scispace - formally typeset
M

Marcel E. M. Spruit

Researcher at Delft University of Technology

Publications -  9
Citations -  70

Marcel E. M. Spruit is an academic researcher from Delft University of Technology. The author has contributed to research in topics: Botnet & Command and control. The author has an hindex of 5, co-authored 9 publications receiving 67 citations. Previous affiliations of Marcel E. M. Spruit include The Hague University of Applied Sciences.

Papers
More filters
Book ChapterDOI

Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows

TL;DR: This paper proposes detection of covert communication by passive host-external analysis of causal relationships between traffic flows and prior traffic or user activity, and identifies the direct causes of traffic flows.
Book ChapterDOI

Towards detection of botnet communication through social media by monitoring user activity

TL;DR: A new detection mechanism that measures the causal relationship between network traffic and human activity, like mouse clicks or keyboard strokes is introduced, and successful real time detection of botnet Command and Control traffic is demonstrated.
Journal ArticleDOI

Refereed paper: IT security in Dutch practice

TL;DR: Research is reported which aims to obtain information about the security level of other organizations in the Netherlands from a survey of a considerable number of companies and institutes in The Netherlands.
Proceedings Article

Detection of botnet collusion by degree distribution of domains

TL;DR: A new DNS-based detection approach is introduced, that detects botnet collusion by anomalies in the degree distribution of visited domains, without any assumption about message content and statistical properties of the traffic.
Book ChapterDOI

Risk analysis on Internet connection

TL;DR: A structured approach of a limited risk analysis on an Internet connection is described, in order to assess the threats which will be encountered if the organisation decides to connect to the Internet, and to determine which measures are necessary to protect against the relevant threats.