If you made any changes in Pure these will be visible here soon.

Research Output 2007 2018

2018

DDoS Defense using MTD and SDN

Steinberger, J., Kuhnert, B., Dietz, C., Ball, L., Sperotto, A., Baier, H., Pras, A. & Dreo Rodosek, G., 2018. 9 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File

Distributed DDoS Defense - A collaborative Approach at Internet Scale

Steinberger, J., 19 Sep 2018, University of Twente. 209 p.

Research output: ThesisPhD Thesis - Research UT, graduation UTAcademic

Open Access
File

Flow-Based Compromise Detection: Lessons Learned

Hofstede, R., Pras, A., Sperotto, A. & Dreo Rodosek, G., Jan 2018, In : IEEE security & privacy. 16, 1, p. 82-89

Research output: Contribution to journalArticleAcademicpeer-review

Data flow analysis
compromise
Scalability
data analysis
privacy

Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains

van der Toorn, O. I., van Rijswijk, R. M., Geesink, B. & Sperotto, A., 24 Apr 2018, NOMS2018: the IEEE/IFIP Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Electronic mail
Snow
Learning systems
Melting
2017

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A., 28 Jun 2017, ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Citations

Challenges with Reproducibility

Bajpai, V., Kühlewind, M., Ott, J., Schoenwaelder, J., Sperotto, A. & Trammell, B., 2017, p. 1-4. 4 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Computer science

Improving DNS security: a measurement-based approach

van Rijswijk-Deij, R., 28 Jun 2017, Enschede: University of Twente. 227 p.

Research output: ThesisPhD Thesis - Research external, graduation UTAcademic

Open Access
File
Security systems
Cryptography
Internet
Amplification

Measuring exposure in DDoS protection services

Jonker, M. & Sperotto, A., 30 Nov 2017, 2017 13th International Conference on Network and Service Management (CNSM). Institute of Electrical and Electronics Engineers, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Websites
Outsourcing
Telecommunication traffic
Denial-of-service attack
3 Citations

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

Jonker, M., King, A., Krupp, J., Rossow, C., Sperotto, A. & Dainotti, A., 3 Nov 2017, p. 100-113.

Research output: Contribution to conferencePaperAcademicpeer-review

2 Citations

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation

van Rijswijk, R. M., Hageman, K., Sperotto, A. & Pras, A., Apr 2017, In : IEEE/ACM transactions on networking. 25, 2, p. 738-750

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Electronic document identification systems
Program processors
Computer systems
Switches
1 Citations

TIDE – Threat Identification using Active DNS Measurements

Sperotto, A., van der Toorn, O. & van Rijswijk, R., 22 Aug 2017, p. 65-67. 3 p.

Research output: Contribution to conferencePaperAcademicpeer-review

Health
Internet
Denial-of-service attack
2016
20 Citations

A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., Jun 2016, In : IEEE journal on selected areas in communications. 34, 6, p. 1877-1888 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations

Collaborative DDoS Defense using Flow-based Security Event Information

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., Apr 2016, Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016. USA: IEEE Communications Society, p. 516-552 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations

DDoS 3.0 - How Terrorists Bring Down the Internet

Pras, A., Cardoso de Santanna, J. J., Steinberger, J. & Sperotto, A., 4 Apr 2016, Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016. Remke, A. K. I. & Haverkort, B. R. H. M. (eds.). Berlin: Springer, p. 1-4 4 p. (Lecture Notes in Computer Science; vol. 9629).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
1 Citations

How to Achieve Early Botnet Detection at the Provider Level?

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016. London: Springer Verlag, p. 142-146 5 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citations

In Whom Do We Trust - Sharing Security Events

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., 21 Jun 2016, Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016). London: Springer Verlag, p. 111-124 14 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

"LUDO" - Kids playing Distributed Denial of Service

Steinberger, J., Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U., Sperotto, A., Baier, H. & Pras, A., 15 Dec 2016, Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016). Bergström, J., Hórvath, G. & Schofield, B. (eds.). Sweden: EUNIS Research and Analysis Initiative, p. 3 15 p. (European Journal of Higher Education IT; vol. 2016-02).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations

Measuring the Adoption of DDoS Protection Services

Jonker, M., Sperotto, A., van Rijswijk, R. M., Sadre, R. & Pras, A., 14 Nov 2016, Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016. New York, NY, USA: Association for Computing Machinery, p. 279-285 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Monitoring the DNS Infrastructure for Proactive Botnet Detection

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016). Germany: Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI), p. 3-4 2 p. (SIDAR reports; vol. SR-2016-01).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
4 Citations

On the Adoption of the Elliptic Curve Digital Signature Algorithm (ECDSA) in DNSSEC

van Rijswijk, R. M., Jonker, M. & Sperotto, A., Nov 2016, p. 258-262. 5 p.

Research output: Contribution to conferencePaperAcademicpeer-review

File

Proactive Botnet Detection and Defense at Internet scale

Dietz, C., Sperotto, A., Pras, A. & Dreo, G., Apr 2016. 1 p.

Research output: Contribution to conferencePosterOther research output

File

Real-time DDoS Defense: A collaborative Approach at Internet Scale

Steinberger, J., Sperotto, A., Pras, A. & Baier, H., 2016.

Research output: Contribution to conferencePosterOther research output

Whom do we trust - Booters and SSL/TLS certificates

Steinberger, J. (ed.), Kuhnert, B., Alavi, S., Cardoso de Santanna, J. J., Sperotto, A., Baier, H. & Pras, A., Jun 2016, p. 14-14. 1 p.

Research output: Contribution to conferenceAbstractOther research output

File
2015
2 Citations

A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX

van der Toorn, O. I., Hofstede, R. J., Jonker, M. & Sperotto, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 862-865 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
46 Citations

Booters - an analysis of DDoS-as-a-Service attacks

Cardoso de Santanna, J. J., van Rijswijk, R. M., Hofstede, R. J., Sperotto, A., Wierbosch, M., Zambenedetti Granville, L. & Pras, A., 11 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). 978-3-901882-76-0: IEEE Computer Society, p. 243 -251 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Booter websites characterization: Towards a list of threats

Chromik, J. J., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., May 2015, Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015. Brazil: Brazilian Computer Society (SBC), p. 445-458 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citations

Characterizing the IPv6 Security Landscape by Large-Scale Measurements

Hendriks, L., Sperotto, A. & Pras, A., 22 Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Switzerland: Springer International Publishing, p. 145-149 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations

Collaborative Attack Mitigation and Response: A survey

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 14 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 910-913 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Editorial special issue on measure, detect and mitigate – challenges and trends in network security

Sperotto, A., Hofstede, R. J., Dainotti, A., Schmitt, C. & Dreo Rodosek, G., Sep 2015, In : International journal of network management. 25, 5, p. 261-262 2 p.

Research output: Contribution to journalArticleAcademic

File

Exchanging security events of flow-based intrusion detection systems at internet scale

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 19 Jun 2015, Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015). USA: Internet Architecture Board Website, p. 3 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citations

How asymmetric is the Internet? A Study to Support the use of Traceroute

de Vries, W. B., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., Jun 2015, Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 113-125 13 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations

How to exchange security events? Overview and evaluation of formats and protocols

Steinberger, J., Sperotto, A., Golling, M. & Baier, H., 13 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 261-269 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Impact of packet sampling on link dimensioning

de Oliveira Schmidt, R., Stadler, R. (ed.), Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Sep 2015, In : IEEE transactions on network and service management. 12, 3, p. 392-405 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

16 Citations

Inside Booters: an analysis on operational databases

Cardoso de Santanna, J. J., Durban, R., Sperotto, A. & Pras, A., 11 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). USA: IEEE Computer Society, p. 432-440 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations

Making the Case for Elliptic Curves in DNSSEC

van Rijswijk, R. M., Sperotto, A. & Pras, A., Oct 2015, In : Computer communication review. 45, 5, p. 13-19 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

Measuring cloud service health using NetFlow/IPFIX: the WikiLeaks case

Drago, I., Hofstede, R. J., Sadre, R., Sperotto, A. & Pras, A., Jan 2015, In : Journal of network and systems management. 23, 1, p. 58-88 31 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citations

Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

Jonker, M. & Sperotto, A., Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer International Publishing, p. 129-133 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations

Real-time DDoS attack detection for Cisco IOS using NetFlow

van der Steeg, D., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 972-977 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations

Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)

Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P. & Celeda, P., Jul 2015, In : Journal of network and systems management. 23, 3, p. 794-802 9 p.

Research output: Contribution to journalArticleAcademic

File
4 Citations

The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., 18 Aug 2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015. New York: Association for Computing Machinery, p. 91-92 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations

Unveiling Flat Traffic on the Internet: An SSH Attack Case Study

Jonker, M., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 270-278 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2014
3 Citations

A hybrid procedure for efficient link dimensioning

de Oliveira Schmidt, R., Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Jul 2014, In : Computer networks. 67, p. 252-269 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
5 Citations

Characterisation of the Kelihos.B Botnet

Kerkers, M., Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 79-91 13 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations

Characterizing and Mitigating the DDoS-as-a-Service Phenomenon

Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 74-78 5 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
32 Citations

DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

van Rijswijk, R. M., Sperotto, A. & Pras, A., Nov 2014, Proceedings of the Fourteenth ACM Internet Measurement Conference, ACM IMC 2014. New York: Association for Computing Machinery, p. 449-460 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Amplification
Electronic document identification systems
Denial-of-service attack
8 Citations

DNSSEC meets real world: dealing with unreachability caused by fragmentation

van den Broek, G., van Rijswijk-Deij, R., van Rijswijk, R. M., Sperotto, A. & Pras, A., Apr 2014, In : IEEE communications magazine. 52, 4, p. 154-160 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2 Citations

Ethics in data sharing: developing a model for best practice

Dietrich, S., van der Ham, J., Pras, A., van Rijswijk-Deij, R., van Rijswijk, R. M., Shou, D., Sperotto, A., van Wynsberghe, A. L. & Zuck, L. D., 17 May 2014, Proceedings of the IEEE CS Security and Privacy Workshop on Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS). USA: IEEE Computer Society, p. 5-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
2 Citations

Flow-based approaches in network management: recent advances and future trends - Editorial

Sadre, R., Sperotto, A., Hofstede, R. J. & Brownlee, N., 29 Jun 2014, In : International journal of network management. 24, 4, p. 219-220 2 p.

Research output: Contribution to journalArticleAcademic

File
106 Citations

Flow monitoring explained: from packet capture to data analysis with NetFlow and IPFIX

Hofstede, R. J., Celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A. & Pras, A., Nov 2014, In : IEEE communications surveys & tutorials. 16, 4, p. 2037-2064 29 p.

Research output: Contribution to journalArticleAcademicpeer-review

File

Large-scale DNS and DNSSEC data sets for network security research

van Rijswijk, R. M., Sperotto, A. & Pras, A., Sep 2014, Enschede: Centre for Telematics and Information Technology (CTIT). 10 p. (CTIT Technical Report Series; no. TR-CTIT-14-13)

Research output: Book/ReportReportProfessional

File