If you made any changes in Pure these will be visible here soon.

Research Output

2020

A different cup of TI? The added value of commercial threat intelligence

Bouwman, X., Griffioen, H., Egbers, J., Doerr, C., Klievink, B. & van Eeten, M., 2020. 18 p.

Research output: Contribution to conferencePaperScientificpeer-review

Open Access
File
44 Downloads (Pure)

Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics

van Wegberg, R., Miedema, F., Akyazi, U., Noroozian, A., Klievink, B. & van Eeten, M., 2020, Proceedings of The Web Conference (WWW). Association for Computing Machinery (ACM), p. 816-826 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
31 Downloads (Pure)

Pay the Piper: DDoS mitigation technique to deter financially-motivated attackers

Sasaki, T., Hernandez Gañán, C., Yoshioka, K., Van Eeten, M. & Matsumoto, T., 2020, In : IEICE Transactions on Communications. E103B, 4, p. 389-404 16 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
20 Downloads (Pure)
2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai

Cetin, O., Hernandez Ganan, C., Altena, L., Kasama, T., Inoue, D., Tamiya, K., Tie, Y., Yoshioka, K. & van Eeten, M., 2019, Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
478 Downloads (Pure)

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots

Morishita, S., Hoizumi, T., Ueno, W., Tanabe, R., Hernandez Ganan, C., van Eeten, M., Yoshioka, K. & Matsumoto, T., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. IEEE, p. 134-143 10 p. 8717918

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
4 Citations (Scopus)
274 Downloads (Pure)

Governance Challenges for European CyberSecurity Policies: Stakeholders Views

Sterlini, P., Massacci, F., Kadenko, N., Fiebig, T. & van Eeten, M., 2019, In : IEEE Security and Privacy.

Research output: Contribution to journalArticleScientificpeer-review

1 Citation (Scopus)

Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting

Noroozian, A., Koenders, J., van Veldhuizen, E., Hernandez Ganan, C., Alrwais, S., McCoy, D. & van Eeten, M., 2019, 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, p. 1341--1356

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientificpeer-review

Open Access
File
88 Downloads (Pure)

Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks

Cetin, O., Ganan, C., Altena, L., Tajalizadehkhoob, S. & Van Eeten, M., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 326-339 14 p. 8806733

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2018

Collectively exercising the right of access: individual effort, societal effect

Asghari, H., Mahieu, R. & van Eeten, M., 13 Jul 2018, In : Internet Policy Review. 7, 3, 23 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
6 Citations (Scopus)
54 Downloads (Pure)

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens

Cetin, O., Altena, E. M., Hernandez Ganan, C. & van Eeten, M., 2018, Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, p. 251-263

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
2 Downloads (Pure)

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Hernandez Ganan, C., Klievink, B., Christin, N. & van Eeten, M., 15 Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1009-1026 18 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access

Rotten apples or bad harvest? What we are measuring when we are measuring abuse

Tajalizadehkhoob, S., Böhme, R., Gañán, C., Korczyński, M. & Van Eeten, M., 1 Apr 2018, In : ACM Transactions on Internet Technology. 18, 4, 49.

Research output: Contribution to journalArticleScientificpeer-review

2 Citations (Scopus)

Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer

Lone, Q., Luckie, M., Korczyński, M., Asghari, H., Javed, M. & Van Eeten, M., 2018, TMA 2018 - Proceedings of the 2nd Network Traffic Measurement and Analysis Conference. Casas, P. (ed.). Institute of Electrical and Electronics Engineers (IEEE), 8 p. 8506499

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
4 Citations (Scopus)
25 Downloads (Pure)
2017

Abuse reporting and the fight against cybercrime

Jhaveri, M. H., Cetin, F., Gañán, C., Moore, T. & Eeten, M. V., 2017, In : ACM Computing Surveys (CSUR). 49, 4, p. 1-27 27 p., 68.

Research output: Contribution to journalArticleScientificpeer-review

15 Citations (Scopus)

Beyond the pretty penny: the Economic Impact of Cybercrime

Gañán, C. H., Ciere, M. & van Eeten, M., 2017, Proceedings of the 2017 New Security Paradigms Workshop on ZZZ. Association for Computing Machinery (ACM), p. 35-45 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)
Open Access
File
4 Citations (Scopus)
67 Downloads (Pure)

Een gezamenlijke rekening? Over digitale innovatie en samenwerking in een institutional void

Translated title of the contribution: Will collaboration for digital security survive new challengers?Klievink, B., van Wegberg, R. & van Eeten, M., 2017, In : Bestuurskunde. 2017, 1

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
111 Downloads (Pure)

Estimating the size of the iceberg from its tip: An investigation into unreported data breach notifications

Bisogni, F., Asghari, H. & van Eeten, M., 27 Jun 2017, Proceedings of 16th Annual Workshop on the Economics of Information Security 2017. 29 p. 54

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
43 Downloads (Pure)

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

Tajalizadehkhoob, S., Van Goethem, T., Korczynski, M., Noroozian, A., Böhme, R., Moore, T., Joosen, W. & van Eeten, M., 3 Nov 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery (ACM), p. 553-567

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
7 Citations (Scopus)
45 Downloads (Pure)

Inferring the Security Performance of Providers from Noisy and Heterogenous Abuse Datasets

Noroozian, A., Ciere, M., Korczynski, M., Tajalizadehkhoob, S. & van Eeten, M., 2017, Workshop on the Economics of Information Security.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
194 Downloads (Pure)

Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning

Cetin, F. O., Ganán, C., Korczynski, M. & van Eeten, M., 2017, 16th Workshop on the Economics of Information Security (WEIS 2017). p. 1-23 23 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
21 Downloads (Pure)

Partial Device Fingerprints

Ciere, M., Gañán, C. & van Eeten, M., 2017, proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, p. 222-237 16 p. (Lecture Notes in Computer Science; vol. 10535).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
1 Citation (Scopus)
13 Downloads (Pure)

Patching security governance: an empirical view of emergent governance mechanisms for cybersecurity

van Eeten, M., 2017, In : Digital Policy, Regulation and Governance. 19, 6, p. 429-448 20 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
48 Downloads (Pure)

Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs

Korczynski, M., Tajalizadehkhoob, S., Noroozian, A., Wullink, M., Hesselman, C. & Eeten, M. V., 28 Jun 2017, Proceedings of 2nd IEEE European Symposium on Security and Privacy (EuroS&P) 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 579-594 16 p. 7962004

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

8 Citations (Scopus)

The role of hosting providers in fighting command and control infrastructure of financial malware

Tajalizadehkhoob, S., Hernandez Ganan, C., Noroozian, A. & Van Eeten, M., 2 Apr 2017, Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017. Association for Computing Machinery (ACM), p. 575-586 12 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
5 Citations (Scopus)
219 Downloads (Pure)

Using loops observed in traceroute to infer the ability to spoof

Lone, Q., Luckie, M., Korczyński, M. & Van Eeten, M., 2017, Passive and Active Measurement - 18th International Conference, PAM 2017, Proceedings. Uhlig, S., Amann, J. & Kaafar, M. A. (eds.). Springer, p. 229-241 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10176 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
8 Citations (Scopus)
39 Downloads (Pure)
2016

Apples, oranges and hosting providers: Heterogeneity and security in the hosting market

Tajalizadehkhoob, S., Korczyński, M., Noroozian, A., Gañán, C. & Van Eeten, M., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers (IEEE), p. 289-297 9 p. 7502824

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

12 Citations (Scopus)

A Time-dependent SIS-model for Long-term Computer Worm Evolution

Märtens, M., Asghari, H., van Eeten, M. & Van Mieghem, P., 2016, IEEE Conference on Communications and Network Security 2016. Piscataway, NJ: IEEE, p. 1-9 9 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

3 Citations (Scopus)

Economics of cybersecurity

Asghari, H., van Eeten, M. & Bauer, J. M., 2016, Handbook on the Economics of the Internet. Edgar Elgar Publishing, p. 262-287

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six EU countries.

Riek, M., Boehme, R., Ciere, M., Hernandez Ganan, C. & van Eeten, M., 2016, Proceedings of Workshop of Economics of Information Security . p. 1-43

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
74 Downloads (Pure)
Open Access
File
96 Downloads (Pure)

Risk Management for Third Party Payment Networks

van Driel, W., Hernandez Ganan, C., Lobbezoo, M. & van Eeten, M., 2016, Proceedings of Workshop of Economics of Information Security 2016. p. 1-10

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
170 Downloads (Pure)

Understanding the role of sender reputation in abuse reporting and cleanup

Cetin, F. O., Hanif Jhaveri, M., Gañán, C., van Eeten, M. & Moore, T., 2016, In : Journal of Cybersecurity. 2, 1, p. 83-98 16 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
8 Citations (Scopus)
18 Downloads (Pure)

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service

Noroozian, A., Korczynski, M., Hernandez Ganan, C., Makita, D., Yoshioka, K. & van Eeten, M., 2016, Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016: Research in Attacks, Intrusions, and Defenses. Springer, (Lecture Notes in Computer Science; vol. 9854).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

15 Citations (Scopus)

Zone poisoning: The how and where of non-secure DNS dynamic updates

Korczynski, M., Król, M. & Van Eeten, M., 14 Nov 2016, IMC 2016 - Proceedings of the 2016 ACM Internet Measurement Conference. Association for Computing Machinery (ACM), Vol. 14-16-November-2016. p. 271-278 8 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

7 Citations (Scopus)
2015

An empirical analysis of ZeuS CC lifetime

Gañán, C., Cetin, F. O. & van Eeten, M., 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery (ACM), p. 97-108 12 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Developing Security Reputation Metrics for Hosting Providers

Noroozian, A., Korczynski, MT., Tajalizadehkhoob, ST. & van Eeten, MJG., 2015, Proceedings of the 8th Usenix Workshop on Cyber Security Experimentation and Test (CSET 15). s.l.: USENIX Association, p. -

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Economics of fighting botnets: Lessons from a decade of mitigation

Asghari, H., van Eeten, MJG. & Bauer, JM., 2015, In : IEEE Security & Privacy Magazine: building confidence in a networked world. 13, 5, p. 16-23 8 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
16 Citations (Scopus)

How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation

Moura, GCM., Ganan, C., Lone, QB., Poursaied Esfahani, P., Asghari, H. & van Eeten, MJG., 2015, Proceedings of the 14th IFIP Networking Conference. Kacimi, R. & Mammeri, Z. (eds.). Piscataway, NJ, USA: IEEE Society, p. 1-9 9 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

12 Citations (Scopus)

Post-mortem of a Zombie: Conficker cleanup after six years

Asghari, H., Ciere, M. & van Eeten, MJG., 2015, Proceedings of the 24th USENIX Security Symposium. Jung, J. (ed.). USENIX Association, p. 1-16 16 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2014

Assessing legal and technical solutions to secure HTTPS

Arnbak, A., Asghari, H. & van Eeten, MJG., 2014, In : ACM Queue: tomorrow's computing today. 12, 8, p. 1-15 15 p.

Research output: Contribution to journalArticleProfessional

2 Citations (Scopus)

Images of innovation in discourses of free and open source software

Dafermos, G. & van Eeten, MJG., 2014, In : First Monday. 19, 12

Research output: Contribution to journalArticleScientificpeer-review

Open Access
1 Citation (Scopus)

Security collapse in the HTTPS market

Arnbak, A., Asghari, H., van Eeten, MJG. & van Eijk, NANM., 2014, In : Communications of the ACM. 57, 10, p. 47-55 9 p.

Research output: Contribution to journalArticleScientificpeer-review

15 Citations (Scopus)

Why them? Extracting intelligence about target selection from zeus financial malware

Tajalizadehkhoob, ST., Asghari, H., Ganan, C. & van Eeten, MJG., 2014, proceedings of the 13th annual workshop on the economics of information security, WEIS 2014. s.n. (ed.). s.l.: WEIS, p. 1-26 26 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2013

Deep packet inspection: Effects of regulation on its deployment by internet providers

Asghari, H., van Eeten, MJG., Bauer, JM. & Mueller, M., 2013, s.l.: Social sience research network. 15 p.

Research output: Book/ReportReportProfessional

Internet Measurements and Public Policy: Mind the Gap

Asghari, H., van Eeten, MJG. & Mueller, M., 2013, 6th workshop on cyber security experimentation and test, CSET '13. Kanich, C. (ed.). s.l.: USENIX Association, p. 1-26 26 p. (Login; vol. 38).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Security economics in the HTTPS value chain

Asghari, H., van Eeten, MJG., Arnbak, AM. & van Eijk, NANM., 2013, s.l.: Social sience research network. 35 p.

Research output: Book/ReportReportProfessional

Open Access

The resilient organization

Boin, A. & van Eeten, MJG., 2013, In : Public Management Review: an international journal of research and theory. 15, 3, p. 429-445 17 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
72 Citations (Scopus)

Where is the governance in internet governance?

van Eeten, MJG. & Mueller, M., 2013, In : New Media & Society. 15, 5, p. 720-736 17 p.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
42 Citations (Scopus)
2012

Mega-crisis and the internet: Risks, incentives and externalities

van Eeten, MJG. & Bauer, JM., 2012, Mega-crisis: Understanding the prospects, nature, characteristics and the effects of cataclysmic events. Helsloot, I. (ed.). Springfield: Charles C. Thomas, p. 356-370 370 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific