Anna Sperotto

dr.

20072020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats

van der Toorn, O. I. & Sperotto, A., Mar 2020, In : Digital Threats: Research and Practice. 1, 1, 13 p., 4.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
14 Downloads (Pure)
2019

IoT-Botnet Detection and Isolation by Access Routers

Dietz, C., Castro, R. L., Steinberger, J., Wilczak, C., Antzek, M., Sperotto, A. & Pras, A., 3 Jan 2019, 2018 9th International Conference on the Network of the Future, NOF 2018. Idzikowski, F., Kliks, A., Rodziewicz, M., Tuncer, D. & Chemouil, P. (eds.). IEEE, p. 88-95 8 p. 8598138

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Citations (Scopus)
588 Downloads (Pure)
2018

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild

Jonker, M., Pras, A., Dainotti, A. & Sperotto, A., 31 Oct 2018, Proceedings of the ACM Internet Measurement Conference 2018. p. 457-463 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Citations (Scopus)
118 Downloads (Pure)

DDoS Defense using MTD and SDN

Steinberger, J., Kuhnert, B., Dietz, C., Ball, L., Sperotto, A., Baier, H., Pras, A. & Dreo Rodosek, G., 2018. 9 p.

Research output: Contribution to conferencePaper

Open Access
File
10 Citations (Scopus)
634 Downloads (Pure)

Flow-Based Compromise Detection: Lessons Learned

Hofstede, R., Pras, A., Sperotto, A. & Dreo Rodosek, G., 16 Dec 2018, In : IEEE security & privacy. 16, 1, p. 82-89 8 p., 8283485.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
7 Citations (Scopus)
33 Downloads (Pure)

Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains

van der Toorn, O. I., van Rijswijk, R. M., Geesink, B. & Sperotto, A., 24 Apr 2018, NOMS2018: the IEEE/IFIP Network Operations and Management Symposium. IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
7 Downloads (Pure)
2017

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A., 28 Jun 2017, ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
310 Downloads (Pure)

Challenges with Reproducibility

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J., Sperotto, A. & Trammell, B., 2017, p. 1-4. 4 p.

Research output: Contribution to conferencePaper

11 Citations (Scopus)

Flow-Based Web Application Brute-Force Attack and Compromise Detection

Hofstede, R., Jonker, M., Sperotto, A. & Pras, A., 2017, In : Journal of network and systems management. 25, 4, p. 735-758 24 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
25 Downloads (Pure)

Measuring exposure in DDoS protection services

Jonker, M. & Sperotto, A., 30 Nov 2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

Jonker, M., King, A., Krupp, J., Rossow, C., Sperotto, A. & Dainotti, A., 3 Nov 2017, p. 100-113.

Research output: Contribution to conferencePaper

21 Citations (Scopus)
2 Downloads (Pure)

Quiet dogs can bite: Which Booters should we go after, and what are our mitigation options?

Santanna, J. J., De Schmidt, R. O., Tuncer, D., Sperotto, A., Granville, L. Z. & Pras, A., 1 Jul 2017, In : IEEE communications magazine. 55, 7, p. 50-56 7 p., 7981523.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation

van Rijswijk-Deij, R., Hageman, K., Sperotto, A. & Pras, A., Apr 2017, In : IEEE/ACM transactions on networking. 25, 2, p. 738-750

Research output: Contribution to journalArticleAcademicpeer-review

5 Citations (Scopus)
12 Downloads (Pure)

TIDE – Threat Identification using Active DNS Measurements

Sperotto, A., van der Toorn, O. & van Rijswijk, R., 22 Aug 2017, p. 65-67. 3 p.

Research output: Contribution to conferencePaper

1 Citation (Scopus)
2016

A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., Jun 2016, In : IEEE journal on selected areas in communications. 34, 6, p. 1877-1888 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

36 Citations (Scopus)
1 Downloads (Pure)

Collaborative DDoS Defense using Flow-based Security Event Information

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., Apr 2016, Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016. USA: IEEE Communications Society, p. 516-552 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

DDoS 3.0 - How Terrorists Bring Down the Internet

Pras, A., Cardoso de Santanna, J. J., Steinberger, J. & Sperotto, A., 4 Apr 2016, Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016. Remke, A. K. I. & Haverkort, B. R. H. M. (eds.). Berlin: Springer, p. 1-4 4 p. (Lecture Notes in Computer Science; vol. 9629).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
9 Citations (Scopus)
150 Downloads (Pure)

How to Achieve Early Botnet Detection at the Provider Level?

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016. London: Springer, p. 142-146 5 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
136 Downloads (Pure)

In Whom Do We Trust - Sharing Security Events

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., 21 Jun 2016, Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016). London: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
41 Downloads (Pure)

"LUDO" - Kids playing Distributed Denial of Service

Steinberger, J., Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U., Sperotto, A., Baier, H. & Pras, A., 15 Dec 2016, Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016). Bergström, J., Hórvath, G. & Schofield, B. (eds.). Sweden: EUNIS Research and Analysis Initiative, p. 3 15 p. (European Journal of Higher Education IT; vol. 2016-02).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
48 Downloads (Pure)

Measuring the Adoption of DDoS Protection Services

Jonker, M., Sperotto, A., van Rijswijk, R. M., Sadre, R. & Pras, A., 14 Nov 2016, Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016. New York, NY, USA: Association for Computing Machinery (ACM), p. 279-285 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
21 Citations (Scopus)
435 Downloads (Pure)

Monitoring the DNS Infrastructure for Proactive Botnet Detection

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016). Germany: Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI), p. 3-4 2 p. (SIDAR reports; vol. SR-2016-01).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
49 Downloads (Pure)

On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC

van Rijswijk, R. M., Jonker, M. & Sperotto, A., Nov 2016, p. 258-262. 5 p.

Research output: Contribution to conferencePaper

File
7 Citations (Scopus)
19 Downloads (Pure)

Proactive Botnet Detection and Defense at Internet scale

Dietz, C., Sperotto, A., Pras, A. & Dreo, G., Apr 2016. 1 p.

Research output: Contribution to conferencePoster

File
43 Downloads (Pure)

Real-time DDoS Defense: A collaborative Approach at Internet Scale

Steinberger, J., Sperotto, A., Pras, A. & Baier, H., 2016.

Research output: Contribution to conferencePoster

Whom do we trust - Booters and SSL/TLS certificates

Steinberger, J. (ed.), Kuhnert, B., Alavi, S., Cardoso de Santanna, J. J., Sperotto, A., Baier, H. & Pras, A., Jun 2016, p. 14-14. 1 p.

Research output: Contribution to conferenceAbstract

File
17 Downloads (Pure)
2015

A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX

van der Toorn, O. I., Hofstede, R. J., Jonker, M. & Sperotto, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 862-865 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
96 Downloads (Pure)

Booters - an analysis of DDoS-as-a-Service attacks

Cardoso de Santanna, J. J., van Rijswijk, R. M., Hofstede, R. J., Sperotto, A., Wierbosch, M., Zambenedetti Granville, L. & Pras, A., 11 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). 978-3-901882-76-0: IEEE Computer Society, p. 243 -251 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
78 Citations (Scopus)
828 Downloads (Pure)

Booter websites characterization: Towards a list of threats

Chromik, J. J., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., May 2015, Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015. Brazil: Brazilian Computer Society (SBC), p. 445-458 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
649 Downloads (Pure)

Characterizing the IPv6 Security Landscape by Large-Scale Measurements

Hendriks, L., Sperotto, A. & Pras, A., 22 Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Switzerland: Springer, p. 145-149 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
16 Downloads (Pure)

Collaborative Attack Mitigation and Response: A survey

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 14 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 910-913 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
11 Citations (Scopus)
50 Downloads (Pure)

Editorial special issue on measure, detect and mitigate – challenges and trends in network security

Sperotto, A., Hofstede, R. J., Dainotti, A., Schmitt, C. & Dreo Rodosek, G., Sep 2015, In : International journal of network management. 25, 5, p. 261-262 2 p.

Research output: Contribution to journalArticleAcademic

File
40 Downloads (Pure)

Exchanging security events of flow-based intrusion detection systems at internet scale

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 19 Jun 2015, Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015). USA: Internet Architecture Board Website, p. 3 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
16 Downloads (Pure)

How asymmetric is the Internet? A Study to Support the use of Traceroute

de Vries, W. B., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., Jun 2015, Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 113-125 13 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
121 Downloads (Pure)

How to exchange security events? Overview and evaluation of formats and protocols

Steinberger, J., Sperotto, A., Golling, M. & Baier, H., 13 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 261-269 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
25 Citations (Scopus)
233 Downloads (Pure)

Impact of packet sampling on link dimensioning

de Oliveira Schmidt, R., Stadler, R. (ed.), Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Sep 2015, In : IEEE transactions on network and service management. 12, 3, p. 392-405 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)

Inside Booters: an analysis on operational databases

Cardoso de Santanna, J. J., Durban, R., Sperotto, A. & Pras, A., 11 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). USA: IEEE Computer Society, p. 432-440 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
18 Citations (Scopus)
325 Downloads (Pure)

Making the Case for Elliptic Curves in DNSSEC

van Rijswijk, R. M., Sperotto, A. & Pras, A., Oct 2015, In : Computer communication review. 45, 5, p. 13-19 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)

Measuring cloud service health using NetFlow/IPFIX: the WikiLeaks case

Drago, I., Hofstede, R. J., Sadre, R., Sperotto, A. & Pras, A., Jan 2015, In : Journal of network and systems management. 23, 1, p. 58-88 31 p.

Research output: Contribution to journalArticleAcademicpeer-review

Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

Jonker, M. & Sperotto, A., Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 129-133 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
110 Downloads (Pure)

Real-time DDoS attack detection for Cisco IOS using NetFlow

van der Steeg, D., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 972-977 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
101 Downloads (Pure)

Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)

Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P. & Celeda, P., Jul 2015, In : Journal of network and systems management. 23, 3, p. 794-802 9 p.

Research output: Contribution to journalArticleAcademic

File
3 Citations (Scopus)
87 Downloads (Pure)

The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., 18 Aug 2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015. New York: Association for Computing Machinery (ACM), p. 91-92 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
6 Citations (Scopus)
33 Downloads (Pure)

Unveiling Flat Traffic on the Internet: An SSH Attack Case Study

Jonker, M., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 270-278 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
72 Downloads (Pure)
2014

A hybrid procedure for efficient link dimensioning

de Oliveira Schmidt, R., Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Jul 2014, In : Computer networks. 67, p. 252-269 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
3 Citations (Scopus)
76 Downloads (Pure)

Characterisation of the Kelihos.B Botnet

Kerkers, M., Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 79-91 13 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
82 Downloads (Pure)

Characterizing and Mitigating the DDoS-as-a-Service Phenomenon

Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 74-78 5 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
130 Downloads (Pure)

DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

van Rijswijk, R. M., Sperotto, A. & Pras, A., Nov 2014, Proceedings of the Fourteenth ACM Internet Measurement Conference, ACM IMC 2014. New York: Association for Computing Machinery (ACM), p. 449-460 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
47 Citations (Scopus)
216 Downloads (Pure)

DNSSEC meets real world: dealing with unreachability caused by fragmentation

van den Broek, G., van Rijswijk-Deij, R., van Rijswijk, R. M., Sperotto, A. & Pras, A., Apr 2014, In : IEEE communications magazine. 52, 4, p. 154-160 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
12 Citations (Scopus)
66 Downloads (Pure)

Ethics in data sharing: developing a model for best practice

Dietrich, S., van der Ham, J., Pras, A., van Rijswijk-Deij, R., van Rijswijk, R. M., Shou, D., Sperotto, A., van Wynsberghe, A. L. & Zuck, L. D., 17 May 2014, Proceedings of the IEEE CS Security and Privacy Workshop on Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS). USA: IEEE Computer Society, p. 5-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
4 Citations (Scopus)
51 Downloads (Pure)