If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

2019

IoT-Botnet Detection and Isolation by Access Routers

Dietz, C., Castro, R. L., Steinberger, J., Wilczak, C., Antzek, M., Sperotto, A. & Pras, A., 3 Jan 2019, 2018 9th International Conference on the Network of the Future, NOF 2018. Idzikowski, F., Kliks, A., Rodziewicz, M., Tuncer, D. & Chemouil, P. (eds.). IEEE, p. 88-95 8 p. 8598138

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Routers
Botnet
Internet of things
Outages
Internet
2018

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild

Jonker, M., Pras, A., Dainotti, A. & Sperotto, A., 31 Oct 2018, Proceedings of the ACM Internet Measurement Conference 2018. p. 457-463 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

mitigation
401 Downloads (Pure)

DDoS Defense using MTD and SDN

Steinberger, J., Kuhnert, B., Dietz, C., Ball, L., Sperotto, A., Baier, H., Pras, A. & Dreo Rodosek, G., 2018. 9 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
159 Downloads (Pure)

Distributed DDoS Defense - A collaborative Approach at Internet Scale

Steinberger, J., 19 Sep 2018, University of Twente. 209 p.

Research output: ThesisPhD Thesis - Research UT, graduation UTAcademic

Open Access
File
1 Citation (Scopus)

Flow-Based Compromise Detection: Lessons Learned

Hofstede, R., Pras, A., Sperotto, A. & Dreo Rodosek, G., 16 Dec 2018, In : IEEE security & privacy. 16, 1, p. 82-89 8 p., 8283485.

Research output: Contribution to journalArticleAcademicpeer-review

Data flow analysis
compromise
Scalability
data analysis
privacy
2 Downloads (Pure)

Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains

van der Toorn, O. I., van Rijswijk, R. M., Geesink, B. & Sperotto, A., 24 Apr 2018, NOMS2018: the IEEE/IFIP Network Operations and Management Symposium. IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Electronic mail
Snow
Learning systems
Melting
2017
275 Downloads (Pure)

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A., 28 Jun 2017, ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
9 Citations (Scopus)

Challenges with Reproducibility

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J., Sperotto, A. & Trammell, B., 2017, p. 1-4. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Computer science
1 Citation (Scopus)
1 Downloads (Pure)

Flow-Based Web Application Brute-Force Attack and Compromise Detection

Hofstede, R., Jonker, M., Sperotto, A. & Pras, A., 2017, In : Journal of network and systems management. 25, 4, p. 735-758 24 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Intrusion detection
Information management
Servers
Network protocols
Monitoring
173 Downloads (Pure)

Improving DNS security: a measurement-based approach

van Rijswijk-Deij, R., 28 Jun 2017, Enschede: University of Twente. 227 p.

Research output: ThesisPhD Thesis - Research external, graduation UTAcademic

Open Access
File
Security systems
Cryptography
Internet
Amplification

Measuring exposure in DDoS protection services

Jonker, M. & Sperotto, A., 30 Nov 2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Websites
Outsourcing
Telecommunication traffic
Denial-of-service attack
11 Citations (Scopus)
2 Downloads (Pure)

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

Jonker, M., King, A., Krupp, J., Rossow, C., Sperotto, A. & Dainotti, A., 3 Nov 2017, p. 100-113.

Research output: Contribution to conferencePaperAcademicpeer-review

5 Citations (Scopus)
12 Downloads (Pure)

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation

van Rijswijk, R. M., Hageman, K., Sperotto, A. & Pras, A., Apr 2017, In : IEEE/ACM transactions on networking. 25, 2, p. 738-750

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Electronic document identification systems
Program processors
Computer systems
Switches
1 Citation (Scopus)

TIDE – Threat Identification using Active DNS Measurements

Sperotto, A., van der Toorn, O. & van Rijswijk, R., 22 Aug 2017, p. 65-67. 3 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Health
Internet
Denial-of-service attack
2016
24 Citations (Scopus)

A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., Jun 2016, In : IEEE journal on selected areas in communications. 34, 6, p. 1877-1888 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Collaborative DDoS Defense using Flow-based Security Event Information

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., Apr 2016, Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016. USA: IEEE Communications Society, p. 516-552 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
91 Downloads (Pure)

DDoS 3.0 - How Terrorists Bring Down the Internet

Pras, A., Cardoso de Santanna, J. J., Steinberger, J. & Sperotto, A., 4 Apr 2016, Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016. Remke, A. K. I. & Haverkort, B. R. H. M. (eds.). Berlin: Springer, p. 1-4 4 p. (Lecture Notes in Computer Science; vol. 9629).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
1 Citation (Scopus)
93 Downloads (Pure)

How to Achieve Early Botnet Detection at the Provider Level?

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016. London: Springer, p. 142-146 5 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
24 Downloads (Pure)

In Whom Do We Trust - Sharing Security Events

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., 21 Jun 2016, Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016). London: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
39 Downloads (Pure)

"LUDO" - Kids playing Distributed Denial of Service

Steinberger, J., Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U., Sperotto, A., Baier, H. & Pras, A., 15 Dec 2016, Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016). Bergström, J., Hórvath, G. & Schofield, B. (eds.). Sweden: EUNIS Research and Analysis Initiative, p. 3 15 p. (European Journal of Higher Education IT; vol. 2016-02).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
13 Citations (Scopus)
259 Downloads (Pure)

Measuring the Adoption of DDoS Protection Services

Jonker, M., Sperotto, A., van Rijswijk, R. M., Sadre, R. & Pras, A., 14 Nov 2016, Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016. New York, NY, USA: Association for Computing Machinery (ACM), p. 279-285 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
29 Downloads (Pure)

Monitoring the DNS Infrastructure for Proactive Botnet Detection

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016). Germany: Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI), p. 3-4 2 p. (SIDAR reports; vol. SR-2016-01).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
6 Citations (Scopus)
9 Downloads (Pure)

On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC

van Rijswijk, R. M., Jonker, M. & Sperotto, A., Nov 2016, p. 258-262. 5 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File
35 Downloads (Pure)

Proactive Botnet Detection and Defense at Internet scale

Dietz, C., Sperotto, A., Pras, A. & Dreo, G., Apr 2016. 1 p.

Research output: Contribution to conferencePosterOther research output

File

Real-time DDoS Defense: A collaborative Approach at Internet Scale

Steinberger, J., Sperotto, A., Pras, A. & Baier, H., 2016.

Research output: Contribution to conferencePosterOther research output

15 Downloads (Pure)

Whom do we trust - Booters and SSL/TLS certificates

Steinberger, J. (ed.), Kuhnert, B., Alavi, S., Cardoso de Santanna, J. J., Sperotto, A., Baier, H. & Pras, A., Jun 2016, p. 14-14. 1 p.

Research output: Contribution to conferenceAbstractOther research output

File
2015
2 Citations (Scopus)
38 Downloads (Pure)

A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX

van der Toorn, O. I., Hofstede, R. J., Jonker, M. & Sperotto, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 862-865 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
56 Citations (Scopus)
504 Downloads (Pure)

Booters - an analysis of DDoS-as-a-Service attacks

Cardoso de Santanna, J. J., van Rijswijk, R. M., Hofstede, R. J., Sperotto, A., Wierbosch, M., Zambenedetti Granville, L. & Pras, A., 11 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). 978-3-901882-76-0: IEEE Computer Society, p. 243 -251 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
104 Downloads (Pure)

Booter websites characterization: Towards a list of threats

Chromik, J. J., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., May 2015, Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015. Brazil: Brazilian Computer Society (SBC), p. 445-458 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
10 Downloads (Pure)

Characterizing the IPv6 Security Landscape by Large-Scale Measurements

Hendriks, L., Sperotto, A. & Pras, A., 22 Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Switzerland: Springer, p. 145-149 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
10 Citations (Scopus)
36 Downloads (Pure)

Collaborative Attack Mitigation and Response: A survey

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 14 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 910-913 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
22 Downloads (Pure)

Editorial special issue on measure, detect and mitigate – challenges and trends in network security

Sperotto, A., Hofstede, R. J., Dainotti, A., Schmitt, C. & Dreo Rodosek, G., Sep 2015, In : International journal of network management. 25, 5, p. 261-262 2 p.

Research output: Contribution to journalArticleAcademic

File
11 Downloads (Pure)

Exchanging security events of flow-based intrusion detection systems at internet scale

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 19 Jun 2015, Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015). USA: Internet Architecture Board Website, p. 3 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
97 Downloads (Pure)

How asymmetric is the Internet? A Study to Support the use of Traceroute

de Vries, W. B., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., Jun 2015, Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 113-125 13 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
17 Citations (Scopus)
185 Downloads (Pure)

How to exchange security events? Overview and evaluation of formats and protocols

Steinberger, J., Sperotto, A., Golling, M. & Baier, H., 13 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 261-269 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Impact of packet sampling on link dimensioning

de Oliveira Schmidt, R., Stadler, R. (ed.), Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Sep 2015, In : IEEE transactions on network and service management. 12, 3, p. 392-405 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

16 Citations (Scopus)
125 Downloads (Pure)

Inside Booters: an analysis on operational databases

Cardoso de Santanna, J. J., Durban, R., Sperotto, A. & Pras, A., 11 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). USA: IEEE Computer Society, p. 432-440 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)

Making the Case for Elliptic Curves in DNSSEC

van Rijswijk, R. M., Sperotto, A. & Pras, A., Oct 2015, In : Computer communication review. 45, 5, p. 13-19 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

Measuring cloud service health using NetFlow/IPFIX: the WikiLeaks case

Drago, I., Hofstede, R. J., Sadre, R., Sperotto, A. & Pras, A., Jan 2015, In : Journal of network and systems management. 23, 1, p. 58-88 31 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
70 Downloads (Pure)

Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

Jonker, M. & Sperotto, A., Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 129-133 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations (Scopus)
53 Downloads (Pure)

Real-time DDoS attack detection for Cisco IOS using NetFlow

van der Steeg, D., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 972-977 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
80 Downloads (Pure)

Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)

Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P. & Celeda, P., Jul 2015, In : Journal of network and systems management. 23, 3, p. 794-802 9 p.

Research output: Contribution to journalArticleAcademic

File
4 Citations (Scopus)
23 Downloads (Pure)

The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., 18 Aug 2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015. New York: Association for Computing Machinery (ACM), p. 91-92 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
28 Downloads (Pure)

Unveiling Flat Traffic on the Internet: An SSH Attack Case Study

Jonker, M., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 270-278 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2014
3 Citations (Scopus)
36 Downloads (Pure)

A hybrid procedure for efficient link dimensioning

de Oliveira Schmidt, R., Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Jul 2014, In : Computer networks. 67, p. 252-269 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
5 Citations (Scopus)
42 Downloads (Pure)

Characterisation of the Kelihos.B Botnet

Kerkers, M., Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 79-91 13 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
69 Downloads (Pure)

Characterizing and Mitigating the DDoS-as-a-Service Phenomenon

Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 74-78 5 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
38 Citations (Scopus)
63 Downloads (Pure)

DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

van Rijswijk, R. M., Sperotto, A. & Pras, A., Nov 2014, Proceedings of the Fourteenth ACM Internet Measurement Conference, ACM IMC 2014. New York: Association for Computing Machinery (ACM), p. 449-460 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Amplification
Electronic document identification systems
Denial-of-service attack
10 Citations (Scopus)
39 Downloads (Pure)

DNSSEC meets real world: dealing with unreachability caused by fragmentation

van den Broek, G., van Rijswijk-Deij, R., van Rijswijk, R. M., Sperotto, A. & Pras, A., Apr 2014, In : IEEE communications magazine. 52, 4, p. 154-160 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2 Citations (Scopus)
22 Downloads (Pure)

Ethics in data sharing: developing a model for best practice

Dietrich, S., van der Ham, J., Pras, A., van Rijswijk-Deij, R., van Rijswijk, R. M., Shou, D., Sperotto, A., van Wynsberghe, A. L. & Zuck, L. D., 17 May 2014, Proceedings of the IEEE CS Security and Privacy Workshop on Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS). USA: IEEE Computer Society, p. 5-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File