Georgios Magklaras

From Wikipedia, the free encyclopedia

Georgios (George) V. Magklaras (born in Agrinio, Greece) (Greek: Γεώργιος Μαγκλάρας) is a computer scientist working as a Senior Computer Systems Engineer at the Norwegian Meteorological Institute, in Norway. He also co-founded Steelcyber Scientific, an information security based consultancy specialising in digital forensics. He is a high-performance computing engineer and information security researcher. He developed methods in the field of insider IT misuse detection and prediction and digital forensics. He is the author of the LUARM and POFR tools for the Linux Operating System. He has been a strong advocate of Linux, open source tools and the Perl programming language and has given a series of lectures internationally in the fields of intrusion detection systems, digital forensics, bioinformatics, computer programming and systems administration.

Education[edit]

Magklaras gained his BSc (Hons) in Computer Systems and Networks from the University of Plymouth, UK, where he graduated in 2000. He was then awarded an EPSRC scholarship to start the study of an MPhil (2005) degree in the area of Information Security, under the Faculty of Technology at the University of Plymouth, UK. Under the supervision of Prof. Steven M. Furnell at the School of Computing, University of Plymouth, UK], he completed his PhD study in the same area (Information Security) in 2012.

Research and career[edit]

His research was initially concerned with ways to classify computer security incident management responses.[1][2] However, his attention was drawn to the problem of misuse detection. Magklaras developed one of the first methods to systematize the misuse detection and misuse prediction techniques.[3] He captured the problem of insider IT misuse[4] and set the theoretical and practical foundations for a generic architecture that facilitates misuse detection and misuse prediction.[5][6][7] As part of this work, he wrote the LUARM tool[8] which is a live/volatile digital forensics engine that targets misuse detection. The LUARM research prototype has already been used with success on a number of notable cases detecting insiders and external computer intrusion attempts, however its main usefulness as a research prototype is to create data sets for researchers to further understand the nature of insider threats. An evolved open source version of the tool, the Penguin OS Forensic Recorder POFR has been developed under his supervision by Steelcyber Scientific,[9] an IT consulting firm that focuses on information security and scientific computing. This version contains performance, security and forensic data accuracy improvements over the originally developed LUARM prototype and is suitable for auditing various IT infrastructure components.

Magklaras also pioneered the use of Domain Specific Languages in the field of misuse detection and prediction, in order to strengthen the data mining capabilities of information security researchers. His work on the Insider Threat Prediction and Specification Language (ITPSL) forms the only known XML based DSL language that attempts to produce semantics capable of combining techniques that mine and interpret misuse data with tags that provide the likelihood of a misuse threat occurring.[10][11][12]

Magklaras has also been involved in the construction of deep packet inspection infrastructures for several hardware/software vendors, although this work has not been presented on the public domain. He is a strong advocate of information privacy. He has performed security assessments of COVID-19 mobile phone contact tracing applications.[13] However, he has expressed critical views on how the mass media are covering the issue of electronic surveillance and has consulted for the Free Software Foundation on that matter. He has been an infrequent contributor of Black Hat Briefings and has participated (as part of a team) in various computer hacking challenges, including that of the GCHQ challenge in 2011.

In the field of bioinformatics, Magklaras has contributed to the study of biological sequence databases and protein-to-protein interactions by mainly engineering software (algorithms, programming) [14][15][16] to address these tasks. His is also known for his technical work in architectures that address the data storage volume and processing requirements of Next Generation Sequencing machines.[17][18][19]

Prior working at the Norwegian Meteorological Institute, Magklaras has worked in various technical and scientific positions for a number of companies and organisations, including those of the University of Oslo, Sequent Computer Systems, IBM UK and Tiscali. He has held a number of professional affiliations, including those of an IEEE affiliate member, USENIX, SAGE/LOPSA and Red Hat Certified Engineer. He has held the position of Secretary (since 2005) and Chair (2010–2015) of the Technical Management Project Committee of the EMBnet organization.

References[edit]

  1. ^ A Generic Taxonomy for Intrusion Specification and Response, Furnell S., Magklaras G., Papadaki M., Dowland P., Proceedings of Euromedia 2001, Valencia, Spain, 18–20 April 2001.
  2. ^ Security Vulnerabilities and System Intrusions - The need for Automatic Response Frameworks, Papadaki M., Magklaras G., Furnell S., Alayed A., Proceedings of the IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Pages: 87 - 98, Year of Publication: 2001
  3. ^ Magklaras, George; Furnell, Steven (2002-01-01). "Insider Threat Prediction Tool: Evaluating the probability of IT misuse". Computers & Security. 21: 62–73. doi:10.1016/S0167-4048(02)00109-8.
  4. ^ The Insider Misuse Threat Survey: Investigating IT misuse from legitimate users, Magklaras G., Furnell S, 2004 International Information Warfare Conference, Perth, Australia, 2004.
  5. ^ An architecture for Insider Misuse Threat Prediction in IT systems, Magklaras G., Master of Philosophy thesis (MPhil), School of Computing, Communications and Electronics, University of Plymouth, UK, January 2005.
  6. ^ Magklaras, George; Furnell, Steven (2005-08-01). "A preliminary model of end user sophistication for insider threat prediction in IT systems". Computers & Security. 24 (5): 371–380. doi:10.1016/j.cose.2004.10.003.
  7. ^ Book Chapter: Magklaras G., Furnell S. (2010) Insider Threat Specification as a Threat Mitigation Technique. In: Probst C., Hunker J., Gollmann D., Bishop M. (eds) Insider Threats in Cyber Security. Advances in Information Security, vol 49. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-7133-3_10
  8. ^ Magklaras, G.; Furnell, S.; Papadaki, M. (2011). "LUARM: An Audit Engine for Insider Misuse Detection". International Journal of Digital Crime and Forensics. 3 (3): 37–49. doi:10.4018/jdcf.2011070103.
  9. ^ Scientific, Steelcyber. "Steelcyber Scientific - POFR". www.steelcyber.com. Retrieved 2021-11-12.
  10. ^ Magklaras, G.B., Furnell, S.M. and Brooke, P.J. (2006), "Towards an insider threat prediction specification language", Information Management & Computer Security, Vol. 14 No. 4, pp. 361-381. https://doi.org/10.1108/09685220610690826
  11. ^ Magklaras, George; Furnell, Steven (2012-07-12). "The Insider Threat Prediction and Specification Language". Proceedings of the 9th International Network Conference, INC 2012.
  12. ^ An Insider Misuse Threat Detection and Prediction Language, Magklaras G., PhD Thesis, School of Computing and Mathematics, Faculty of Science and Technology, University of Plymouth, UK, July 2011.
  13. ^ Magklaras G., López-Bojórquez L.N. (2020) A Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone Applications. In: Clarke N., Furnell S. (eds) Human Aspects of Information Security and Assurance. HAISA 2020. IFIP Advances in Information and Communication Technology, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-030-57404-8_3
  14. ^ Razick, S., Magklaras, G. & Donaldson, I.M. iRefIndex: A consolidated protein interaction database with provenance. BMC Bioinformatics 9, 405 (2008). https://doi.org/10.1186/1471-2105-9-405
  15. ^ Superclusteroid: a Web tool dedicated to data processing of protein-protein interaction networks, Ropodi a., Sakkos N., Moschopoulos C., Magklaras G., Kossida S., Research Paper, EMBnet.journal, Vol. 17 No. 2, pages 10 to 15, December 2011.
  16. ^ Book Chapter:"Physiological Substrates of PKA and PKG", Ruppelt A., Oberprieler N.G., Magklaras G., and Tasken K., Handbook of Cellular Signalling (Eds Ralph Bradshaw and Edward Dennis), Academic Press/Elsevier (2009), ISBN 0-12-374145-9
  17. ^ High Throughput Sequencing and the IT architecture Part 1:Volume Dimensioning and Filesystems, Technical Note, Magklaras G., EMBnet news periodical, Volume 15 (Issue 5, pages 51 to 55), March 2010.
  18. ^ Data storage considerations for HTS platforms, Invited talk given at the EMBRACE next generation sequencing workshop in Rome, November 2009.
  19. ^ The NGS IT notes, invited talk given at the International Workshops on Bioinformatics - 2012, Center of Genomic Sciences, National Autonomous University of Mexico (UNAM).

External links[edit]