (raw)
Uploads
Papers by Ioannis Chochliouros
IGI Global eBooks, Jan 18, 2011
Europe has entered a new phase of growth in its history, and characterized by the fast deployment... more Europe has entered a new phase of growth in its history, and characterized by the fast deployment of modern electronic communications networks and information systems in the broader scope of a competitive, dynamic and knowledge-based economy. Network and information security is an essential evolving concept among current strategic issues. These can impact on a wide range of existing/emerging policies, citizens’ concerns, including the protection against crime and terrorist threats, and the adaptation of governance structures to effectively deal with such matters and to preserve national security, public safety and the economic well-being of the State. In this context, several measures (legal, regulatory and technical provisions) have been adopted by the European Union to ensure data protection, citizen privacy and the legitimate interest of legal persons. However, member states preserve the right to carry-out lawful interception of electronic communications, or take other measures such as retention of traffic data, when necessary, for exact and specific purposes, to preserve security and to meet the generally recognised objectives of preventing and combating crime and terrorism. The current work examines the “balance” between these two fundamental policy requirements, with the aim of offering a high level of protection in an area of liberty, security and justice.
IFIP advances in information and communication technology, 2021
Nous etudions la mobilite protonique et le transport d'energie dans les systemes a liaisons h... more Nous etudions la mobilite protonique et le transport d'energie dans les systemes a liaisons hydrogene, en considerant la nature particuliere des defauts ioniques et orientationnels. Nous nous proposons d'etudier les interactions entre les dipoles microscopiques, dependant de la forme du moment dipolaire choisi et de la geometrie du systeme. Ces interactions exercent une influence non negligeable sur le mouvement des protons. Nous considerons deux types de modele atomique. Le premier est construit sur la base du modele adz en considerant simultanement une forme pour le moment dipolaire donnee par un polynome du troisieme degre. Le deuxieme est un modele plus sophistique dit zig-zag, avec une forme sinusoidale pour la description du moment dipolaire. Les equations du mouvement protonique admettent des excitations non lineaires du type onde solitaire. Nous presentons une etude analytique et numerique des differentes solutions ainsi que leurs interpretations physiques. A partir des resultats obtenus nous proposons differentes extensions possibles des deux modeles. Les interactions dipole-dipole sont capables de favoriser le deplacement des protons de maniere que la conductivite puisse devenir plus efficace
IFIP advances in information and communication technology, 2023
IFIP advances in information and communication technology, 2018
Through the advanced coordination and orchestration realised within the wider SESAME project conc... more Through the advanced coordination and orchestration realised within the wider SESAME project concept, a new architecture has been defined and proposed, aiming to attend several operators/service providers and “engage” them in a modern multi-tenant ecosystem, so that to fully serve the broader vision of the 5G; in particular, this takes place by emphasizing upon the incorporation” of network intelligence and applications in the network edge through NFV and cloud computing and by promoting the effective use of the Small Cell concept. This modern 5G-based context influences the related market sector and leads to a multiplicity of business challenges and growth opportunities for the involved actors/players. Moreover, we assess and analyze forthcoming business perspective based on a dedicated proposed business model that strongly identifies the raising potential for growth.
IFIP advances in information and communication technology, 2022
Novel cybersecurity solutions tend to adopt new mechanisms from emerging fields in order to confr... more Novel cybersecurity solutions tend to adopt new mechanisms from emerging fields in order to confront zero-day attacks and unknown signature threats. Deep learning techniques have attracted the interest of the cybersecurity domain, as they offer the flexibility to be trained for various objects and targets, amongst them network anomaly detection. Traditional network anomaly detection methods rely on predefined threats signature pattern, whereas deep learning ones can combine different attributes of network flows and packet payloads. In this paper a deep learning-based method for network anomaly detection is presented in the frame of the PALANTIR project. PALANTIR aims to develop an end-to-end cybersecurity solution for SMEs, providing virtualized security services for various attack threats. Regarding the current study, the proposed deep learning method was evaluated for its accuracy on two widely used security databases, performing anomaly detection, while performing flow monitoring. The developed framework shows promising results in terms of accuracy and sets the steppingstone for further adoption of deep learning mechanisms in the cybersecurity field.
The 5G ESSENCE Project [1] investigates the concept of Edge cloud computing and Small Cell-as-a-S... more The 5G ESSENCE Project [1] investigates the concept of Edge cloud computing and Small Cell-as-a-Service (SCaaS). One of the selected use cases is called "5G edge network acceleration at stadium", which is focused on content distribution during crowd events. The paper describes the main technical components and their functionalities of the testbed architecture for this use case.
IFIP advances in information and communication technology, 2018
Cloud computing delivers services over virtualized networks to many end-users. Cloud services are... more Cloud computing delivers services over virtualized networks to many end-users. Cloud services are characterized by such attributes as on-demand self-service, broad network access, resource pooling, rapid and elastic resource provisioning and metered services of various qualities. Cloud networks provide data as well as multimedia and video services. Cloud computing for critical structure IT is a relative new area of potential applications. Cloud networks are classified into private cloud networks, public cloud networks and hybrid cloud networks. Anomaly detection systems are defined as a branch of intrusion detection systems that deal with identifying anomalous events with respect to normal system behavior. A novel application of a Self-Organizing-Feature Map (SOFM) of reduced/aggregate sets of ordered vector structured features that are used for detecting anomalies in the context of secure cloud environments is herein proposed. Multivalue inputs consist of reduced/aggregate ordered sets of vector and binary features. The nodes of the SOFM - after training - are indicative of local distributions of feature measurements during normal cloud operation. Anomalies are detected as outliers of the trained SOFM. Each structured vector consists of binary as well as histogram data. The aggregated Canberra distance is used to order histogram data whereas the Jaccard distance is used for multivalue binary data. The so-called Cross-Order Distance Matrix is defined for both cases. The distance depends upon the selection of a similarity/distance measure and a method for operating upon the elements of the Cross-Order Distance Matrix. Several methods of estimating the distance between two ordered sets of features are investigated in the course of this paper.
The 5G ESSENCE project context is based on the concept of Edge cloud computing and Small Cell-as-... more The 5G ESSENCE project context is based on the concept of Edge cloud computing and Small Cell-as-a-Service (SCaaS) and further “promotes” their role and/or influences within the related 5G vertical markets. 5G ESSENCE's core innovation is focused upon the development/provision of a highly flexible and scalable platform, offering benefits to the involved market actors. The present work identifies a variety of challenges to be fulfilled by the 5G ESSENCE in the scope of an enhanced architectural framework. The proposed technical approach exploits the profits of the centralisation of Small Cell functions as scale grows through an edge cloud environment based on a two-tier architecture with the first distributed tier being for offering low latency services and the second centralised tier being for the provision of high processing power for computing-intensive network applications. This permits decoupling the control and user planes of the Radio Access Network (RAN) and achieving the advantages of Cloud-RAN without the enormous fronthaul latency restrictions. The use of end-to-end network slicing mechanisms allows for sharing the related infrastructure among multiple operators/vertical industries and customizing its capabilities on a per-tenant basis, creating a neutral host market and reducing operational costs.
2022 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC), May 29, 2022
IGI Global eBooks, Jan 18, 2011
IGI Global eBooks, May 24, 2011
IGI Global eBooks, May 24, 2011
The last decade is characterized by the tempestuous evolution, growth, and dissemination of infor... more The last decade is characterized by the tempestuous evolution, growth, and dissemination of information and communication technologies in the economy and society. As a result, information and communication technologies have managed to open new broad horizons and markets for enterprises, whose installation and operation costs are rapidly amortizing through the proper usage of these technologies.
IGI Global eBooks, Jan 18, 2011
Europe has entered a new phase of growth in its history, and characterized by the fast deployment... more Europe has entered a new phase of growth in its history, and characterized by the fast deployment of modern electronic communications networks and information systems in the broader scope of a competitive, dynamic and knowledge-based economy. Network and information security is an essential evolving concept among current strategic issues. These can impact on a wide range of existing/emerging policies, citizens’ concerns, including the protection against crime and terrorist threats, and the adaptation of governance structures to effectively deal with such matters and to preserve national security, public safety and the economic well-being of the State. In this context, several measures (legal, regulatory and technical provisions) have been adopted by the European Union to ensure data protection, citizen privacy and the legitimate interest of legal persons. However, member states preserve the right to carry-out lawful interception of electronic communications, or take other measures such as retention of traffic data, when necessary, for exact and specific purposes, to preserve security and to meet the generally recognised objectives of preventing and combating crime and terrorism. The current work examines the “balance” between these two fundamental policy requirements, with the aim of offering a high level of protection in an area of liberty, security and justice.
IFIP advances in information and communication technology, 2021
Nous etudions la mobilite protonique et le transport d'energie dans les systemes a liaisons h... more Nous etudions la mobilite protonique et le transport d'energie dans les systemes a liaisons hydrogene, en considerant la nature particuliere des defauts ioniques et orientationnels. Nous nous proposons d'etudier les interactions entre les dipoles microscopiques, dependant de la forme du moment dipolaire choisi et de la geometrie du systeme. Ces interactions exercent une influence non negligeable sur le mouvement des protons. Nous considerons deux types de modele atomique. Le premier est construit sur la base du modele adz en considerant simultanement une forme pour le moment dipolaire donnee par un polynome du troisieme degre. Le deuxieme est un modele plus sophistique dit zig-zag, avec une forme sinusoidale pour la description du moment dipolaire. Les equations du mouvement protonique admettent des excitations non lineaires du type onde solitaire. Nous presentons une etude analytique et numerique des differentes solutions ainsi que leurs interpretations physiques. A partir des resultats obtenus nous proposons differentes extensions possibles des deux modeles. Les interactions dipole-dipole sont capables de favoriser le deplacement des protons de maniere que la conductivite puisse devenir plus efficace
IFIP advances in information and communication technology, 2023
IFIP advances in information and communication technology, 2018
Through the advanced coordination and orchestration realised within the wider SESAME project conc... more Through the advanced coordination and orchestration realised within the wider SESAME project concept, a new architecture has been defined and proposed, aiming to attend several operators/service providers and “engage” them in a modern multi-tenant ecosystem, so that to fully serve the broader vision of the 5G; in particular, this takes place by emphasizing upon the incorporation” of network intelligence and applications in the network edge through NFV and cloud computing and by promoting the effective use of the Small Cell concept. This modern 5G-based context influences the related market sector and leads to a multiplicity of business challenges and growth opportunities for the involved actors/players. Moreover, we assess and analyze forthcoming business perspective based on a dedicated proposed business model that strongly identifies the raising potential for growth.
IFIP advances in information and communication technology, 2022
Novel cybersecurity solutions tend to adopt new mechanisms from emerging fields in order to confr... more Novel cybersecurity solutions tend to adopt new mechanisms from emerging fields in order to confront zero-day attacks and unknown signature threats. Deep learning techniques have attracted the interest of the cybersecurity domain, as they offer the flexibility to be trained for various objects and targets, amongst them network anomaly detection. Traditional network anomaly detection methods rely on predefined threats signature pattern, whereas deep learning ones can combine different attributes of network flows and packet payloads. In this paper a deep learning-based method for network anomaly detection is presented in the frame of the PALANTIR project. PALANTIR aims to develop an end-to-end cybersecurity solution for SMEs, providing virtualized security services for various attack threats. Regarding the current study, the proposed deep learning method was evaluated for its accuracy on two widely used security databases, performing anomaly detection, while performing flow monitoring. The developed framework shows promising results in terms of accuracy and sets the steppingstone for further adoption of deep learning mechanisms in the cybersecurity field.
The 5G ESSENCE Project [1] investigates the concept of Edge cloud computing and Small Cell-as-a-S... more The 5G ESSENCE Project [1] investigates the concept of Edge cloud computing and Small Cell-as-a-Service (SCaaS). One of the selected use cases is called "5G edge network acceleration at stadium", which is focused on content distribution during crowd events. The paper describes the main technical components and their functionalities of the testbed architecture for this use case.
IFIP advances in information and communication technology, 2018
Cloud computing delivers services over virtualized networks to many end-users. Cloud services are... more Cloud computing delivers services over virtualized networks to many end-users. Cloud services are characterized by such attributes as on-demand self-service, broad network access, resource pooling, rapid and elastic resource provisioning and metered services of various qualities. Cloud networks provide data as well as multimedia and video services. Cloud computing for critical structure IT is a relative new area of potential applications. Cloud networks are classified into private cloud networks, public cloud networks and hybrid cloud networks. Anomaly detection systems are defined as a branch of intrusion detection systems that deal with identifying anomalous events with respect to normal system behavior. A novel application of a Self-Organizing-Feature Map (SOFM) of reduced/aggregate sets of ordered vector structured features that are used for detecting anomalies in the context of secure cloud environments is herein proposed. Multivalue inputs consist of reduced/aggregate ordered sets of vector and binary features. The nodes of the SOFM - after training - are indicative of local distributions of feature measurements during normal cloud operation. Anomalies are detected as outliers of the trained SOFM. Each structured vector consists of binary as well as histogram data. The aggregated Canberra distance is used to order histogram data whereas the Jaccard distance is used for multivalue binary data. The so-called Cross-Order Distance Matrix is defined for both cases. The distance depends upon the selection of a similarity/distance measure and a method for operating upon the elements of the Cross-Order Distance Matrix. Several methods of estimating the distance between two ordered sets of features are investigated in the course of this paper.
The 5G ESSENCE project context is based on the concept of Edge cloud computing and Small Cell-as-... more The 5G ESSENCE project context is based on the concept of Edge cloud computing and Small Cell-as-a-Service (SCaaS) and further “promotes” their role and/or influences within the related 5G vertical markets. 5G ESSENCE's core innovation is focused upon the development/provision of a highly flexible and scalable platform, offering benefits to the involved market actors. The present work identifies a variety of challenges to be fulfilled by the 5G ESSENCE in the scope of an enhanced architectural framework. The proposed technical approach exploits the profits of the centralisation of Small Cell functions as scale grows through an edge cloud environment based on a two-tier architecture with the first distributed tier being for offering low latency services and the second centralised tier being for the provision of high processing power for computing-intensive network applications. This permits decoupling the control and user planes of the Radio Access Network (RAN) and achieving the advantages of Cloud-RAN without the enormous fronthaul latency restrictions. The use of end-to-end network slicing mechanisms allows for sharing the related infrastructure among multiple operators/vertical industries and customizing its capabilities on a per-tenant basis, creating a neutral host market and reducing operational costs.
2022 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC), May 29, 2022
IGI Global eBooks, Jan 18, 2011
IGI Global eBooks, May 24, 2011
IGI Global eBooks, May 24, 2011
The last decade is characterized by the tempestuous evolution, growth, and dissemination of infor... more The last decade is characterized by the tempestuous evolution, growth, and dissemination of information and communication technologies in the economy and society. As a result, information and communication technologies have managed to open new broad horizons and markets for enterprises, whose installation and operation costs are rapidly amortizing through the proper usage of these technologies.