Searched for: author%3A%22D%C3%B6rr%2C+C.%22
(1 - 11 of 11)
document
Ghiette, V.D.H. (author), Dörr, C. (author)
Over the past decade, the scanning landscape has significantly changed. Powerful tools such as Masscan or Zmap allow anyone to scan the entire Internet in a matter of hours. Simultaneously, we witnessed the emergence of stealthy scanners, which map the Internet from thousands of vantage points at a low rate attempting to forego detection. As...
conference paper 2022
document
Vos, J.V. (author), Erkin, Z. (author), Dörr, C. (author)
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an...
conference paper 2021
document
Oosthoek, K. (author), Dörr, C. (author)
The Cyber Threat Intelligence (CTI) field has evolved rapidly and most of its reporting is now fairly stan-dardized. Where the Cyber Kill Chain was its sole reference framework 5 years ago, today ATT&CK is the de facto standard for reporting adversary tactics, techniques and procedures (TTPs). CTI frameworks are effectively abstraction...
conference paper 2021
document
Griffioen, H.J. (author), Oosthoek, K. (author), van der Knaap, Paul (author), Dörr, C. (author)
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and are generated with the help of open, unsecured services, to which an adversary sends spoofed service requests that trigger large answer volumes to a victim. However, the actual execution of the packet flood is only one of the activities necessary for a...
conference paper 2021
document
Ghiette, V.D.H. (author), Griffioen, H.J. (author), Dörr, C. (author)
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations in order to compromise a system. As such activities are easily recognizable in log files, sophisticated adversaries distribute brute forcing attacks over a large number of origins. Effectively finding such distributed campaigns proves however...
conference paper 2019
document
Bijmans, H.L.J. (author), Booij, T.M. (author), Dörr, C. (author)
Since the release of a browser-based cryptominer by Coinhive in 2017, the easy use of these miners has skyrocketed illicit cryptomining in 2017 and continued in 2018. This method of monetizing websites attracted website owners, as well as criminals seeking new ways to earn a profit. In this paper, we perform two large studies into the world...
conference paper 2019
document
Yang, Xueying (author), Karampatzakis, Evgenios (author), Dörr, C. (author), Kuipers, F.A. (author)
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security...
conference paper 2018
document
Herrera Semenets, V. (author), Pérez-García, Osvaldo Andrés (author), Hernández-León, Raudel (author), van den Berg, Jan (author), Dörr, C. (author)
In the last few years, the telecommunications scenario has experienced an increase in the volume of information generated, as well as in the execution of malicious activities. In order to complement Intrusion Detection Systems (IDSs), data mining techniques have begun to play a fundamental role in data analysis. On the other hand, the...
journal article 2018
document
Ghiëtte, Vincent (author), Blenn, N. (author), Dörr, C. (author)
Port scans are typically at the begin of a chain of events that will lead to the attack and exploitation of a host over a network. Since building an effective defense relies on information what kind of threat an organization is facing, threat intelligence outlining an actor’s modus operandi is a critical ingredient for network security. In this...
conference paper 2016
document
Dörr, C. (author), Kuipers, F.A. (author)
journal article 2014
document
van Adrichem, N.L.M. (author), Dörr, C. (author), Kuipers, F.A. (author)
conference paper 2014
Searched for: author%3A%22D%C3%B6rr%2C+C.%22
(1 - 11 of 11)