Searched for: author:"Van Eeten, M.J.G."
(1 - 20 of 23)

Pages

document
Tajalizadehkhoob, S. (author), Van Goethem, Tom (author), Korczynski, M.T. (author), Noroozian, A. (author), Böhme, Rainer (author), Moore, Tyler (author), Joosen, Wouter (author), van Eeten, M.J.G. (author)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical...
conference paper 2017
document
Bisogni, F. (author), Asghari, H. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Tajalizadehkhoob, S. (author), Hernandez Ganan, C. (author), Noroozian, A. (author), van Eeten, M.J.G. (author)

A variety of botnets are used in attacks on financial services. Banks and security firms invest a lot of effort in detecting and combating malware-assisted takeover of customer accounts. A critical resource of these botnets is their command-and-control (C&C) infrastructure. Attackers rent or compromise servers to operate their C&C...

conference paper 2017
document
van Wegberg, R.S. (author), Klievink, A.J. (author), van Eeten, M.J.G. (author)

Fraud with online payment services is an ongoing problem, with significant financial-economic and societal impact. One of the main modus operandi is financial malware that compromises consumer and corporate devices, thereby potentially undermining the security of critical financial systems. Recent research into the underground economy has...

journal article 2017
document
van Eeten, M.J.G. (author)

Purpose: The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed...

journal article 2017
document
Noroozian, A. (author), Ciere, M. (author), Korczynski, M.T. (author), Tajalizadehkhoob, S. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Ciere, M. (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author)
In computing, remote devices may be identified by means of device fingerprinting, which works by collecting a myriad of clientside attributes such as the device’s browser and operating system version, installed plugins, screen resolution, hardware artifacts, Wi-Fi settings, and anything else available to the server, and then merging these...
conference paper 2017
document
Cetin, F.O. (author), Hernandez Ganan, C. (author), Korczynski, M.T. (author), van Eeten, M.J.G. (author)
As large-scale vulnerability detection becomes more feasible, it also increases the urgency to find effective largescale notification mechanisms to inform the affected parties. Researchers, CERTs, security companies and other organizations with vulnerability data have a variety of options to identify, contact and communicate with the actors...
conference paper 2017
document
Klievink, A.J. (author), van Wegberg, R.S. (author), van Eeten, M.J.G. (author)
The speed and disruptive character of digital innovations affect social structures and practices faster than institutions can keep up with them. This results in an ‘institutional void’, i.e. a gap between the rules and institutions and their ability and the effectiveness of their measures. It also affects the institutional stability that is the...
journal article 2017
document
van Eeten, M.J.G. (author), Lone, Q.L. (author), Moreira Moura, G.M. (author), Asghari, H. (author), Korczynski, M.T. (author)
This documents presents the final report of a two-year project to evaluate the impact of AbuseHUB, a Dutch clearinghouse for acquiring and processing abuse data on infected machines. The report was commissioned by the Netherlands Ministry of Economic Affairs, a co-funder of the development of AbuseHUB. AbuseHUB is the initiative of 9 Internet...
report 2016
document
van Driel, W (author), Hernandez Ganan, C. (author), Lobbezoo, M (author), van Eeten, M.J.G. (author)
The payment industry has been characterized by a small number of players that operate the schemes for the facilitation of credit and debit card payments. Over the years, various initiatives have been taken in order to increase competition and hence cost efficiency within the industry. One of the latest efforts is the introduction of Payment...
conference paper 2016
document
Riek, Markus (author), Boehme, Rainer (author), Ciere, M. (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author)
While cybercrime has existed for many years and is still reported to be a growing problem, reliable estimates of the economic impacts are rare. We develop a survey instrument tailored to measure the costs of consumer-facing cybercrime systematically, by aggregating different cost factors into direct losses and expenses for protection measures....
conference paper 2016
document
Cetin, F.O. (author), Hanif Jhaveri, Mohammad (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author), Moore, Tyler (author)
Motivation: Participants on the front lines of abuse reporting have a variety of options to notify intermediaries and resource owners about abuse of their systems and services. These can include emails to personal messages to blacklists to machine-generated feeds. Recipients of these reports have to voluntarily act on this information. We know...
journal article 2016
document
Asghari, H. (author), Ciere, M. (author), Van Eeten, M.J.G. (author)
Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of...
conference paper 2015
document
Moreira Moura, G.C. (author), Ganan, C.H.G. (author), Lone, Q.B. (author), Poursaied, P. (author), Asghari, H. (author), Van Eeten, M.J.G. (author)
IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of magnitude. In the literature, the rate at...
conference paper 2015
document
Tajalizadehkhoob, S.T. (author), Asghari, H. (author), Ganan, C. (author), Van Eeten, M.J.G. (author)
conference paper 2014
document
Dafermos, G. (author), Van Eeten, M.J.G. (author)
In this study, we examine the relationship between innovation and free/open source software (FOSS) based on the views of contributors to FOSS projects, using Q methodology as a method of discourse analysis to make visible the positions held by FOSS contributors and identify the discourses encountered in the FOSS community. In specific, our...
journal article 2014
document
Lone, Q.B. (author), Moreira Moura, G.C. (author), Van Eeten, M.J.G. (author)
ISPs form a centralized point to control botnet infections. However, they do not have enough incentives to invest in mitigation of botnets. In this paper, we propose an approach based on comparative metrics to incentivize ISPs to mitigate botnets.
conference paper 2014
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Mueller, M. (author)
Large and impressive data collection efforts often fail to make their data useful for answering policy questions. In this paper, we argue that this is due to a systematic gap between the ways measurement engineers think about their data, and how other disciplines typically make use of data. We recap our own efforts to use the data generated by a...
conference paper 2013
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Arnbak, A.M. (author), Van Eijk, N.A.N.M. (author)
Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the...
report 2013
Searched for: author:"Van Eeten, M.J.G."
(1 - 20 of 23)

Pages