Searched for: subject%3A%22Intelligence%22
(1 - 4 of 4)
document
Griffioen, H.J. (author), Oosthoek, K. (author), van der Knaap, Paul (author), Dörr, C. (author)
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and are generated with the help of open, unsecured services, to which an adversary sends spoofed service requests that trigger large answer volumes to a victim. However, the actual execution of the packet flood is only one of the activities necessary for a...
conference paper 2021
document
Oosthoek, K. (author), Dörr, C. (author)
The Cyber Threat Intelligence (CTI) field has evolved rapidly and most of its reporting is now fairly stan-dardized. Where the Cyber Kill Chain was its sole reference framework 5 years ago, today ATT&CK is the de facto standard for reporting adversary tactics, techniques and procedures (TTPs). CTI frameworks are effectively abstraction...
conference paper 2021
document
Vos, J.V. (author), Erkin, Z. (author), Dörr, C. (author)
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an...
conference paper 2021
document
Ghiëtte, Vincent (author), Blenn, N. (author), Dörr, C. (author)
Port scans are typically at the begin of a chain of events that will lead to the attack and exploitation of a host over a network. Since building an effective defense relies on information what kind of threat an organization is facing, threat intelligence outlining an actor’s modus operandi is a critical ingredient for network security. In this...
conference paper 2016
Searched for: subject%3A%22Intelligence%22
(1 - 4 of 4)