We study the influence of daily routines of Dutch academic institutions on the number of DDoS attacks targeting their infrastructures. We hypothesise that the attacks are motivated and harness the postulates of Routine Activity Theory (RAT) from criminology to analyse the data. We define routine periods in order to group days with similar activities and use 2.5 years of NetFlow alerts data measured by SURFnet to compare the number of alerts generated during each of these periods. Our analysis shows clear correlation between academic schedules and attack patterns on academic institutions. This leads us to believe that most of these attacks are not random and are initiated by someone who might benefit by disrupting scheduled educational activ...
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend against, part...
Within our academic high-speed network infrastructure which is used for connecting all universities ...
The ability to gain unauthorized access to computer systems to engage in espionage and data theft po...
Cybercrime has been the focus of public attention during the last decade. However, within the crimin...
In 2012, the Dutch National Research and Education Network, SURFnet, observed a multitude of Distrib...
Phishing is the use of fraudulent emails to obtain personal financial information from victims by po...
Currently, DDoS attacks have become inevitable for financial services and their threat keeps rising....
The threat of attacks enabled by malicious software, or programs used to compromise computer systems...
Distributed denial-of-service (DDoS) attacks are nowadays easy and cheap to carry out, and have beco...
Although a relatively simple form of hacking, website defacement can have severe consequences both f...
Reliable availability to the internet and internet-based services is crucial in today’s world. DDoS ...
Little attention has been given academically to empirically tested theoretical frameworks that aim a...
Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for...
Why should you care about Distributed Denial of Service (DDoS) attacks? If your Internet home connec...
This study investigates the relationships between users' routine activities and socio-economic chara...
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend against, part...
Within our academic high-speed network infrastructure which is used for connecting all universities ...
The ability to gain unauthorized access to computer systems to engage in espionage and data theft po...
Cybercrime has been the focus of public attention during the last decade. However, within the crimin...
In 2012, the Dutch National Research and Education Network, SURFnet, observed a multitude of Distrib...
Phishing is the use of fraudulent emails to obtain personal financial information from victims by po...
Currently, DDoS attacks have become inevitable for financial services and their threat keeps rising....
The threat of attacks enabled by malicious software, or programs used to compromise computer systems...
Distributed denial-of-service (DDoS) attacks are nowadays easy and cheap to carry out, and have beco...
Although a relatively simple form of hacking, website defacement can have severe consequences both f...
Reliable availability to the internet and internet-based services is crucial in today’s world. DDoS ...
Little attention has been given academically to empirically tested theoretical frameworks that aim a...
Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for...
Why should you care about Distributed Denial of Service (DDoS) attacks? If your Internet home connec...
This study investigates the relationships between users' routine activities and socio-economic chara...
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend against, part...
Within our academic high-speed network infrastructure which is used for connecting all universities ...
The ability to gain unauthorized access to computer systems to engage in espionage and data theft po...