If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

Filter
Conference contribution
2019

IoT-Botnet Detection and Isolation by Access Routers

Dietz, C., Castro, R. L., Steinberger, J., Wilczak, C., Antzek, M., Sperotto, A. & Pras, A., 3 Jan 2019, 2018 9th International Conference on the Network of the Future, NOF 2018. Idzikowski, F., Kliks, A., Rodziewicz, M., Tuncer, D. & Chemouil, P. (eds.). IEEE, p. 88-95 8 p. 8598138

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Routers
Botnet
Internet of things
Outages
Internet
2018

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild

Jonker, M., Pras, A., Dainotti, A. & Sperotto, A., 31 Oct 2018, Proceedings of the ACM Internet Measurement Conference 2018. p. 457-463 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

mitigation
2 Downloads (Pure)

Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains

van der Toorn, O. I., van Rijswijk, R. M., Geesink, B. & Sperotto, A., 24 Apr 2018, NOMS2018: the IEEE/IFIP Network Operations and Management Symposium. IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Electronic mail
Snow
Learning systems
Melting
2017
275 Downloads (Pure)

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A., 28 Jun 2017, ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File

Measuring exposure in DDoS protection services

Jonker, M. & Sperotto, A., 30 Nov 2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Websites
Outsourcing
Telecommunication traffic
Denial-of-service attack
2016
4 Citations (Scopus)

Collaborative DDoS Defense using Flow-based Security Event Information

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., Apr 2016, Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016. USA: IEEE Communications Society, p. 516-552 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
91 Downloads (Pure)

DDoS 3.0 - How Terrorists Bring Down the Internet

Pras, A., Cardoso de Santanna, J. J., Steinberger, J. & Sperotto, A., 4 Apr 2016, Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016. Remke, A. K. I. & Haverkort, B. R. H. M. (eds.). Berlin: Springer, p. 1-4 4 p. (Lecture Notes in Computer Science; vol. 9629).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
1 Citation (Scopus)
93 Downloads (Pure)

How to Achieve Early Botnet Detection at the Provider Level?

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016. London: Springer, p. 142-146 5 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
3 Citations (Scopus)
24 Downloads (Pure)

In Whom Do We Trust - Sharing Security Events

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., 21 Jun 2016, Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016). London: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
39 Downloads (Pure)

"LUDO" - Kids playing Distributed Denial of Service

Steinberger, J., Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U., Sperotto, A., Baier, H. & Pras, A., 15 Dec 2016, Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016). Bergström, J., Hórvath, G. & Schofield, B. (eds.). Sweden: EUNIS Research and Analysis Initiative, p. 3 15 p. (European Journal of Higher Education IT; vol. 2016-02).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
13 Citations (Scopus)
259 Downloads (Pure)

Measuring the Adoption of DDoS Protection Services

Jonker, M., Sperotto, A., van Rijswijk, R. M., Sadre, R. & Pras, A., 14 Nov 2016, Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016. New York, NY, USA: Association for Computing Machinery (ACM), p. 279-285 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
29 Downloads (Pure)

Monitoring the DNS Infrastructure for Proactive Botnet Detection

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016). Germany: Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI), p. 3-4 2 p. (SIDAR reports; vol. SR-2016-01).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
2015
2 Citations (Scopus)
38 Downloads (Pure)

A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX

van der Toorn, O. I., Hofstede, R. J., Jonker, M. & Sperotto, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 862-865 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
56 Citations (Scopus)
504 Downloads (Pure)

Booters - an analysis of DDoS-as-a-Service attacks

Cardoso de Santanna, J. J., van Rijswijk, R. M., Hofstede, R. J., Sperotto, A., Wierbosch, M., Zambenedetti Granville, L. & Pras, A., 11 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). 978-3-901882-76-0: IEEE Computer Society, p. 243 -251 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
104 Downloads (Pure)

Booter websites characterization: Towards a list of threats

Chromik, J. J., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., May 2015, Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015. Brazil: Brazilian Computer Society (SBC), p. 445-458 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
10 Downloads (Pure)

Characterizing the IPv6 Security Landscape by Large-Scale Measurements

Hendriks, L., Sperotto, A. & Pras, A., 22 Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Switzerland: Springer, p. 145-149 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
10 Citations (Scopus)
36 Downloads (Pure)

Collaborative Attack Mitigation and Response: A survey

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 14 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 910-913 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
11 Downloads (Pure)

Exchanging security events of flow-based intrusion detection systems at internet scale

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 19 Jun 2015, Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015). USA: Internet Architecture Board Website, p. 3 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
97 Downloads (Pure)

How asymmetric is the Internet? A Study to Support the use of Traceroute

de Vries, W. B., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., Jun 2015, Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 113-125 13 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
17 Citations (Scopus)
185 Downloads (Pure)

How to exchange security events? Overview and evaluation of formats and protocols

Steinberger, J., Sperotto, A., Golling, M. & Baier, H., 13 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 261-269 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
16 Citations (Scopus)
125 Downloads (Pure)

Inside Booters: an analysis on operational databases

Cardoso de Santanna, J. J., Durban, R., Sperotto, A. & Pras, A., 11 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). USA: IEEE Computer Society, p. 432-440 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citation (Scopus)
70 Downloads (Pure)

Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

Jonker, M. & Sperotto, A., Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 129-133 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations (Scopus)
53 Downloads (Pure)

Real-time DDoS attack detection for Cisco IOS using NetFlow

van der Steeg, D., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 972-977 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
23 Downloads (Pure)

The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., 18 Aug 2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015. New York: Association for Computing Machinery (ACM), p. 91-92 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
28 Downloads (Pure)

Unveiling Flat Traffic on the Internet: An SSH Attack Case Study

Jonker, M., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 270-278 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2014
5 Citations (Scopus)
42 Downloads (Pure)

Characterisation of the Kelihos.B Botnet

Kerkers, M., Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 79-91 13 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
69 Downloads (Pure)

Characterizing and Mitigating the DDoS-as-a-Service Phenomenon

Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 74-78 5 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
38 Citations (Scopus)
63 Downloads (Pure)

DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

van Rijswijk, R. M., Sperotto, A. & Pras, A., Nov 2014, Proceedings of the Fourteenth ACM Internet Measurement Conference, ACM IMC 2014. New York: Association for Computing Machinery (ACM), p. 449-460 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Amplification
Electronic document identification systems
Denial-of-service attack
2 Citations (Scopus)
22 Downloads (Pure)

Ethics in data sharing: developing a model for best practice

Dietrich, S., van der Ham, J., Pras, A., van Rijswijk-Deij, R., van Rijswijk, R. M., Shou, D., Sperotto, A., van Wynsberghe, A. L. & Zuck, L. D., 17 May 2014, Proceedings of the IEEE CS Security and Privacy Workshop on Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS). USA: IEEE Computer Society, p. 5-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
14 Downloads (Pure)

Real-time DDoS defense: a collaborative approach at internet scale

Steinberger, J., Sperotto, A., Pras, A. & Baier, H., 19 May 2014, Trans-European Research and Education Networking Association (TNC 2014). Amsterdam: GEANT Association, p. 133 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
18 Downloads (Pure)

ReFlow: Reports on Internet Traffic

Hoogesteger, M., de Oliveira Schmidt, R., Sperotto, A. & Pras, A., May 2014, TERENA Networking Conference. Amsterdam, the Netherlands: TERENA, p. - 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
Statistics
Internet
Websites
Students
Feedback
4 Citations (Scopus)
16 Downloads (Pure)

Software defined networking to improve mobility management performance

Karimzadeh Motallebi Azar, M., Sperotto, A. & Pras, A., 1 Jul 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin: Springer, p. 118-122 5 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
43 Downloads (Pure)

SSHCure: SSH Intrusion Detection using NetFlow and IPFIX

Hendriks, L., Hofstede, R. J., Sperotto, A. & Pras, A., May 2014, TERENA Networking Conference 2014. Amsterdam: Trans-European Research and Education Networking Association, p. 22 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Intrusion detection
Visualization
4 Citations (Scopus)
32 Downloads (Pure)

Towards validation of the Internet Census 2012

Maan, D., Cardoso de Santanna, J. J., Sperotto, A. & de Boer, P-T., 1 Dec 2014, Proceedings of the 20th EUNICE/IFIP Workshop on Advances in Communication Networking, Revised Selected Papers. Kermarrec, Y. (ed.). London: Springer, p. 85-96 12 p. (Lecture Notes in Computer Science; vol. 8846).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2013
8 Citations (Scopus)
37 Downloads (Pure)

Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection

Moreira Moura, G., Sperotto, A., Sadre, R. & Pras, A., May 2013, Proceedings of IFIP/IEEE International Symposium on Integrated Network Management 2013. Seon Hong, C., Diao, Y. & De Turk, F. (eds.). USA: IEEE Communications Society, p. 252-259 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations (Scopus)
22 Downloads (Pure)

Lightweight link dimensioning using sFlow sampling

de Oliveira Schmidt, R., Sadre, R., Sperotto, A. & Pras, A., 14 Oct 2013, Proceedings of the 9th International Conference on Network and Services Management (CNSM 2013). USA: IEEE Computer Society, p. 152-155 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
12 Citations (Scopus)
199 Downloads (Pure)

Measurement Artifacts in NetFlow Data

Hofstede, R. J., Drago, I., Sperotto, A., Sadre, R. & Pras, A., Mar 2013, 14th International Conference on Passive and Active Measurement, PAM 2013. Roughan, M. & Chang, R. (eds.). Berlin: Springer, p. 1-10 10 p. (Lecture Notes in Computer Science; vol. 7799).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
23 Downloads (Pure)

Reports on internet traffic statistics

Hoogesteger, M., de Oliveira Schmidt, R., Sperotto, A. & Pras, A., 3 Jun 2013, TERENA Networking Conference, TNC 2013. Maastricht, The Netherlands: Trans-European Research and Education Networking Association, p. 19 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
21 Citations (Scopus)
72 Downloads (Pure)

Towards real-time intrusion detection for NetFlow and IPFIX

Hofstede, R. J., Bartos, V., Sperotto, A. & Pras, A., Oct 2013, Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013. USA: IEEE Computer Society, p. 227-234 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2012
32 Downloads (Pure)

Improving Response Deliverability in DNS(SEC)

van den Broek, G., van Rijswijk, R., van Rijswijk, R. M., Pras, A. & Sperotto, A., May 2012, TERENA Networking Conference 2012. Amsterdam, The Netherlands: Trans-European Research and Education Networking Association, p. - 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
Internet
219 Citations (Scopus)
1442 Downloads (Pure)

Inside Dropbox: Understanding Personal Cloud Storage Services

Drago, I., Mellia, M., Munafò, M. M., Sperotto, A., Sadre, R. & Pras, A., Nov 2012, Proceedings of the 2012 ACM Conference on Internet measurement, IMC 2012. New York: Association for Computing Machinery (ACM), p. 481-494 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations (Scopus)
17 Downloads (Pure)

Internet Bad Neighborhoods Aggregation

Moreira Moura, G., Sadre, R., Sperotto, A. & Pras, A., Apr 2012, Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS 2012). Paschoal Gaspary, L. & De Turk, F. (eds.). USA: IEEE Communications Society, p. 343-350 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
33 Citations (Scopus)
48 Downloads (Pure)

SSHCure: A Flow-Based SSH Intrusion Detection System

Hellemons, L., Hendriks, L., Hendriks, L., Hofstede, R. J., Sperotto, A., Sadre, R. & Pras, A., Jun 2012, Proceedings of the 6th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2012). Berlin: Springer, p. 86-97 12 p. (Lecture Notes in Computer Science; vol. 7279).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
13 Citations (Scopus)

The effects of DDoS attacks on flow monitoring applications

Sadre, R., Sperotto, A. & Pras, A., Apr 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium (NOMS 2012). USA: IEEE Computer Society, p. 269-277 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
9 Downloads (Pure)

Towards Bandwidth Estimation Using Flow-Level Measurements

de Oliveira Schmidt, R., Sperotto, A. & Pras, A., Jun 2012, 6th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012. Sadre, R., Novotny, J., Celeda, P., Waldburger, M. & Stiller, B. (eds.). Berlin: Springer, p. 127-138 12 p. (Lecture Notes in Computer Science; vol. 7279/2012).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2011
32 Downloads (Pure)

Ethernet Flow Monitoring with IPFIX

Hofstede, R. J., Drago, I., Sperotto, A. & Pras, A., May 2011, TERENA Networking Conference 2011. Amsterdam: Trans-European Research and Education Networking Association, p. 23 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Ethernet
Monitoring
Next generation networks
Telecommunication traffic
Managers
25 Citations (Scopus)
28 Downloads (Pure)

Flow-Based Intrusion Detection

Sperotto, A. & Pras, A., May 2011, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. USA: IEEE Communications Society, p. 958-963 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
12 Downloads (Pure)

Flow Monitoring Experiences at the Ethernet-Layer

Hofstede, R., Hofstede, R. J., Drago, I., Sperotto, A. & Pras, A., 24 Aug 2011, Proceedings of the 17th EUNICE Workshop on Energy-Aware Communications. Lehnert, R. (ed.). Berlin: Springer, p. 129-140 12 p. (Lecture Notes in Computer Science; vol. 6955).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2010
11 Citations (Scopus)
11 Downloads (Pure)

The Network Data Handling War: MySQL vs. NfDump

Hofstede, R., Hofstede, R. J., Sperotto, A., Fioreze, T. & Pras, A., Jun 2010, 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management. Berlin: Springer, p. 167-176 10 p. 10.1007/978-3-642-13971-0_16. (Lecture Notes in Computer Science; vol. 6164).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2009
62 Citations (Scopus)
226 Downloads (Pure)

A Labeled Data Set For Flow-based Intrusion Detection

Sperotto, A., Sadre, R., van Vliet, F. & Pras, A., 21 Oct 2009, IP Operations and Management: 9th IEEE International Workshop, IPOM 2009, Venice, Italy, October 29-30, 2009. Proceedings. Nunzi, G., Scoglio, C. & Li, X. (eds.). Berlin: Springer, p. 39-50 12 p. (Lecture Notes in Computer Science; vol. 5843).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Intrusion detection
HIgh speed networks
Benchmarking
Labeling
Tuning