Circular Image

M.J.G. van Eeten

18 records found

Beyond Accuracy: A Mixed-Method Exploration of Hash Database Verification

Focusing on the Detection of Child Sexual Abuse Material and Terrorist Content Online

The spread of Child Sexual Abuse Material (CSAM) and Terrorist Content Online (TCO) remains a pressing societal issue. Various organizations rely on hash databases to detect, flag, and remove harmful content. These databases function as storage of digital fingerprints of previous ...
Courthouses in the Netherlands are grappling with substantial challenges stemming from escalating workloads and high burnout rates among court clerks. This strain not only compromises the well-being of essential judicial personnel but also hinders the overall efficiency and timel ...

Adoption of AI in Cybersecurity

Bridging the Gap Between Innovation and Application

As digitalization advances, cybersecurity departments are increasingly overwhelmed by alerts and potential threats, leading to decision fatigue among security analysts. In response, many are adopting Artificial Intelligence (AI) to automate routine tasks, prioritize alerts, and a ...
Increasing digitalization of systems bring about the grand challenge of keeping these systems secure from malicious prying eyes, and thus highlighting the need for increased Cybersecurity practices. Ransomware is among the most prevalent cybersecurity threats in our current digit ...
In recent years, more and more emphasis has been put on the importance of good preventative cyber security and vulnerability management techniques such as "Patch Tuesday".
Despite the increased importance, not all organisations have the same resources and knowledge when it c ...
In this thesis I investigate possibilities for expanding freedom of choice in the development and use of digital education technologies. This thesis may be of interest to university policy-makers, students, professors, software-developers, or anyone interested in expanding freedo ...

The Risks and Regulation of Decentralized Finance

A Recommendation to Policy Makers

In the past several years, financial applications of the blockchain technology experienced significant growth, development and adoption among the public and institutional investors. With the rise of stablecoins and major events such as the announcement of Facebook’s own cryptocur ...

Exploring the practice of organisational Security Patch Management from a socio-technical perspective

Using a Mixed Methods Approach to investigate IT-practitioners’ decision-making and patch activity

In the current digitalised society keeping assets secure is one of the most prominent challenges organisations face. In the ongoing arms race between attackers and defenders, software security patching is a well-recognised and effective strategy to mitigate vulnerabilities in sof ...

Behind the Botnet

Evaluating Avalanche's security controls using a reconstruction of its anatomy from forensic evidence

How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, ensure a smooth operation of business? Avalanche had the attention of security researchers and law enforcement, yet it managed to persevere for a long period of time.
In this wo ...

People ignore design that ignores people

Understanding the impact of security training on the security behaviour of employees within an organisational context

Research shows that most of the security issues arise through human shortcomings, instead of technical issues (Abawajy, 2014). Therefore, users of information systems have to become more security aware. The reasonable solution to these human shortcomings was to provide users with ...

Have you updated your lightbulb?

Solving IoT vulnerabilities through governance

Connecting ‘things’ like a doorbell, webcam, lamp, or other objects to the web to provide a service or control is called the Internet of Things (IoT). These devices contain vulnerabilities that form risks for the device user and possibly the network owner through their heterogene ...

Looking under the Streetlights

Evaluating Cyber Threat Intelligence Feeds Using Quantitative Metrics and User Appreciation Scores

In the battle against ever-changing cyber threats, a new ally has joined in: Cyber Threat Intelligence. Evolved from historical blacklists and anti-virus, Threat Intelligence aims to protect and inform its clients against both nation state actors, as well as cyber criminals. Thre ...
Background: A lot of scientists have tried to shed light on dark web markets. They did this by scraping these marketplaces over a period of time and describe what they were seeing. However, the methods used to measure these markets were never validated before. Research goal: This ...
Malicious software such as botnets are a threat to society and increasingly so through Internet of Things (IoT) devices. The large volume, pervasiveness and high vulnerability of IoT devices make them low hanging fruit for malicious actors. Currently, the biggest threat for insec ...

CAML-IDS

A framework for the correct assessment of machine learning-based intrusion detection systems

The Internet is a relatively new technology that the world has become immensely dependent on. It is a tool that makes it possible to simplify our lives and better our society. But as with many things, there are people who with to exploit this tool we have for their own malicious ...

The Network Predictors

Monitoring Network Measurements To Predict Corporate Performance Before It Is Public Knowledge

Network measurments are mostly used to studynetwork topology, performance and security. The thesis uses network measurements in relation to large Internet corporations like Salesforce, Netflix and Snapchat. The thesis attempts to verify whether it is possible to predict company p ...

Development of Injected Code Attacks in Online Banking Fraud Incidents

An exploratory study for understanding the evolution of code used by cyber criminals in financial malware

The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted ...

Targeting financial organisations with DDoS: a multi-sided perspective

Comparing patterns in AmpPot data to experts view on target selection in the financial sector

Currently, DDoS attacks have become inevitable for financial services and their threat keeps rising. Numerous researches have focused on the technical since the rise of DDoS amplification attacks. However, there is less understanding regarding their target selection on financial ...