Searched for: author:"Van Eeten, M.J.G."
(1 - 13 of 13)
document
van Wegberg, R.S. (author), Klievink, A.J. (author), van Eeten, M.J.G. (author)

Fraud with online payment services is an ongoing problem, with significant financial-economic and societal impact. One of the main modus operandi is financial malware that compromises consumer and corporate devices, thereby potentially undermining the security of critical financial systems. Recent research into the underground economy has...

journal article 2017
document
Klievink, A.J. (author), van Wegberg, R.S. (author), van Eeten, M.J.G. (author)
The speed and disruptive character of digital innovations affect social structures and practices faster than institutions can keep up with them. This results in an ‘institutional void’, i.e. a gap between the rules and institutions and their ability and the effectiveness of their measures. It also affects the institutional stability that is the...
journal article 2017
document
van Eeten, M.J.G. (author), Lone, Q.B. (author), Moreira Moura, G.M. (author), Asghari, H. (author), Korczynski, M.T. (author)
This documents presents the final report of a two-year project to evaluate the impact of AbuseHUB, a Dutch clearinghouse for acquiring and processing abuse data on infected machines. The report was commissioned by the Netherlands Ministry of Economic Affairs, a co-funder of the development of AbuseHUB. AbuseHUB is the initiative of 9 Internet...
report 2016
document
Asghari, H. (author), Ciere, M. (author), Van Eeten, M.J.G. (author)
Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of...
conference paper 2015
document
Moreira Moura, G.C. (author), Ganan, C.H.G. (author), Lone, Q.B. (author), Poursaied, P. (author), Asghari, H. (author), Van Eeten, M.J.G. (author)
IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of magnitude. In the literature, the rate at...
conference paper 2015
document
Tajalizadehkhoob, S.T. (author), Asghari, H. (author), Ganan, C. (author), Van Eeten, M.J.G. (author)
conference paper 2014
document
Dafermos, G. (author), Van Eeten, M.J.G. (author)
In this study, we examine the relationship between innovation and free/open source software (FOSS) based on the views of contributors to FOSS projects, using Q methodology as a method of discourse analysis to make visible the positions held by FOSS contributors and identify the discourses encountered in the FOSS community. In specific, our...
journal article 2014
document
Lone, Q.B. (author), Moreira Moura, G.C. (author), Van Eeten, M.J.G. (author)
ISPs form a centralized point to control botnet infections. However, they do not have enough incentives to invest in mitigation of botnets. In this paper, we propose an approach based on comparative metrics to incentivize ISPs to mitigate botnets.
conference paper 2014
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Mueller, M. (author)
Large and impressive data collection efforts often fail to make their data useful for answering policy questions. In this paper, we argue that this is due to a systematic gap between the ways measurement engineers think about their data, and how other disciplines typically make use of data. We recap our own efforts to use the data generated by a...
conference paper 2013
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Arnbak, A.M. (author), Van Eijk, N.A.N.M. (author)
Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the...
report 2013
document
Van Eeten, M.J.G. (author)
Coreferaat van Slingelandtlezing Rick van der Ploeg.
journal article 2011
document
De Bruijne, M.L.C. (author), Van Eeten, M.J.G. (author)
Recent years have witnessed major governmental initiatives regarding Critical Infrastructure Protection (CIP). At the same time, critical infrastructures have undergone massive institutional restructuring under the headings of privatization, deregulation and liberalization. Little research has gone into understanding the interactions between...
journal article 2007
document
van Eeten, M.J.G. (author)
doctoral thesis 1999
Searched for: author:"Van Eeten, M.J.G."
(1 - 13 of 13)