
Dr Emmanouil (Manos) Panaousis
Academic and research departments
Surrey Centre for Cyber Security, Department of Computer Science, Secure Systems Research Group.Biography
I am a Lecturer (i.e. Assistant Professor) at the University of Surrey, UK and member of the Surrey Centre for Cyber Security (SCCS), a GCHQ--‐recognised UK Academic Centre of Excellence in Cyber Security Research.
Research interests
I am studying cyber security and privacy engineering and decision-making approaches from both a theoretical and practical perspective. I have expertise in developing new models within the above fields and proposing algorithms or methodologies to tackle emerging challenges. I enjoy assessing my theoretical propositions by either simulations (mainly by using Python tools or network event-based simulators) or real-world testbeds.
Research positions and PhD supervision
I am actively pursuing research in cyber security and privacy. I am currently co-supervising three PhD students (as third supervisor) who are with the University of Brighton. I am seeking talented post-doctoral researchers and doctoral (PhD) students to join our group at SCCS. Interested candidates, please email me with a copy of their CV and a cover letter.
Grants
Through successful research and development bids I have secured approximately £1M fund and contributed to another £1M, as detailed here.
Previous studies and experience
I have received the BSc degree in Informatics and Telecommunications from University of Athens, Greece, in 2006 and the MSc degree in Computer Science from Athens University of Economics and Business, Greece in 2008, and PhD degree in Mobile Communications Security from Kingston University London, UK in 2012. Prior to the University of Surrey, I was a Senior Lecturer of Cybersecurity and Privacy at the University of Brighton; invited researcher at Imperial College; postdoctoral researcher at Queen Mary University of London; and a Research and development consultant at Ubitech Technologies Ltd in the Surrey Research Park.
Teaching and project supervision
I teach Web and Database Systems in year 1 of our BSc courses and Information Security for Business and Government in our MSc Information Security. I have also several years of teaching experience, as detailed here.
Activities
After I successfully organised the 6th Conference on Decision and Game Theory for Security (GameSec 2015) in London, I served as the Technical Program Committee Chair (jointly with Tansu Alpcan, University of Melbourne) of GameSec 2016 (7th Conference on Decision and Game Theory for Security). Gamesec is a small but high quality peer-reviewed annual conference. It attracts original submissions in the area of analytical security and privacy with an emphasis on game and decision theory. I am also a reviewer for leading journals by the ACM, IEEE, Elsevier, registered expert with the European Commission and EPSRC reviewer. In addition, I have several years of expertise in preparing EU bids and have secured funds through successful FP7 and H2020 proposals.
I am Guest editor of a special issue "Game Theory for Security" of the Games Open Access MDPI journal.
I am also reviewer in the following high impact factor journals:
- IEEE Access
- Communications of the ACM
- IEEE Transactions on Information Forensics and Security
- IEEE Transactions on Mobile Computing
- IEEE Internet of Things Journal
- European Journal of Operational Research
- ACM Transactions on Internet Technology
- (Elsevier) Ad Hoc Networks
- (Elsevier) Computers and Security
- ACM Computing Surveys
- (Elsevier) Journal of Information Security and Applications
Areas of specialism
IoT security;
Security Economics;
Game Theory;
Decision Support for Cyber Security
University roles and responsibilities
- Computer Science Website Coordinator
- Year 1 (undergraduate) Coordinator and Personal Tutor
Research
Research interests
I am studying cyber security and privacy engineering and decision-making approaches from both a theoretical and practical perspective. I have expertise in developing new models within the above fields and proposing algorithms or methodologies to tackle emerging challenges. For more information about my research, please see my publications and research grants.
Research projects
My teaching
I am currently leading the MSc module "Information Security for Business and Government" (COMM050) and the undergraduate module "Web and Database Systems" (COM1025). I also supervise undergraduate and MSc projects as well as placement students.
My publications
Publications
by 5G networks, especially due to the proliferation of Mobile Edge
Computing (MEC), which has a prominent role in reducing network stress
by shifting computational tasks from the Internet to the mobile edge. Apart
from being part of MEC, D2D can extend cellular coverage allowing users to
communicate directly when telecommunication infrastructure is highly congested
or absent. This significant departure from the typical cellular paradigm
imposes the need for decentralised network routing protocols. Moreover, enhanced
capabilities of mobile devices and D2D networking will likely result in
proliferation of new malware types and epidemics. Although the literature is
rich in terms of D2D routing protocols that enhance quality-of-service and energy
consumption, they provide only basic security support, e.g., in the form of encryption. Routing decisions can, however, contribute to collaborative detection
of mobile malware by leveraging different kinds of anti-malware software
installed on mobile devices. Benefiting from the cooperative nature of
D2D communications, devices can rely on each other's contributions to detect
malware. The impact of our work is geared towards having more malware-free
D2D networks. To achieve this, we designed and implemented a novel
routing protocol for D2D communications that optimises routing decisions
for explicitly improving malware detection. The protocol identifies optimal
network paths, in terms of malware mitigation and energy spent for malware
detection, based on a game theoretic model. Diverse capabilities of network
devices running different types of anti-malware software and their potential
for inspecting messages relayed towards an intended destination device are
leveraged using game theoretic tools. An optimality analysis of both Nash
and Stackelberg security games is undertaken, including both zero and nonzero
sum variants, and the Defender's equilibrium strategies. By undertaking
network simulations, theoretical results obtained are illustrated through randomly
generated network scenarios showing how our protocol outperforms
conventional routing protocols, in terms of expected payoff, which consists
of: security damage inflicted by malware and malware detection cost.
strategies. We refer to this as the cyber security investment challenge.In this paper, we consider
three possible decision support methodologies for security managers to tackle this challenge. We consider
methods based on game theory, combinatorial optimisation, and a hybrid of the two. Our modelling starts
by building a framework where we can investigate the effectiveness of a cyber security control regarding
the protection of different assets seen as targets in presence of commodity threats. As game theory captures
the interaction between the endogenous organisation?s and attackers? decisions, we consider a 2-person
control game between the security manager who has to choose among different implementation levels of a
cyber security control, and a commodity attacker who chooses among different targets to attack. The pure
game theoretical methodology consists of a large game including all controls and all threats. In the hybrid
methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are
combined with a Knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation
technique consists of a multi-objective multiple choice Knapsack based strategy. To compare these
approaches we built a decision support tool and a case study regarding current government guidelines. The
endeavour of this work is to highlight the weaknesses and strengths of different investment methodologies
for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security
investment. Going a step further in validating our work, we have shown that our decision support tool provides
the same advice with the one advocated by the UK government with regard to the requirements for
basic technical protection from cyber attacks in SMEs.
the success or failure of companies that rely on information
systems. Therefore, investment in cybersecurity is an important
financial and operational decision. Typical information technology
investments aim to create value, whereas cybersecurity investments
aim to minimize loss incurred by cyber attacks. Admittedly,
cybersecurity investment has become an increasingly complex
one since information systems are typically subject to frequent
attacks, whose arrival and impact fluctuate stochastically. Further,
cybersecurity measures and improvements, such as patches,
become available at random points in time making investment
decisions even more challenging.
We propose and develop an analytical real options framework
that incorporates major components relevant to cybersecurity
practice, and analyze how optimal cybersecurity investment decisions
perform for a private firm. The novelty of this paper is that
it provides analytical solutions that lend themselves to intuitive
interpretations regarding the effect of timing and cybersecurity
risk on investment behavior using real options theory. Such
aspects are frequently not implemented within economic models
that support policy initiatives. However, if these are not properly
understood, security controls will not be properly set resulting
in a dynamic inefficiency reflected in cycles of over or under
investment, and, in turn, increased cybersecurity risk following
corrective policy actions.
Results indicate that greater uncertainty over the cost of
cybersecurity attacks raises the value of an embedded option
to invest in cybersecurity. This increases the incentive to suspend
operations temporarily in order to install a cybersecurity patch
that will make the firm more resilient to cybersecurity breaches.
Similarly, greater likelihood associated with the availability of a
cybersecurity patch increases the value of the option to invest in
cybersecurity. However, absence of an embedded investment option
increases the incentive to delay the permanent abandonment
of the company?s operation due to the irreversible nature of the
decision.
devices with various types of sensors enables us to harness
diverse information with Mobile Crowd-Sensing applications
(MCS). This highly dynamic setting entails the collection of
ubiquitous data traces, originating from sensors carried by
people, introducing new information security challenges; one of
them being the preservation of data trustworthiness. What is
needed in these settings is the timely analysis of these large
datasets to produce accurate insights on the correctness of user
reports. Existing data mining and other artificial intelligence
methods are the most popular to gain hidden insights from
IoT data, albeit with many challenges. In this paper, we first
model the cyber trustworthiness of MCS reports in the presence
of intelligent and colluding adversaries. We then rigorously
assess, using real IoT datasets, the effectiveness and accuracy
of well-known data mining algorithms when employed towards
IoT security and privacy. By taking into account the spatiotemporal
changes of the underlying phenomena, we demonstrate
how concept drifts can masquerade the existence of attackers
and their impact on the accuracy of both the clustering and
classification processes. Our initial set of results clearly show that
these unsupervised learning algorithms are prone to adversarial
infection, thus, magnifying the need for further research in the
field by leveraging a mix of advanced machine learning models
and mathematical optimization techniques.
to accurately determine an insurance premium offer. However, while the potential client might have a good understanding of its own security
practices, it may also have an incentive not to disclose them honestly
since the resulting information asymmetry could work in its favor. This
information asymmetry engenders adverse selection, which can result in
unfair premiums and reduced adoption of cyber-insurance. To overcome
information asymmetry, insurers often require potential clients to selfreport
their risks. Still, clients do not have any incentive to perform
thorough self-audits or to provide comprehensive reports. As a result,
insurers have to complement self-reporting with external security audits
to verify the clients' reports. Since these audits can be very expensive, a
key problem faced by insurers is to devise an auditing strategy that deters
clients from dishonest reporting using a minimal number of audits. To
solve this problem, we model the interactions between a potential client
and an insurer as a two-player signaling game. One player represents the
client, who knows its actual security-investment level, but may report any
level to the insurer. The other player represents the insurer, who knows
only the random distribution from which the security level was drawn,
but may discover the actual level using an expensive audit. We study the
players' equilibrium strategies and provide numerical illustrations.