Visible to the public Biblio

Filters: Author is Polemi, Nineta  [Clear All Filters]
2023-04-14
Michota, Alexandra, Polemi, Nineta.  2022.  A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act. 2022 IEEE International Conference on Cyber Security and Resilience (CSR). :382–387.
Since the provision of digital services in our days (e.g. container management, transport of COVID vaccinations or LNG) in most economic sectors (e.g. maritime, health, energy) involve national, EU and non-EU stakeholders compose complex Supply Chain Services (SCS). The security of the SCS is most important and it emphasized in the NIS 2 directive [3] and it is a shared responsibility of all stakeholders involved that will need to be compliant with a scheme. In this paper we present an overview of the proposed Cybersecurity Certification Scheme for Supply Chain Services (EUSCS) as proposed by the European Commission (EC) project CYRENE [1]. The EUSCS scheme covers all the three assurance levels defined in the Cybersecurity Act (CSA) [2] taking into consideration the criticality of SCS according to the NIS 2 directive [3], the ENISA Threat Landscape for Supply Chain Attacks [4] and the CYRENE extended online Information Security Management System (ISMS) that allows all SCS stakeholders to provide and access all information needed for certification purposes making the transition from current national schemes in the EU easier.
2022-04-19
Tanakas, Petros, Ilias, Aristidis, Polemi, Nineta.  2021.  A Novel System for Detecting and Preventing SQL Injection and Cross-Site-Script. 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). :1–6.
SQL Injection and Cross-Site Scripting are the two most common attacks in database-based web applications. In this paper we propose a system to detect different types of SQL injection and XSS attacks associated with a web application, without the existence of any firewall, while significantly reducing the network overhead. We use properly modifications of the Nginx Reverse Proxy protocols and Suricata NIDS/ IPS rules. Pure work has been done from other researchers based on the capabilities of Nginx and Suricata and our approach with the experimental results provided in the paper demonstrate the efficiency of our system.