Searched for: subject%3A%22ISP%22
(1 - 7 of 7)
document
Keulemans, Kees (author)
The “Wet open overheid” or Woo is a law that facilitates access to government information for Dutch citizens and states that “everyone has the right to access government information without having to show an interest in it, subject to the limitations provided for by this law.” This law is the Dutch embodiment of a Freedom of Information (FOI)...
master thesis 2022
document
Lone, Q.B. (author)
IP spoofing is the act of forging source IP addresses assigned to a host machine. Spoofing provides users the ability to hide their identity and impersonate another machine. Malicious users use spoofing to invoke a variety of attacks. Examples are Distributed Denial of Service (DDoS) attacks, policy evasion and a range of application-level...
doctoral thesis 2022
document
Noroozian, A. (author), Turcios Rodriguez, E.R. (author), Lastdrager, Elmer (author), Kasama, Takahiro (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet Service Providers (ISPs) and their users. Given that devices are in the hands of their subscribers, what can ISPs realistically do? This study examines the effects of ISP countermeasures on infections caused by variants of the notorious Mirai family of IoT...
conference paper 2021
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
Asghari, H. (author)
Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure and platforms. This dissertation looks at how...
doctoral thesis 2016
document
Lone, Q.B. (author), Moreira Moura, G.C. (author), Van Eeten, M.J.G. (author)
ISPs form a centralized point to control botnet infections. However, they do not have enough incentives to invest in mitigation of botnets. In this paper, we propose an approach based on comparative metrics to incentivize ISPs to mitigate botnets.
conference paper 2014
document
Asghari, H. (author)
master thesis 2010
Searched for: subject%3A%22ISP%22
(1 - 7 of 7)