We focus on five social themes.
TNO cooperates with companies, the public sector and other organisations, to apply our knowledge and expertise with and for others.
We develop knowledge not for its own sake, but for practical application.
TNO offers you the chance to do groundbreaking work and help customers and society with innovative, practical and smart solutions.
On our TNOTIME platform you can find blogs, interviews and background stories. Discover the field of TNO captured in photographs, animations, video and text. Share interesting articles and powerful infographics, or download whitepapers.
Advanced Persistent Threats (APTS) are sophisticated cyber-attacks that are usually undetected because current detection methods are insufficient. Malware detection and analysis is of the utmost importance in the context of cyber espionage. Many existing detection technologies focus on the initial intrusion, while the next phase can remain undetected for long periods of time. This may cause large amounts of damage because sensitive information or money is obtained.
At TNO we are working on detection methods and techniques with a focus on the stage after the initial intrusion, for example by means of statistical anomaly detection of network traffic. In addition, our approach is based on the recognition of malicious activity among large amounts of regular network traffic and events. Network simulation tools and models can be used to validate the effectiveness of detection in different network environments and for different attack scenarios.
We have defined the following assignments within this research area:
ASSIGNMENT 1: DETECTION OF ADVANCED CYBER ATTACKS
For this assignment you join a TNO project to detect sophisticated cyber attacks using anomaly detection and/or clustering of systems based on network traffic. You contribute to the development of new methods and / or the improvement of existing methods. Examples of previous graduation projects:
ASSIGNMENT 2: NETWORKTRAFFIC SIMULATION FOR APT DETECTION
You will develop models for the communication behavior of malware and cyber attacks in various stages of cyber kill chain. In addition, your research methods for modeling regular network traffic. This simulation environment will be used to evaluate and validate new APT detection techniques.
Then please feel free to apply on this vacancy! For further questions don’t hesitate to contact us.
Contactpersoon: Alex Sangers
Phone number: +31 (0)6-29625338
Stay up to date with our latest news, activities and vacancies
We use anonymous cookies to enhance the use of our site.