Harm Griffioen
Harm Griffioen
Home
Publications
Contact
Light
Dark
Automatic
paper-conference
Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services
To compromise a computer, it is first necessary to discover which hosts are active and which services they run. This reconnaissance is …
Harm Griffioen
,
Christian Doerr
Cite
DOI
Fingerprinting tooling used for SSH compromisation attempts
In SSH brute forcing attacks, adversaries try a lot of different user name and password combinations in order to compromise a system. …
Vincent Ghiette
,
Harm Griffioen
,
Christian Doerr
Cite
Taxonomy and adversarial strategies of random subdomain attacks
Ever since the introduction of the domain name system (DNS), attacks on the DNS ecosystem have been a steady companion. Over time, …
Harm Griffioen
,
Christian Doerr
Cite
«
Cite
×