SIDN Labs to participate in two NWO-co-funded cybersecurity projects
NWO is supporting the projects as part of the Third National Cyber Security Research Agenda
Chose your color
Frequently visited
Frequently asked questions
The Whois is an easy-to-use tool for checking the availability of a .nl domain name. If the domain name is already taken, you can see who has registered it.
On the page looking up a domain name you will find more information about what a domain name is, how the Whois works and how the privacy of personal data is protected. Alternatively, you can go straight to look for a domain name via the Whois.
To get your domain name transferred, you need the token (unique ID number) for your domain name. Your existing registrar has the token and is obliged to give it to you within five days, if you ask for it. The procedure for changing your registrar is described on the page transferring your domain name.
To update the contact details associated with your domain name, you need to contact your registrar. Read more about updating contact details.
When a domain name is cancelled, we aren't told the reason, so we can't tell you. You'll need to ask your registrar. The advantage of quarantine is that, if a name's cancelled by mistake, you can always get it back.
One common reason is that the contract between you and your registrar says you've got to renew the registration every year. If you haven't set up automatic renewal and you don't renew manually, the registration will expire.
Wanneer je een klacht hebt over of een geschil met je registrar dan zijn er verschillende mogelijkheden om tot een oplossing te komen. Hierover lees je meer op pagina klacht over registrar. SIDN heeft geen formele klachtenprocedure voor het behandelen van een klacht over jouw registrar.
Would you like to be able to register domain names for customers or for your own organisation by dealing directly with SIDN? If so, you can become a .nl registrar. Read more about the conditions and how to apply for registrar status on the page becoming a registrar.
NWO is supporting the projects as part of the Third National Cyber Security Research Agenda
At the end of last year, at the dcypher symposium in Utrecht, NWO announced which projects they will be funding as part of the Dutch National Cyber Security Research Agenda (NCSRA) III. SIDN Labs is involved in two of the ten accepted projects: RAPID (Remediation of comPromised IoT Devices) and UPIN (User-driven Path verification and control in Inter-domain Networks). RAPID addresses the challenge of understanding the processes by which IoT devices are infected, and developing strategies for cleaning up infections, while UPIN investigates how users can be enabled to control and verify inter-network communication paths.
Photo: Sjoerd van der Hucht - MyEyes4u
Most internet users don't currently know how their traffic flows through the network to its final destination and cannot verify or control the path taken. UPIN will address this lack of transparency and control. Its goal is to develop and evaluate a system that enables users to cryptographically verify and easily control the paths via which their data travels through an inter-domain network such as the internet. That may be both in terms of router-to-router hops and in terms of router attributes (e.g. their location, operator, security level and manufacturer).
UPIN will thus provide the solution to a very relevant and topical problem, namely that it is becoming increasingly unclear to internet users who is processing their data (e.g. the service providers that handle their data and what jurisdictions apply) and that users have no control over how their data is being routed. That represents both a privacy risk (a malicious network might compromise a user’s data) and a safety risk (an untrusted network might disrupt remote-controlled surgery).
The project’s key results will be a system that gives internet users control over and insight into network paths, as well as demos and scientific publications.
UPIN will revolve around two PhD students, attached to the DACS group at the University of Twente and the SNE group at the University of Amsterdam, respectively. The other project partners are SURF and NLnet Labs.
The project is part of the 2STiC Programme, through which we are developing mechanisms for secure, stable and transparent inter-network communication, specifically in next-generation internet infrastructures. More information on UPIN is on the NWO site.
The Internet of Things (IoT) connects an ever-increasing number of wildly heterogenous devices to the internet, such as IP cameras or smart home appliances. While they promise to bring further convenience to our daily lives, a large number of these IoT devices are susceptible to malware infections (e.g. Mirai or Hajime malware), which often spread quickly across home and business networks.
The RAPID project addresses that problem and has two objectives: (i) to explain the causes of the infections and the inherent insecurity of the IoT paradigm by exploring the application of innovative data analytics to raw cyber security data such as IoT honeypots and IoT sensors such as SPIN; and (ii) to promote effective remediation mechanisms that mitigate the threats associated with currently vulnerable and infected IoT devices.
RAPID seeks to accomplish those goals in three phases. First, we will investigate attackers' reconnaissance strategies to understand how their scanning processes lead to infections. The second phase will address the attackers’ exploitation of infected IoT devices and seek to explain how IoT devices become infected, for example, in terms of vulnerabilities or misconfigurations. The third phase will investigate how infections can be remediated effectively.
RAPID will look to ISPs active on the Dutch and international markets to conduct clean-up experiments and corroborate the results of the causal modelling and threat modelling. As part of the project, workshops for IoT manufacturers and other research teams will also be organised, with a view to validating the results and driving the development of security policies that apply worldwide.
Like UPIN, RAPID will be organised around two PhD students, but both working at Delft University of Technology in the Multi-Actor Systems group. One of the students will concentrate on technical work, while the other will focus on behavioural aspects of RAPID’s problem space. The RAPID project is a collaboration of TU Delft, the Dutch Radiocommunications Agency, AbuseHUB, KPN and SIDN Labs, and is closely related to our SPIN project. More information on RAPID is available from NWO.
Article by:
Share this article