Searched for: author%3A%22Noroozian%2C+A.%22
(1 - 10 of 10)
document
Noroozian, A. (author), Turcios Rodriguez, E.R. (author), Lastdrager, Elmer (author), Kasama, Takahiro (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet Service Providers (ISPs) and their users. Given that devices are in the hands of their subscribers, what can ISPs realistically do? This study examines the effects of ISP countermeasures on infections caused by variants of the notorious Mirai family of IoT...
conference paper 2021
document
Turcios Rodriguez, E.R. (author), Verstegen, S. (author), Noroozian, A. (author), Inoue, Daisuke (author), Kasama, Takahiro (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Internet Service Providers (ISPs) are getting involved in remediating Internet of Things (IoT) infections of end users. This endeavor runs into serious usability problems. Given that it is usually unknown what kind of device is infected, they can only provide users with very generic cleanup advice, trying to cover all device types and...
journal article 2021
document
Noroozian, A. (author)
Hosting providers are theoretically in a key position to combat cybercrime as they are often the entities renting out the resources that end up being abused by miscreants. Yet, notwithstanding hosting providers' current security measures to combat abuse, their responses vary widely. In many cases the response is ineffective, as empirical...
doctoral thesis 2020
document
van Wegberg, R.S. (author), Miedema, F.E.G. (author), Akyazi, U. (author), Noroozian, A. (author), Klievink, A.J. (author), van Eeten, M.J.G. (author)
Many cybercriminal entrepreneurs lack the skills and techniques to provision certain parts of their business model, leading them to outsource these parts to specialized criminal vendors. Online anonymous markets, from Silk Road to AlphaBay, have been used to search for these products and contract with their criminal vendors. While one listing of...
conference paper 2020
document
Noroozian, A. (author), Koenders, Jan (author), van Veldhuizen, Eelco (author), Hernandez Ganan, C. (author), Alrwais, Sumayah (author), McCoy, Damon (author), van Eeten, M.J.G. (author)
This paper presents the first empirical study based on ground-truth data of a major Bullet-Proof Hosting (BPH) provider, a company called Maxided. BPH allows miscreants to host criminal activities in support of various cybercrime business models such as phishing, botnets, DDoS, spam, and counterfeit pharmaceutical websites. Maxided was legally...
conference paper 2019
document
Tajalizadehkhoob, S. (author), Hernandez Ganan, C. (author), Noroozian, A. (author), van Eeten, M.J.G. (author)
A variety of botnets are used in attacks on financial services. Banks and security firms invest a lot of effort in detecting and combating malware-assisted takeover of customer accounts. A critical resource of these botnets is their command-and-control (C&C) infrastructure. Attackers rent or compromise servers to operate their C&C...
conference paper 2017
document
Noroozian, A. (author), Ciere, M. (author), Korczynski, M.T. (author), Tajalizadehkhoob, S. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Tajalizadehkhoob, S. (author), Van Goethem, Tom (author), Korczynski, M.T. (author), Noroozian, A. (author), Böhme, Rainer (author), Moore, Tyler (author), Joosen, Wouter (author), van Eeten, M.J.G. (author)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical...
conference paper 2017
document
Noroozian, A. (author), De Weerdt, M.M. (author), Witteveen, C. (author)
The fundamental problem with P2P networks is that quality of service depends on altruistic resource sharing by participating peers. Many peers freeride on the generosity of others. Current solutions like sharing ratio enforcement and reputation systems are complex, exploitable, inaccurate or unfair at times. The need to design scalable...
conference paper 2012
document
Noroozian, A. (author)
BitTorrent has turned into the most popular P2P file sharing protocol and is used for various purposes such as Video on demand and Media Streaming. The fundamental problem with P2P networks in general is that quality of service highly depends on altruistic resource sharing by participating peers. Many peers freeride on the good intentions of...
master thesis 2010
Searched for: author%3A%22Noroozian%2C+A.%22
(1 - 10 of 10)