ET

E.R. Turcios Rodriguez

Authored

5 records found

Peering into the Darkness

The Use of UTRS in Combating DDoS Attacks

Remotely Triggered Black Hole (RTBH) is a common DDoS mitigation approach that has been in use for the last two decades. Usually, it is implemented close to the attack victim in networks sharing some type of physical connectivity. The Unwanted Traffic Removal Service (UTRS) proje ...

One thing after another

The role of users, manufacturers, and intermediaries in iot security

In recent years the number of Internet-connected devices (aka as Internet of Things (IoT)) has increased dramatically. IoT Manufacturers have launched into the market a variety of IoT products to make a profit, while users buy them for the convenience of the technology. Despite I ...

“The thing doesn't have a name”

Learning from emergent real-world interventions in smart home security

Many consumer Internet-of-Things (IoT) devices are, and will remain, subject to compromise, often without the owner's knowledge. Internet Service Providers (ISPs) are among the actors best-placed to coordinate the remediation of these problems. They receive infection data and can ...
Internet Service Providers (ISPs) are getting involved in remediating Internet of Things (IoT) infections of end users. This endeavor runs into serious usability problems. Given that it is usually unknown what kind of device is infected, they can only provide users with very gene ...
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet Service Providers (ISPs) and their users. Given that devices are in the hands of their subscribers, what can ISPs realistically do? This study examines the effects of ISP countermeasures on inf ...

Contributed

5 records found

Centralised DNS-based Malware Mitigation

Examining the adoption and efficacy of centralised DNS-based malware mitigation services

Malware presents a growing problem in a world that is increasingly connected to, and reliant on, the internet. The growing, devastating potential of cyber attacks such as DDoS attacks on society and economy is largely the result of a new class of devices, the Internet of Things ( ...

A Visit to the Crime Scene

Monitoring end-users during the remediation process of Mirai infected Internet of Things devices

The increasingly important availability of online services is constantly threatened by malicious software such as botnets. Attackers have gained power through devices that are part of the rising Internet of Things (IoT), mostly through infections caused by Mirai. The botnets crea ...

Dear customer, critters are crawling through your precious files

Understanding real-world evidence of QSnatch clean-up results and user experiences after warnings from the ISP

As the IoT is widely deployed in people’s homes, adversaries are busy exploiting the vulnerabilities of these devices. One kind of such device is the NAS device made by the company QNAP. Unfortunately, these devices are prone to the QSnatch malware. Unlike previous malware such a ...

Where do all the idIoTs come from?

Identification of Insecurely Developed IoT devices and a corresponding analysis of Dutch digital markets that sell them

Malicious software such as botnets are a threat to society and increasingly so through Internet of Things (IoT) devices. The large volume, pervasiveness and high vulnerability of IoT devices make them low hanging fruit for malicious actors. Currently, the biggest threat for insec ...