For a more secure society!
TI: Threat landscape analysis based on Fox-IT sensor grid data
Keywords: Duration: 5 months Context: HBO/WO thesis Context: Fox-IT Security Operations Centre analysis thousands of incidents…
MSS: Detection of vulnerability scanning using machine based learning
Keywords: Duration: 5-10 months Context: WO thesis Context: In the Security Operations environment valid vulnerability scanning…
TI – Protocol agnostic bruteforce detection across many servers
Keywords: Duration: 5-10 months Context: HBO/WO thesis Context: Bruteforcing of credentials and the current trend of…
MSS – Detection of cyber threats in SMBv3 protocol traffic
Keywords: Detection, SMB3, Protocol analysis, Detection methods, Encryption, Packet inspection, exploit detection Duration: 5-10 months Context:…
analyze more effectively, profiling, piecing together different kinds of da
DetACT: Flow Detection
HTTP, (page)flow, state-changes
DetACT: Rule Layout Rendering
auto-layout, graph drawing, user interface design, front-end development
Forensics: Windows 10 memory forensics (WO)
Analyze even the newest versions of an OS
Threat Intelligence: Generic Ransomware research
Research into the latest ransomware trends.
MSS: TLS trending
Conduct statistical analysis on the trend
MSS: HTTP2 detection
Produce a PoC on how detection could work, with Snort, Suricata, or Bro.
Forensics: Structured data analysis
Research into structuring and analysing unstructured data.
MSS: Using Fastnetmon to provide DDOS protection
PoC the usage of Fastnetmon on our sensor platform.
MSS: Ransomware Honeypot
Research to possibility of setting up a honeypot to capture attack methods.
MSS: Bro-SMB research
Detect multiple attacks relating to SMB/SMB2.
MSS / CTMp: Security notification service
Research into app development and notification schemes.
High Assurance: Side Channel Analysis on crypto algorithm in FPGA
Analyze possible side channel attacks on crypto FPGA platform.
Forensics: APFS Forensic Analysis
Analyze relevant new features and explain their significance in forensic investigations.
Threat Intelligence: Malware detection in endpoint events
Use knowledge of malware and threats to build software that detects unknown threats.
Marketing: Stagiair Communicatie
Word jij onze nieuwe Communicatie stagiair(e)?
Crypto P&S: Clientportal
You must have experience of programming in Python and Django in order to apply.