Timur D. Snoke
CERT
Publications by Timur D. Snoke
-
Coordinated Vulnerability Disclosure User Stories
August 25, 2022 • White Paper
Brad RunyonEric HatlebackAllen D. Householder
This paper provides user stories to guide the development of a technical protocol and application programming interface for Coordinated Vulnerability Disclosure.
read -
An Updated Framework of Defenses Against Ransomware
August 18, 2020 • White Paper
Timur D. SnokeTimothy J. Shimeall
This report, loosely structured around the NIST Cybersecurity Framework, seeks to frame an approach for defending against Ransomware-as-a-Service (RaaS) as well as direct ransomware attacks.
read -
Solving Current Cyber Challenges: Academic and Industry Collaboration
June 19, 2020 • Webinar
Timothy J. ShimeallTimur D. Snoke
The chasm between what academia researches and what industry uses in cyber is wide. By building mutually beneficial collaborations between the two, we can improve algorithms, datasets and techniques that are applicable to the real-world.
watch -
Applying Best Practices in Network Traffic Analysis
November 29, 2018 • Podcast
Timothy J. ShimeallTimur D. Snoke
Tim Shimeall and Timur Snoke, both researchers in the SEI's CERT Division, highlight some best practices (and application of these practices) that they have observed in network traffic analysis.
learn more -
How to Be a Network Traffic Analyst
September 13, 2018 • Podcast
Timothy J. ShimeallTimur D. Snoke
Tim Shimeall and Timur Snoke, researchers in the SEI's CERT Division, examine the role of the network traffic analyst in capturing and evaluating ever-increasing volumes of network data.
learn more -
NTP Best Practices
May 25, 2017 • Podcast
Timur D. Snoke
In this podcast, Timur Snoke explores the challenges of NTP and prescribes some best practices for securing accurate time with this protocol.
learn more -
Approaching Intelligent Analysis for Attribution and Tracking the Lifecycle of Threats
January 12, 2015 • Presentation
Timur D. Snoke
In this presentation, Timur Snoke proposes combining the threat assessment native to the Cyber Kill Chain and the attribution capability of the Diamond model.
read -
The Routing Table Tool Suite (RT-Tools): Mapping the Internet One Route at a Time or All Routes at One Time
January 13, 2014 • Poster
Timur D. Snoke
This poster describes the Routing Table Tool Suite (RT-Tool), which displays AS network traffic based on the path analysis of aggregate routing tables.
read