Dr Eirini Anthi
(she/her)
Senior Lecturer in Cyber Security
School of Computer Science and Informatics
- Welsh speaking
- Available for postgraduate supervision
Overview
I am a lecturer in cybersecurity at the School of Computer Science & Informatics. My research interests revolve around the security of Industrial Control Systems and Internet of Things devices. More specifically, I research how machine learning methods can be used to defend such systems. In addition, I am particularly interested in the security and robustness of such machine learning models against Adversarial Machine Learning (AML) attacks.
My research which focused on the intelligent detection of attacks in smart home environments was featured in the Welsh Government Innovation Magazine.
Testbed Design and Implementation
I have also been responsible for designing and partially implementing the new cybersecurity demonstrator at the school. This involved the development of a set of cybersecurity training scenarios in different environments that were implemented and are showcased using a state-of-the-art Augmented Reality (AR) system that visualises these infrastructures and a cutting-edge cyber-range that realistically simulates such networks.
I have also designed, implemented, and continue to maintain the IoT smart home testbed at the school which enables the cohort to conduct cybersecurity research on modern smart devices, enhancing the impact of their research by simulating real-life cases
A few of the awards I have won include:
- A member of a team awarded 1st place in an open-source intelligence competition, 2019.
- Best paper award at the second EAI International Conference on Cloud, Networking for IoT Systems in Italy, 2017.
- Best research poster, Cardiff University, 2017.
Publication
2024
- Burnap, P., Anthi, E., Reineckea, P., Williams, L., Caoa, F., Aldmoura, R. and Jones, K. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4(2), pp. 340-356. (10.3390/jcp4020017)
- Anthi, E., Williams, L., Ieropoulos, V. and Spyridopoulos, T. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5(2), pp. 356-380. (10.3390/iot5020018)
- Silalahi, S., Ahmad, T., Studiawan, H., Anthi, E. and Williams, L. 2024. Severity-oriented multiclass drone flight logs anomaly detection. IEEE Access 12, pp. 64252 - 64266. (10.1109/ACCESS.2024.3396926)
- Williams, L., Anthi, E., Arman, L. and Burnap, P. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8(5), article number: 44. (10.3390/bdcc8050044)
- Williams, L., Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15(4), article number: 237. (10.3390/info15040237)
- Williams, L., Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8(4) (10.3390/bdcc8040038)
- Williams, L., Anthi, E., Cherdantseva, Y. and Javed, A. 2024. Leveraging gamification and game-based learning in cybersecurity education: Engaging and inspiring non-cyber students. Journal of The Colloquium for Information Systems Security Education 11(1) (10.53735/cisse.v11i1.186)
2023
- Al lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2023. Machine learning detection of cloud services abuse as C&C Infrastructure. Journal of Cybersecurity and Privacy 3(4), pp. 858-881. (10.3390/jcp3040039)
- Al lelah, T., Theodorakopoulos, G., Reinecke, P., Javed, A. and Anthi, E. 2023. Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review. Journal of Cybersecurity and Privacy 3(3), pp. 558-590. (10.3390/jcp3030027)
- Belarbi, O., Spyridopoulos, T., Anthi, E., Mavromatis, I., Carnelli, P. and Khan, A. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 04-08 December 20232023 IEEE Global Communications Conference Proceedings. IEEE pp. 237-242., (10.1109/GLOBECOM54140.2023.10437860)
- Mohammed, A. S., Anthi, E., Rana, O., Saxena, N. and Burnap, P. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124, article number: 103007. (10.1016/j.cose.2022.103007)
2022
- Mohammed, A. S., Reinecke, P., Burnap, P., Rana, O. and Anthi, E. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6(3), pp. 1-27., article number: 27. (10.1145/3548691)
- Anthi, E. 2022. Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem. PhD Thesis, Cardiff University.
2021
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Radanliev, P. et al. 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41, pp. 236-247. (10.1007/s10669-020-09792-x)
- Anthi, E., Williams, L., Rhode, M., Burnap, P. and Wedgbury, A. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58, article number: 102717. (10.1016/j.jisa.2020.102717)
- Anthi, E., Williams, L., Burnap, P. and Jones, K. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7(1), article number: tyab006. (10.1093/cybsec/tyab006)
2019
- Anthi, E., Williams, L., Malgorzata, S., Theodorakopoulos, G. and Burnap, P. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6(5), pp. 9042-9053. (10.1109/JIOT.2019.2926365)
2018
- Anthi, E., Ahmad, S., Rana, O., Burnap, P. and Theodorakopoulos, G. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78, pp. 477-490. (10.1016/j.cose.2018.07.016)
2017
- Anthi, E., Javed, A., Rana, O. F. and Theodorakopoulos, G. 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer pp. 228-242., (10.1007/978-3-319-67636-4_24)
- Anthi, E. and Theodorakopoulos, G. 2017. Sensitive data in Smartphone Applications: Where does it go? Can it be intercepted?. Technical Report.
Articles
- Burnap, P., Anthi, E., Reineckea, P., Williams, L., Caoa, F., Aldmoura, R. and Jones, K. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4(2), pp. 340-356. (10.3390/jcp4020017)
- Anthi, E., Williams, L., Ieropoulos, V. and Spyridopoulos, T. 2024. Investigating radio frequency vulnerabilities in the Internet of Things (IoT). IoT 5(2), pp. 356-380. (10.3390/iot5020018)
- Silalahi, S., Ahmad, T., Studiawan, H., Anthi, E. and Williams, L. 2024. Severity-oriented multiclass drone flight logs anomaly detection. IEEE Access 12, pp. 64252 - 64266. (10.1109/ACCESS.2024.3396926)
- Williams, L., Anthi, E., Arman, L. and Burnap, P. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8(5), article number: 44. (10.3390/bdcc8050044)
- Williams, L., Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15(4), article number: 237. (10.3390/info15040237)
- Williams, L., Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8(4) (10.3390/bdcc8040038)
- Williams, L., Anthi, E., Cherdantseva, Y. and Javed, A. 2024. Leveraging gamification and game-based learning in cybersecurity education: Engaging and inspiring non-cyber students. Journal of The Colloquium for Information Systems Security Education 11(1) (10.53735/cisse.v11i1.186)
- Al lelah, T., Theodorakopoulos, G., Javed, A. and Anthi, E. 2023. Machine learning detection of cloud services abuse as C&C Infrastructure. Journal of Cybersecurity and Privacy 3(4), pp. 858-881. (10.3390/jcp3040039)
- Al lelah, T., Theodorakopoulos, G., Reinecke, P., Javed, A. and Anthi, E. 2023. Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review. Journal of Cybersecurity and Privacy 3(3), pp. 558-590. (10.3390/jcp3030027)
- Mohammed, A. S., Anthi, E., Rana, O., Saxena, N. and Burnap, P. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124, article number: 103007. (10.1016/j.cose.2022.103007)
- Mohammed, A. S., Reinecke, P., Burnap, P., Rana, O. and Anthi, E. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6(3), pp. 1-27., article number: 27. (10.1145/3548691)
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Radanliev, P. et al. 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41, pp. 236-247. (10.1007/s10669-020-09792-x)
- Anthi, E., Williams, L., Rhode, M., Burnap, P. and Wedgbury, A. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58, article number: 102717. (10.1016/j.jisa.2020.102717)
- Anthi, E., Williams, L., Burnap, P. and Jones, K. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7(1), article number: tyab006. (10.1093/cybsec/tyab006)
- Anthi, E., Williams, L., Malgorzata, S., Theodorakopoulos, G. and Burnap, P. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6(5), pp. 9042-9053. (10.1109/JIOT.2019.2926365)
- Anthi, E., Ahmad, S., Rana, O., Burnap, P. and Theodorakopoulos, G. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78, pp. 477-490. (10.1016/j.cose.2018.07.016)
Conferences
- Belarbi, O., Spyridopoulos, T., Anthi, E., Mavromatis, I., Carnelli, P. and Khan, A. 2023. Federated deep learning for intrusion detection in IoT networks. Presented at: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 04-08 December 20232023 IEEE Global Communications Conference Proceedings. IEEE pp. 237-242., (10.1109/GLOBECOM54140.2023.10437860)
- Anthi, E., Javed, A., Rana, O. F. and Theodorakopoulos, G. 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer pp. 228-242., (10.1007/978-3-319-67636-4_24)
Monographs
- Anthi, E. and Theodorakopoulos, G. 2017. Sensitive data in Smartphone Applications: Where does it go? Can it be intercepted?. Technical Report.
Thesis
- Anthi, E. 2022. Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem. PhD Thesis, Cardiff University.
- Anthi, E., Williams, L., Malgorzata, S., Theodorakopoulos, G. and Burnap, P. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6(5), pp. 9042-9053. (10.1109/JIOT.2019.2926365)
- Anthi, E., Ahmad, S., Rana, O., Burnap, P. and Theodorakopoulos, G. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78, pp. 477-490. (10.1016/j.cose.2018.07.016)
- Anthi, E., Javed, A., Rana, O. F. and Theodorakopoulos, G. 2017. Secure data sharing and analysis in cloud-based energy management systems. Presented at: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, 20-21 April 2017 Presented at Longo, A. et al. eds.IISSC 2017, CN4IoT 2017: Cloud Infrastructures, Services, and IoT Systems for Smart Cities, Vol. 189. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer pp. 228-242., (10.1007/978-3-319-67636-4_24)
- Anthi, E. and Theodorakopoulos, G. 2017. Sensitive data in Smartphone Applications: Where does it go? Can it be intercepted?. Technical Report.
Research
2021
- Hardening Machine Learning Denial of Service (DoS) Defences Against Adversarial Attacks in IoT Smart Home Networks. Anthi, E., Williams, L., Javed, A. and Burnap, P., 2021. Computers & Security, p.102352.
- Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems.
Anthi, E., Williams, L., Rhode, M., Burnap, P. and Wedgbury, A., 2021. Journal of Information Security and Applications, 58, p.102717. - A three-tiered intrusion detection system for industrial control systems. Anthi, E., Williams, L., Burnap, P. and Jones, K., 2021. Journal of Cybersecurity, 7(1), p.tyab006.
- Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme environments–cyber risk in the colonisation of Mars. Radanliev, P., De Roure, D., Page, K., Van Kleek, M., Santos, O., Burnap, P., Anthi, E. and Maple, C., 2021. Safety in Extreme Environments, pp.1-12.
2020
- Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Radanliev, P., De Roure, D., Van Kleek, M., Ani, U., Burnap, P., Anthi, E., Nurse, J.R., Santos, O. and Montalvo, R.M., 2020. Environment Systems and Decisions, pp.1-12.
- Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge. Radanliev, P., De Roure, D., Walton, R., Van Kleek, M., Montalvo, R.M., Santos, O., Burnap, P. and Anthi, E., 2020. SN Applied Sciences, 2(11), pp.1-8.
2019
- A supervised intrusion detection system for smart home IoT devices
Eirini Anthi, Lowri Williams, Slowinska Malgorzata, Georgios Theodorakopoulos, Peter Burnap,
IEEE Internet of Things 2019-10-31 Volume:6 Number:5 Page Range: 9042-9053
ISSN:2327-4662 - Cyber risk from IoT technologies in the supply chain–discussion on supply chains decision support system for the digital economy. Radanliev, P., De Roure, D.C., Nurse, J.R., Burnap, P., Anthi, E., Ani, U., Maddox, L., Santos, O. and Montalvo, R.M., 2019.
- Cyber risk management for the Internet of Things. Radanliev, P., De Roure, D.C., Nurse, J.R., Burnap, P., Anthi, E., Uchenna, A., Santos, O. and Montalvo, R.M., 2019. Univ. Oxford, pp.1-27.
2018
- EclipseIoT: A secure and adaptive hub for the Internet of Things
Computers and Security
Eirini Anthi, Shazaib Ahmad, Omer Rana, Pete Burnap, Georgios Theodorakopoulos,
2018-09-01 Volume:78Page Range:477-490
ISSN:0167-4048 - Pulse: an adaptive intrusion detection for the internet of things. Anthi, E., Williams, L. and Burnap, P., 2018.
2017
- Secure data sharing and analysis in cloud-based energy management systems
Eirini Anthi, Amir Javed, Omer F. Rana, Georgios Theodorakopoulos, Antonella Longo, Marco Zappatore, Massimo Villari, Omer Rana, Dario Bruneo, Rajiv Ranjan, Maria Fazin, Philippe Massonet,
2017-10-27 Volume:189Page Range:228-242
ISSN:1867-8211 - Sensitive data in Smartphone Applications: Where does it go? Can it be intercepted?
Eirini Anthi, Georgios Theodorakopoulos, 2017
Teaching
Over the past 4 years apart from giving a range of guest lectures, assisting with labs, and creating CTF based teaching events, I have also supervised more than 30 state-of-art research based final year projects in cyber security for both postrgaduate and undergraduate students. Few of the projects I supervised included:
- Investigating adversarial machine learning against malware detection systems
- Investigating Malware propagation via IoT devices to internal networks
- Vulnerability assessment and risk modeling of attacks in IT systems
- Detecting network based attacks in Industrial Control Systems
- Evaluating the robustness of a lattice-based cryptosystem
- Investigating the Security and Privacy of a Real-World Internet of Things Environment (During the project the student Identified and reported to the company a vulnerability against the IoT device)
- Investigation and analysis of security issues in smartphone applications
- Intelligent Attack Detection for IoT Networks (Led to publication)
- Investigating Radio Frequency vulnerabilities in the Internet of Things using HackRF (Aim to produce a publication)
- Cryptanalysis of a Wireless Security System
- Simulating the Effects of Releasing Malware into the Internet of Things
- Security Issues, Privacy, and Challenges in the Internet of Things: Vulnerabilities, Threats and Attacks.
Biography
Eirini Anthi is a lecturer at the School of Computer Science & Informatics, Cardiff University. Her research interests revolve around the security of the Internet of Things (IoT), SCADA, and Industrial Control Systems. More particularly, her research examines the security issues that come along with these devices/systems and focuses on developing intelligent and more robust cyber-attack detection mechanisms for such networks using machine learning and adversarial machine learning techniques. As part of her doctorate, she developed state-of-the-art tools to detect and defend against network-based cyber attacks in such infrastructures.
Supervisions
- Internet of Things Security
- Industrial Control Systems Security
- Network Security
- Smartphone security
- Machine Learning & Adversarial Machine Learning
- Malware Analysis
Current supervision
Vasilis Ieropoulos
Graduate Demonstrator
Turki Al Lelah Al Lelah
Research student
Muhammad Setiadji
Graduate Demonstrator
Tristram Ridley-Jones
Research student