Georgios Magklaras

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Georgios (George) V. Magklaras (born in Agrinio, Greece) (Greek: Γεώργιος Μαγκλάρας) is a computer scientist working as a Senior Computer Systems Engineer at the University of Oslo, in Norway. He is an information security researcher and developed methods in the field of insider IT misuse detection and prediction. He is also an active systems administrator information security consultant and Information Technology practitioner working with High Performance Computing, especially in the fields of Life Sciences and Bioinformatics applications. He has been a strong advocate of Linux, Open Source tools and the Perl programming language and has given a series of lectures internationally in the fields of Intrusion Detection Systems, Digital Forensics, Bioinformatics, Computer Programming and Systems Administration.


Magklaras gained his BSc (Hons) in Computer Systems and Networks from the University of Plymouth, UK, where he graduated in 2000. He was then awarded an EPSRC scholarship to start the study of an MPhil (2005) degree in the area of Information Security, under the Faculty of Technology at the University of Plymouth, UK. Under the supervision of Prof. Steven M. Furnell at the School of Computing, University of Plymouth, UK], he completed his PhD study in the same area (Information Security) in 2012.

Research and Career[edit]

His research was initially concerned with ways to classify computer security incident management responses.[1][2] However, his attention was drawn to the problem of misuse detection. Magklaras developed one of the first methods to systematize the misuse detection and misuse prediction techniques.[3] He captured the problem of insider IT misuse [4] and set the theoretical and practical foundations for a generic architecture that facilitates misuse detection and misuse prediction.[5][6][7] As part of this work, he wrote the LUARM tool [8] which is one of the few forensic enabled computer data logging engines that target misuse detection. LUARM has already been used with success on a number of notable cases detecting insiders and external computer intrusion attempts, however its main usefulness as a research prototype is to create data sets for researchers to further understand the nature of insider threats.

Magklaras also pioneered the use of Domain Specific Languages in the field of misuse detection and prediction, in order to strengthen the data mining capabilities of information security researchers. His work on the Insider Threat Prediction and Specification Language (ITPSL) forms the only known XML based DSL language that attempts to produce semantics capable of combining techniques that mine and interpret misuse data with tags that provide the likelihood of a misuse threat occurring.[9][10][11]

Magklaras has also been involved in the construction of deep packet inspection infrastructures for several hardware/software vendors, although this work has not been presented on the public domain. However, he has expressed critical views on how the mass media are covering the issue of electronic surveillance and has consulted for the Free Software Foundation on that matter. He has been an infrequent contributor of Black Hat Briefings and has participated (as part of a team) in various computer hacking challenges, including that of the GCHQ challenge in 2011.

In the field of bioinformatics, Magklaras has contributed to the study of biological sequence databases and protein-to-protein interactions by mainly engineering software (algorithms, programming) [12][13][14] to address these tasks. His is also known for his technical work in architectures that address the data storage volume and processing requirements of Next Generation Sequencing machines.[15][16][17]

Prior working at the University of Oslo, Magklaras has worked in various technical and scientific positions for a number of companies and organizations, including those of Sequent Computer Systems, Boeing and IBM UK. He has held a number of professional affiliations, including those of an IEEE affiliate member, USENIX, SAGE/LOPSA and Red Hat Certified Engineer. He has held the position of Secretary (since 2005) and Chair (since 2010) of the Technical Management Project Committee of the EMBnet organization.


  1. ^ A Generic Taxonomy for Intrusion Specification and Response, Furnell S., Magklaras G., Papadaki M., Dowland P., Proceedings of Euromedia 2001, Valencia, Spain, 18–20 April 2001.
  2. ^ Security Vulnerabilities and System Intrusions - The need for Automatic Response Frameworks, Papadaki M., Magklaras G., Furnell S., Alayed A., Proceedings of the IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Pages: 87 - 98, Year of Publication: 2001
  3. ^ Insider Threat Prediction Tool: Evaluating the probability of IT misuse, Magklaras G., Furnell S., Computers & Security, vol. 21, no. 1, pp62-73, 2002.
  4. ^ The Insider Misuse Threat Survey: Investigating IT misuse from legitimate users, Magklaras G., Furnell S, 2004 International Information Warfare Conference, Perth, Australia, 2004.
  5. ^ An architecture for Insider Misuse Threat Prediction in IT systems, Magklaras G., Master of Philosophy thesis (MPhil), School of Computing, Communications and Electronics, University of Plymouth, UK, January 2005.
  6. ^ A Preliminary Model of End User Sophistication for Insider Threat Prediction in IT Systems,Magklaras G., Furnell S., Computers & Security, Volume 24, Issue 5, August 2005, Pages 371-380.
  7. ^ Book Chapter: Insider Threat Specification as a Threat Mitigation Technique, Advances in Information Security, Vol 49: Title: Insider Threats in Cyber Security, Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.) 2010, XII, 244 p. 40 illus., 20 in color., ISBN 978-1-4419-7132-6, Hardcover, Springer 2010.
  8. ^ LUARM - An audit engine for insider misuse detection, Magklaras G., Furnell S., Papadaki M. (2011), in Proceedings of the 6th International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011), to appear in the International Journal of Digital Crime and Forensics (IJDCF).
  9. ^ Towards an Insider Threat Prediction Specification Language, Magklaras G., Furnell S., Brooke P. (2006), Information Management & Computer Security, vol. 14, no. 4, pp361-381.
  10. ^ The Insider Threat Prediction and Specification Language, Magklaras G., Furnell S., Ninth International Network Conference - INC2012, 11–12 July, Port Elizabeth, South Africa, 2012.
  11. ^ An Insider Misuse Threat Detection and Prediction Language, Magklaras G., PhD Thesis, School of Computing and Mathematics, Faculty of Science and Technology, University of Plymouth, UK, July 2011.
  12. ^ iRefIndex: A consolidated protein interaction database with provenance, Razick S., Magklaras G., Donaldson I.(2008),BMC Bioinformatics 2008, 9:405 (30 September 2008)
  13. ^ Superclusteroid: a Web tool dedicated to data processing of protein-protein interaction networks, Ropodi a., Sakkos N., Moschopoulos C., Magklaras G., Kossida S., Research Paper, EMBnet.journal, Vol. 17 No. 2, pages 10 to 15, December 2011.
  14. ^ Book Chapter:"Physiological Substrates of PKA and PKG", Ruppelt A., Oberprieler N.G., Magklaras G., and Tasken K., Handbook of Cellular Signalling (Eds Ralph Bradshaw and Edward Dennis), Academic Press/Elsevier (2009), ISBN 0-12-374145-9
  15. ^ High Throughput Sequencing and the IT architecture Part 1:Volume Dimensioning and Filesystems, Technical Note, Magklaras G., EMBnet news periodical, Volume 15 (Issue 5, pages 51 to 55), March 2010.
  16. ^ Data storage considerations for HTS platforms, Invited talk given at the EMBRACE next generation sequencing workshop in Rome, November 2009.
  17. ^ The NGS IT notes, invited talk given at the International Workshops on Bioinformatics - 2012, Center of Genomic Sciences, National Autonomous University of Mexico (UNAM).

External links[edit]