Searched for: subject%3A%22threats%22
(1 - 20 of 42)

Pages

document
Kho, Ricky (author)
The increasing dependence on technology has made society vulnerable to cyber threats, with ransomware becoming a major concern. The complex nature of the Ransomware-as-a-Service (RaaS) model makes identifying the attackers challenging. Traditional methods often rely on direct indicators, but these may not be readily available or reliable. This...
master thesis 2024
document
Perrina, Filippo (author), Marchiori, Francesco (author), Conti, M. (author), Verde, Nino Vincenzo (author)
Cyber Threat Intelligence (CTI) reporting is pivotal in contemporary risk management strategies. As the volume of CTI reports continues to surge, the demand for automated tools to streamline report generation becomes increasingly apparent. While Natural Language Processing techniques have shown potential in handling text data, they often...
conference paper 2023
document
Griffioen, H.J. (author)
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together with the rise of premade tools to perform exploits, the number of cyber incidents grows rapidly each year. Defending against these threats becomes increasingly difficult as organizations depend heavily on the Internet and have many different...
doctoral thesis 2022
document
de Jonge, Bart (author)
With the amount of network connected devices every increasing, and many of them running the Secure Shell (SSH) protocol to facilitate remote management, research into SSH attacks is more important than ever. SSH honeypots can be used to act like vulnerable systems while gathering valuable data on the attacker and its methods in the meantime. The...
master thesis 2022
document
Reijne, M.M. (author), Dehkordi, Sepehr G. (author), Glaser, Sebastien (author), Twisk, D (author), Schwab, A.L. (author)
Falls are responsible for a large proportion of serious injuries and deaths among cyclists [1-4]. A common fall scenario is loss of balance during an emergency braking maneuver to avoid another vehicle [5-7]. Automated Vehicles (AV) have the potential to prevent these critical scenarios between bicycle and cars. However, current Threat...
conference paper 2022
document
Dressel, A. (author), Moore, J.K. (author)
The potential advantages of tilting trikes have been tantalizing for years: they can lean like a bike so that they do not have to be low, wide, or slow in turns; and they can keep the rider upright like a trike when stopped or going slow. Implementing this functionality, however, has been somewhat problematic. Many tilting trikes have been built...
conference paper 2022
document
Chiba, Daiki (author), Akiyama, Mitsuaki (author), Otsuki, Yuto (author), Hada, Hiroki (author), Yagi, Takeshi (author), Fiebig, Tobias (author), van Eeten, M.J.G. (author)
Security Operations Centers (SOCs) are in need of automation for triaging alerts. Current approaches focus on analyzing and enriching individual alerts. We take a different approach and analyze the population of alerts. In an observational study over 24 weeks, we find a surprising pattern: some domains get analyzed again and again by different...
journal article 2022
document
Zhang, Wen (author), Liu, Wei (author), Wu, Yingyee (author), Ma, Chenlu (author), Xiao, Xiyao (author), Zhang, Xichao (author)
In times of uncertainty, such as during COVID-19, many organizations experience profit decline, and employees develop a fear of external threats, such as organizational layoffs. However, most of the literature focuses on how people’s fear influences their well-being. Less is known about how employees’ fear of external threats influences their...
journal article 2022
document
Hoogmoed, Jim (author)
The level of automation in vehicles is growing. But until all vehicles are completely automated, there will be a transition period where automated vehicles and human drivers coexist. Because these road users will coexist, it is necessary that automated vehicles understand human drivers and vice versa. This study aims to create a model that...
master thesis 2021
document
Egbers, Jelle (author)
In the battle against ever-changing cyber threats, a new ally has joined in: Cyber Threat Intelligence. Evolved from historical blacklists and anti-virus, Threat Intelligence aims to protect and inform its clients against both nation state actors, as well as cyber criminals. Threat Intelligence comes in many shapes and sizes, and for a wide...
master thesis 2021
document
Simoes Silva, Douglas (author), Graczyk, Rafal (author), Decouchant, Jérémie (author), Völp, Marcus (author), Esteves-Veríssimo, Paulo (author)
Critical infrastructures have to withstand advanced and persistent threats, which can be addressed using Byzantine fault tolerant state-machine replication (BFT-SMR). In practice, unattended cyberdefense systems rely on threat level detectors that synchronously inform them of changing threat levels. However, to have a BFT-SMR protocol operate...
conference paper 2021
document
Griffioen, H.J. (author), Oosthoek, K. (author), van der Knaap, Paul (author), Dörr, C. (author)
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and are generated with the help of open, unsecured services, to which an adversary sends spoofed service requests that trigger large answer volumes to a victim. However, the actual execution of the packet flood is only one of the activities necessary for a...
conference paper 2021
document
Oosthoek, K. (author), Dörr, C. (author)
The Cyber Threat Intelligence (CTI) field has evolved rapidly and most of its reporting is now fairly stan-dardized. Where the Cyber Kill Chain was its sole reference framework 5 years ago, today ATT&CK is the de facto standard for reporting adversary tactics, techniques and procedures (TTPs). CTI frameworks are effectively abstraction...
conference paper 2021
document
Vos, J.V. (author), Erkin, Z. (author), Dörr, C. (author)
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an...
conference paper 2021
document
van Rossum, Tim (author)
The Internet consists of many subnetworks, which are connected to each other. These subnetworks are the autonomous systems (ASes) that make up the Internet: each hosts a part of it. In order to successfully determine routes from one of these ASes to the other, the Border Gateway Protocol (BGP) is used. This protocol has several security flaws...
master thesis 2020
document
Skoulos, R. (author)
The internet traffic is constantly rising nowadays due to the significant increase of the devices connected to the Internet. As a consequence, many cyber risks have arisen. Cybercriminals are trying to exploit the vulnerabilities of these devices to cause damage and gain profit. Monitoring the network traffic and detecting such threats has...
master thesis 2020
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Zaminpardaz, S. (author), Teunissen, P.J.G. (author), Tiberius, C.C.J.M. (author)
In this contribution, we propose a method for statistically evaluating the risk in a deformation monitoring system. When the structure under monitoring moves beyond tolerance, the monitor system should issue an alert. Only a very small probability is acceptable of the system telling us that no change beyond a critical threshold has taken...
journal article 2020
document
Lee, O.Z.A. (author), Rasch, Alexander (author), Schwab, A.L. (author), Dozza, Marco (author)
This paper introduces a framework for modelling the cyclist's comfort zone. Unlike the driver's comfort zone, little is known about the cyclist's. The framework draws on existing literature in cognitive science about driver behaviour to explain experimental results from cycling field trials, and the modelling of these results. We modelled...
journal article 2020
document
Booij, Tim (author)
The amount of people and devices connected through the Internet has been growing at a rapid pace; as of June 2019 58,8% of the world’s population and billions of devices are joined by this vast network of information resources and services. Not every Internet user however has benign intentions. Cybercriminals use this technology for their own...
master thesis 2019
Searched for: subject%3A%22threats%22
(1 - 20 of 42)

Pages