I am currently a PhD candidate at the Services and Cyber Security (SCS) group at the University of Twente under the supervision of Andreas Peter and Maarten van Steen. My research interests are in various aspects of system security, such as network analysis mobile security and anomaly detection in evolving systems. I carry out this research in the project: EVolutionary Intrusion DEtectioN for Changing Environments (EVIDENCE). In this project I focus on developing anomaly-based network intrusion detection techniques to detect malicious software which are also capable of automatically evolving with benign changes.
In January 2020, I joined the SecLab at UC Santa Barbara as a visiting researcher with Giovanni Vigna and Christopher Kruegel for six months. Together with Lastline (now VMware) we worked on detecting network attack patterns using artificial intelligence.
An important part of evaluating academic work is to compare your own approach with the current state-of-the-art. However, sometimes, the original source code of developed tools is not publically available. This can be caused by reasons, such as contractual obligations for original authors to not publish their source code. It is important to reach out to the original authors of the academic works for which you want to obtain source code. Even if they are unable to give you the code, authors can often give helpful pointers for your own re-implementations. This section highlights the re-implemented academic source code for comparison with our own work.