HG

H.J. Griffioen

8 records found

Exploring the Gorillas in the Malware Jungle

Investigating the communication and attack characteristics of the Gorilla botnet

The rise of the Internet of Things (IoT) has introduced levels of convenience never seen before, but also presents a significant cybersecurity challenge. Especially the insecure nature of many of these IoT devices fuels the emergence of advanced IoT botnets. The Gorilla botnet is ...

Classifying and identifying slow scanners based on their behavior and attributes

How can clustering techniques be applied to classify and identify slow scanners based on their behavior and attributes

In this research, we propose a new method for detecting slow, distributed port scanners by utilizing clustering techniques based on the behavioral characteristics of scan sources. Traditional methods often rely on identifying sources within the same subnet and using frequency-bas ...

Probing the Dark Web

Optimizing Port Scanning for Dark Web Protocol Analysis

The inception of onion routing in the mid-1990s, evolving into Tor (The Onion Routing) and other anonymous networks, marked a pivotal moment in the quest for internet privacy. However, the emergence of the dark web, facilitated by these networks, has also increased cybercrime act ...

Malware Evolution

Unraveling Malware Genomics: Synergistic Approach using Deep Learning and Phylogenetic Analysis for Evolutionary Insights


The rapid advancement of artificial intelligence technologies has significantly increased the complexity of polymorphic and metamorphic malware, presenting new challenges to cybersecurity defenses. Our study introduces a novel bioinformatics-inspired approach, leveraging dee ...
Open source software (OSS) vulnerabilities form a real threat to the security of software that employs them.
Efforts to mitigate these risks exist in the form of dependency check tools, however these often suffer from imprecise warnings due to the utilization of only metadata ...
The border gateway protocol (BGP) is what holds the internet together by making data routing possible between various points on the internet. It is used to exchange routing information between and within networks on the internet with the use of special BGP routers. This routing i ...

Railway Maintenance Scheduling

Improving the trade-off between runtime and solution quality for annual maintenance possession scheduling with a new, complex problem definition for the Dutch railways

There is increasingly more expensive maintenance that needs to be performed on the Dutch railway network. Good maintenance schedules reduce costs, minimise hindrance to passenger and freight travel, and follow restrictions imposed by available resources, legislation and other agr ...