Searched for: author%3A%22Korczynski%2C+M.T.%22
(1 - 7 of 7)
document
Noroozian, A. (author), Ciere, M. (author), Korczynski, M.T. (author), Tajalizadehkhoob, S. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Çetin, F.O. (author), Hernandez Ganan, C. (author), Korczynski, M.T. (author), van Eeten, M.J.G. (author)
As large-scale vulnerability detection becomes more feasible, it also increases the urgency to find effective largescale notification mechanisms to inform the affected parties. Researchers, CERTs, security companies and other organizations with vulnerability data have a variety of options to identify, contact and communicate with the actors...
conference paper 2017
document
Lone, Q.B. (author), Luckie, Matthew (author), Korczynski, M.T. (author), van Eeten, M.J.G. (author)
Despite source IP address spoofing being a known vulnerability for at least 25 years, and despite many efforts to shed light on the problem, spoofing remains a popular attack method for redirection, amplification, and anonymity. To defeat these attacks requires operators to ensure their networks filter packets with spoofed source IP addresses...
conference paper 2017
document
Gallos, Lazaros K. (author), Korczynski, M.T. (author), Fefferman, Nina H. (author)
Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detection are subject to inherent constraints: (1) they create a communication burden on the system, (2) they impose a delay in detection while...
journal article 2017
document
Tajalizadehkhoob, S. (author), Van Goethem, Tom (author), Korczynski, M.T. (author), Noroozian, A. (author), Böhme, Rainer (author), Moore, Tyler (author), Joosen, Wouter (author), van Eeten, M.J.G. (author)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical...
conference paper 2017
document
Aertsen, Maarten (author), Korczynski, M.T. (author), Moura, Giovane C. M. (author), Tajalizadehkhoob, S. (author), van den Berg, Jan (author)
The 2013 National Security Agency revelations of pervasive monitoring have led to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users' privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications....
conference paper 2017
document
van Eeten, M.J.G. (author), Lone, Q.B. (author), Moura, Giovane C. M. (author), Asghari, H. (author), Korczynski, M.T. (author)
This documents presents the final report of a two-year project to evaluate the impact of AbuseHUB, a Dutch clearinghouse for acquiring and processing abuse data on infected machines. The report was commissioned by the Netherlands Ministry of Economic Affairs, a co-funder of the development of AbuseHUB. AbuseHUB is the initiative of 9 Internet...
report 2016
Searched for: author%3A%22Korczynski%2C+M.T.%22
(1 - 7 of 7)