Phillipos Mazaris
Student
Threatdetector with Elastic
Ludmannsdorf, Austria
Hi, I'm Phillipos, a student at the University of Klagenfurt. I develop video games and programs with passion in my free time.
About me
My name is Phillipos Mazaris, and I am 19 years old. I am the second of three children in my family. With my German and Greek roots, I grew up bilingual and am fluent in both German and Greek. At the age of 12, I was first introduced to programming. I began by creating simple computer games, an experience that sparked my interest in the world of computer technology and revealed the vast possibilities within this field. Consequently, I decided to attend the Higher Technical Institute (HTL) to further develop my programming skills. During my time at HTL, I discovered a passion for network technology and IT security. The challenges and opportunities these fields present fascinated me and inspired me to delve deeper into them. Outside of school, I enjoy engaging in video editing and photo editing, which expand my creative skills. Additionally, I am passionate about playing basketball, which not only provides a balance to my studies but also enhances my teamwork and strategic thinking abilities. As part of my diploma thesis, KELAG approached us with a specific problem that needed to be solved. During the development of the thesis, we realized that this problem was not only relevant to KELAG but could also be applied globally. This experience showed me the importance of developing innovative solutions that have broad applicability.
My organisation
Cybercrime is a reality that every company must deal with. In surveys conducted by KPMG, all 903 companies surveyed reported having been targeted by attacks, with results indicating that one in ten of these attacks was successful. An attack can begin inconspicuously. The classic example: a USB stick in the parking lot, a vulnerability in the company website, clicking on a phishing email, or an attack from within. All of this leads to the dreaded scenario. The attacker gains a foothold in the company network. But now the attack is far from over. No, it is just in its infancy. The hacker has a goal. Perhaps they want company secrets, perhaps their goal is extortion or a typical CEO email scheme. In any case, they need to spread undetected throughout the network to achieve these goals. They must infect more devices and penetrate deeper into the company's network. To do this, they remain hidden in the network for weeks or even months. They need to cover their tracks to avoid detection by the vigilant eyes of network monitoring systems. Among other things, they manipulate their system so that protocols and data are not transmitted. Only when they have reached their targets at the heart of the network can they drop their disguise. If such an attack is not detected in time, incredible damage can occur. Operational interruptions of several weeks are not uncommon after a successful attack. This can quickly become expensive. Not only is the lost profit painful, but contractual penalties or other disadvantages are also possible. Since this is a common attack method, we have developed a solution that detects these attacks. Using algorithms and artificial intelligence, ThreatDetector with Elastic can identify such attacks. Currently, there is no public solution on the market, and due to the software’s scalability, this project can be used by both small businesses and large corporations. Because the algorithm-based detection works in conjunction with AI detection, the detection is even more precise and faster.
Skills
- programming
- videography
- Network infrastructure
Interests
- Cybersecurity
- programming
- videography
Speaker sessions (1)
Wednesday, 2 October 2024
12:30 - 13:30