<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>TIDE - Threat Identification Using Active DNS Measurements</title>
    <link>https://www.tide-project.nl/</link>
    <description>Recent content on TIDE - Threat Identification Using Active DNS Measurements</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 21 Oct 2021 14:52:57 +0200</lastBuildDate><atom:link href="https://www.tide-project.nl/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Slides</title>
      <link>https://www.tide-project.nl/slides/</link>
      <pubDate>Thu, 21 Oct 2021 14:52:57 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/slides/</guid>
      <description>Slides of the following conferences are available:
 CNSM 2021 (video) WTMC 2020 (video) FIRST 2019 AIMS 2018 FOSDEM 2018 ICTOpen 2018 NOMS 2018  </description>
    </item>
    
    <item>
      <title>ANYway: Measuring the Amplification DDoS Potential of Domains (preprint)</title>
      <link>https://www.tide-project.nl/publications/cnsm2021/</link>
      <pubDate>Fri, 17 Sep 2021 01:00:00 +0100</pubDate>
      
      <guid>https://www.tide-project.nl/publications/cnsm2021/</guid>
      <description>DDoS attacks threaten Internet security and stability, with attacks reaching
the Tbps range. A popular approach involves DNS-based reflection and
amplification, a type of attack in which a domain name, known to return a large
answer, is queried using spoofed requests. Do the chosen names offer the
largest amplification, however, or have we yet to see the full amplification
potential? And while operational countermeasures are proposed, chiefly limiting</description>
    </item>
    
    <item>
      <title>TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records</title>
      <link>https://www.tide-project.nl/publications/wtmc2020/</link>
      <pubDate>Tue, 01 Sep 2020 01:00:00 +0100</pubDate>
      
      <guid>https://www.tide-project.nl/publications/wtmc2020/</guid>
      <description>The DNS TXT resource record is the one that without doubt provide users with
the most flexibility of content, as it is a largely unstructured. Although it
might be the ideal basis for storing any form of text-based information, it
also poses a security threat, as TXT records can also be used for malicious
and unintended practices. Yet, we reckon that TXT records are often overlooked
in security research.</description>
    </item>
    
    <item>
      <title>A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements</title>
      <link>https://www.tide-project.nl/publications/eurospw2020/</link>
      <pubDate>Tue, 01 Sep 2020 00:00:00 +0100</pubDate>
      
      <guid>https://www.tide-project.nl/publications/eurospw2020/</guid>
      <description>The possibility to include Unicode characters in domain names allows users to
deal with domains in their regional languages. This is done by introducing
Internationalized Domain Names (IDN). However, the visual similarity between
different Unicode characters - called homoglyphs - is a potential security
threat, as visually similar domain names are often used in phishing attacks.
Timely detection of suspicious homograph domain names is an important step</description>
    </item>
    
    <item>
      <title>Looking beyond the horizon: Thoughts on Proactive Detection of Threats</title>
      <link>https://www.tide-project.nl/publications/dtrap2019/</link>
      <pubDate>Tue, 04 Feb 2020 10:25:00 +0100</pubDate>
      
      <guid>https://www.tide-project.nl/publications/dtrap2019/</guid>
      <description>The fourth publication for the TIDE project. The FIRST talk (see here) has
been extended into a journal paper for Digital Threats: Research and Practice
(DTRAP). In this paper we argue that we, as a security community, should move
towards proactive security. However, we shed light on both sides of the coin. We
think the &amp;lsquo;optimal&amp;rsquo; way is to combine the reactive and proactive methods, to
make use of the best of both worlds.</description>
    </item>
    
    <item>
      <title>Unicode Homoglyphs</title>
      <link>https://www.tide-project.nl/blog/unicode_homoglyphs/</link>
      <pubDate>Wed, 14 Aug 2019 09:55:56 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/unicode_homoglyphs/</guid>
      <description>For the last couple of months Ramin Yazdani has been looking into phishing
domains using Unicode characters to appear like the target domain. In this
process he developed a new &amp;lsquo;confusables&amp;rsquo; table of Unicode characters which can
easily be mistaken for their ASCII counterpart. The table is based on the
&amp;lsquo;Unicode Confusables list&amp;rsquo; and the &amp;lsquo;Unicode Similarity List&amp;rsquo;.
The proposed Unicode Confusables table can be found here.
The dataset is supplied as a &amp;lsquo;csv&amp;rsquo; file where the first column represents the</description>
    </item>
    
    <item>
      <title>FIRST 2019: Defending the (Edinburgh) Castle</title>
      <link>https://www.tide-project.nl/blog/first2019/</link>
      <pubDate>Wed, 26 Jun 2019 12:33:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/first2019/</guid>
      <description>Last week was the FIRST conference in Edinburgh. TIDE was presenting a talk on
&amp;ldquo;Proactive Threat Detection&amp;rdquo;. The idea we presented at FIRST was, since a
proactive approach works well in the field of DNS, that we need to expand on
proactive detection of threats. It fit well with the theme of the conference,
Defending the Castle. Through proactive threat detection defenders are able to
mount a defense against upcoming attacks rather than getting notified when the</description>
    </item>
    
    <item>
      <title>Regular expressions, On the Pitfalls of Finding Security Issues in DNS TXT Records</title>
      <link>https://www.tide-project.nl/blog/wtmc2020/</link>
      <pubDate>Fri, 31 May 2019 08:53:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/wtmc2020/</guid>
      <description>Below are the regular expressions we have used to categorize TXT records in the
paper &amp;ldquo;On the Pitfalls of Finding Security Issues in DNS TXT Records&amp;rdquo;. This
paper is currently under submission.
A label can have multiple regular expressions attached to it, the sum of the
number of records match make up the count for the label.
The regular expressions are in the form where they can directly be
copy-paste-ed into OpenINTEL&amp;rsquo;s Impala interface.</description>
    </item>
    
    <item>
      <title>DSI Symposium</title>
      <link>https://www.tide-project.nl/blog/dsi2019/</link>
      <pubDate>Fri, 01 Mar 2019 15:23:25 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/dsi2019/</guid>
      <description>The Digital Society Institute Symposium is next week, at which I will be giving
a talk! Of course my talk is going to be about TIDE. My talk is scheduled
around 15:30, I would like it if you would come and support me!</description>
    </item>
    
    <item>
      <title>Collection pages</title>
      <link>https://www.tide-project.nl/blog/collections/</link>
      <pubDate>Fri, 01 Mar 2019 15:19:25 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/collections/</guid>
      <description>Today the Website has been updated. Two collection pages have been added.
Posters and Slides, listing all the available posters and slides in
an easy view.</description>
    </item>
    
    <item>
      <title>Poster</title>
      <link>https://www.tide-project.nl/posters/</link>
      <pubDate>Fri, 01 Mar 2019 15:05:57 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/posters/</guid>
      <description>The following posters are available:
CSNG 2018   IMC 2018   SIGCOMM 2017   </description>
    </item>
    
    <item>
      <title>Poster presentation at IMC 2018</title>
      <link>https://www.tide-project.nl/blog/imc2018/</link>
      <pubDate>Thu, 08 Nov 2018 11:35:00 +0100</pubDate>
      
      <guid>https://www.tide-project.nl/blog/imc2018/</guid>
      <description>Last week, October the 31st, was IMC, in Boston, USA. IMC is a top Internet
measurements conference. The TIDE-project was there too to promote the malware
in DNS TXT records project. We presented a poster on which we got quite a lot
of interest. People were surprised there were pieces of code in TXT records.
Below you can see the poster we have presented.
The poster shows the rise of TXT records along with what we have classified as</description>
    </item>
    
    <item>
      <title>Poster presentation at CSNG 2018</title>
      <link>https://www.tide-project.nl/blog/csng2018/</link>
      <pubDate>Wed, 17 Oct 2018 15:47:25 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/csng2018/</guid>
      <description>Today, October the 17th, was the fourth edition of the Cyber Security Workshop
in the Netherlands (CSNG), in The Hague. The TIDE-project was here to present a poster
on malware in DNS TXT malware. Our current ongoing research.
If you couldn&amp;rsquo;t make it to the CSng Workshop, you have another chance. The
poster will be presented again at IMC 2018 in Boston, USA.</description>
    </item>
    
    <item>
      <title>New website running on Hugo</title>
      <link>https://www.tide-project.nl/blog/hugo/</link>
      <pubDate>Wed, 18 Jul 2018 10:59:56 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/hugo/</guid>
      <description>The TIDE website has gotten a new look. And for good reason too. We moved from
Wordpress to Hugo. As a security researcher we can hardly use a CMS which has
quite a few CVE&amp;rsquo;s per year.
Hugo Hugo is a framework for building static websites. Something which is
perfectly suited for the TIDE website. The website should have gotten a lot
faster as well. There are no calls to MySQL, no PHP code which needs to get</description>
    </item>
    
    <item>
      <title>People</title>
      <link>https://www.tide-project.nl/people/</link>
      <pubDate>Mon, 16 Jul 2018 15:05:09 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/people/</guid>
      <description>Olivier van der Toorn (Ph.D. student, DACS group, University of Twente)
The DACS (Design and Analysis of Communication Systems) group at the University of Twente, is a leading group in the area of dependability of networked systems in Europe, with a focus on Internet Security (Sperotto, Pras) and security of critical infrastructure (Remke, Veni grant). The DACS group brings expertise in network traffic monitoring and analysis to this project, with a specific focus on network security.</description>
    </item>
    
    <item>
      <title>Reverse DNS Measurement</title>
      <link>https://www.tide-project.nl/rdns/</link>
      <pubDate>Mon, 16 Jul 2018 15:05:09 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/rdns/</guid>
      <description>Hello,
we are network researchers at the University of Twente, at the Design and
Analysis of Communication Systems group. We are currently conducting a study on
the timeliness of reverse DNS entries.
If you want to be excluded from our measurement please read the sections below.
Measurement details For our project we run two measurements. An ICMP ping scan and a reverse DNS
measurement. Both measurements run at an adaptive frequency using an</description>
    </item>
    
    <item>
      <title>Consortium</title>
      <link>https://www.tide-project.nl/consortium/</link>
      <pubDate>Mon, 16 Jul 2018 14:18:45 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/consortium/</guid>
      <description>High tech, human touch. That is the University of Twente (UT). Some 3300 scientists and other professionals working together on cutting-edge research, innovations with real-world relevance and inspiring education for more than 9600 students. The Design and Analysis of Communication Systems (DACS) group at the Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS) is part of the research team.
  SURFnet is the National Research and Education Network operator for The Netherlands.</description>
    </item>
    
    <item>
      <title>About the Project</title>
      <link>https://www.tide-project.nl/about/</link>
      <pubDate>Fri, 13 Jul 2018 16:03:57 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/about/</guid>
      <description>The problem The Internet was born as an open, decentralized and scalable infrastructure supporting the visionary dream of an interconnected world of data, information and services. Never like in the last decade we have witnessed a booming expansion of the Internet in terms of infrastructure (e.g., available bandwidth), services (e.g., online social networks, online streaming but also online banking, health care, to mention some), and user generated content. The Internet is considered a means for ensuring human rights, such as freedom of speech and expression, and a structural way for educating people on democracy [4].</description>
    </item>
    
    <item>
      <title>Threat Identification Using Active DNS Measurements</title>
      <link>https://www.tide-project.nl/publications/aims2018/</link>
      <pubDate>Mon, 11 Jun 2018 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/publications/aims2018/</guid>
      <description>The third publication for the TIDE project. Details more formally the research
questions of this project.
   The DNS is a core service for the Internet. Most uses of the DNS are benign, but some are malicious. Attackers often use a DNS do- main to enable an attack (e.g. DDoS attacks). Detection of these attacks often happens passively, but this leads to a reactive detection of attacks. However, registering and configuring a domain takes time.</description>
    </item>
    
    <item>
      <title>Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains</title>
      <link>https://www.tide-project.nl/publications/noms2018/</link>
      <pubDate>Thu, 03 May 2018 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/publications/noms2018/</guid>
      <description>The second publication for the TIDE project. It has received the Best Paper Award at NOMS 2018.
   Snowshoe spam is a type of spam which is notoriously hard to detect. Differently from regular spam, snowshoe spammers distribute the volume among many hosts, in order to make detection harder. To be successful, however spammers need to appear as legitimate as possible, for example, by adopting email best practice like Sender Policy Framework (SPF).</description>
    </item>
    
    <item>
      <title>Best Paper Award at NOMS 2018</title>
      <link>https://www.tide-project.nl/blog/noms2018_post/</link>
      <pubDate>Tue, 01 May 2018 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/noms2018_post/</guid>
      <description>TIDE was present at the Network Operations and Management Symposium (NOMS 2018) conference in Taipei, Taiwan. Olivier was there to present &amp;ldquo;Melting the Snow: Detecting Snowshoe Spam Domains Using Active DNS Measurements&amp;rdquo;.
NOMS 2018 was held in Taipei, Taiwan, from the 23rd till the 27th of April. NOMS has been held in every even-numbered year since 1988. This was the 30th anniversary of NOMS.
Our work was very well received at the conference.</description>
    </item>
    
    <item>
      <title>ICTOPEN 2018, Second Prize In The BCMT Award 2018</title>
      <link>https://www.tide-project.nl/blog/ictopen2018/</link>
      <pubDate>Fri, 23 Mar 2018 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/ictopen2018/</guid>
      <description>At the beginning of this week ICTOpen2018 was held in Amersfoort. An important event for ICT in the Netherlands. Many topics were visited from ‘health science’ to ‘artificial intelligence’.
Jos Wetzels, from the Technical University of Eindhoven, and Olivier van der Toorn, from the University of Twente, were the nominees for the BCMT Award 2018. This award is given to best Master thesis in the cybersecurity field. Seven theses were nominated, and two of them were invited two present their work at the ICTOpen conference.</description>
    </item>
    
    <item>
      <title>TIDE Goes To FOSDEM (Video Available)</title>
      <link>https://www.tide-project.nl/blog/fosdem2018/</link>
      <pubDate>Fri, 22 Dec 2017 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/fosdem2018/</guid>
      <description>FOSDEM is a yearly event in the last weekend of Januari (or the first weekend of Februari). FOSDEM stands for Free Open-Source Developer Europe Meeting. At the event state of the art open-source software is discussed, presented and enjoyed. This year there is a DNS devroom. On sunday at 11:35 Olivier will hold a talk there titled &amp;lsquo;Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains&amp;rsquo;.
Since the event is entirely free, be sure to visit!</description>
    </item>
    
    <item>
      <title>TIDE Won First Prize</title>
      <link>https://www.tide-project.nl/blog/ctit2017/</link>
      <pubDate>Wed, 22 Nov 2017 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/ctit2017/</guid>
      <description>TIDE has won the CTIT Symposium Ph.D. “1 minute madness” event!!!
During the CTIT Symposium 2017 &amp;ldquo;Internet of Things is ready. What about us?&amp;quot; there was the Ph.D. &amp;ldquo;1 minute madness&amp;rdquo; event. All of the winners from the previous round got the opportunity to present their work again in a single minute.
It was quite a challenge to compress all you want to say into a single minute. However, the feedback I got after my presentation was great.</description>
    </item>
    
    <item>
      <title>Snowshoe Spam Detection Through DNS Measurements</title>
      <link>https://www.tide-project.nl/blog/snowshoe_spam/</link>
      <pubDate>Thu, 19 Oct 2017 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/snowshoe_spam/</guid>
      <description>Snowshoe Spam We started the TIDE project with Snowshoe Spam domain detection. But what is Snowshoe Spam? In Snowshoe Spam the spammer tries to spread the sending load over numerous hosts, and thus reducing the amount of spam each hosts sends. This makes each host separate hard to detect. It means that the spammer is less likely to end up on spam reputation lists (blacklists) and is therefore able to continue spamming for longer.</description>
    </item>
    
    <item>
      <title>CTIT: Your Research, A Poster Presentation To Kick-Off This Project</title>
      <link>https://www.tide-project.nl/blog/ctit_post_presentation/</link>
      <pubDate>Thu, 21 Sep 2017 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/ctit_post_presentation/</guid>
      <description>The CTIT’s annual event &amp;ldquo;Your Research @ CTIT&amp;rdquo; aims to bring together PhD/Postdoc researchers from all the 21 CTIT research groups from the University of Twente. Researchers will have the opportunity here to present their ongoing research project to their CTIT colleagues. The event this year will be held on 3 October 2017 from 15:00 till 18:00 at the Ravelijn Atrium. TIDE will be presenting the poster originally made for SIGcomm (see this post for details).</description>
    </item>
    
    <item>
      <title>Tide: Threat Identification Using Active DNS Measurements, Poster Submission To SIGCOMM 2017</title>
      <link>https://www.tide-project.nl/blog/sigcomm2017/</link>
      <pubDate>Tue, 29 Aug 2017 00:00:00 +0200</pubDate>
      
      <guid>https://www.tide-project.nl/blog/sigcomm2017/</guid>
      <description>This is the first publication for this project. A poster submission to SIGCOMM 2017. It details three use cases of Threat Identifcation Using Active DNS Measurements, DDoS attacks, snowshoe spam and CEO fraud.
Clicking the image will show the full resolution poster. Clicking here will take you to the poster abstract. Below are the details of the publication.
   The Domain Name System contains a wealth of information about the security, stability and health of the Internet.</description>
    </item>
    
  </channel>
</rss>
