If you made any changes in Pure these will be visible here soon.

Research Output 2007 2018

Filter
Conference contribution
2018

Melting the Snow: Using Active DNS Measurements to Detect Snowshoe Spam Domains

van der Toorn, O. I., van Rijswijk, R. M., Geesink, B. & Sperotto, A., 24 Apr 2018, NOMS2018: the IEEE/IFIP Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Electronic mail
Snow
Learning systems
Melting
2017

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A., 28 Jun 2017, ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File

Measuring exposure in DDoS protection services

Jonker, M. & Sperotto, A., 30 Nov 2017, 2017 13th International Conference on Network and Service Management (CNSM). Institute of Electrical and Electronics Engineers, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Websites
Outsourcing
Telecommunication traffic
Denial-of-service attack
2016
3 Citations

Collaborative DDoS Defense using Flow-based Security Event Information

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., Apr 2016, Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016. USA: IEEE Communications Society, p. 516-552 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations

DDoS 3.0 - How Terrorists Bring Down the Internet

Pras, A., Cardoso de Santanna, J. J., Steinberger, J. & Sperotto, A., 4 Apr 2016, Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016. Remke, A. K. I. & Haverkort, B. R. H. M. (eds.). Berlin: Springer, p. 1-4 4 p. (Lecture Notes in Computer Science; vol. 9629).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
1 Citations

How to Achieve Early Botnet Detection at the Provider Level?

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016. London: Springer Verlag, p. 142-146 5 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citations

In Whom Do We Trust - Sharing Security Events

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., 21 Jun 2016, Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016). London: Springer Verlag, p. 111-124 14 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

"LUDO" - Kids playing Distributed Denial of Service

Steinberger, J., Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U., Sperotto, A., Baier, H. & Pras, A., 15 Dec 2016, Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016). Bergström, J., Hórvath, G. & Schofield, B. (eds.). Sweden: EUNIS Research and Analysis Initiative, p. 3 15 p. (European Journal of Higher Education IT; vol. 2016-02).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations

Measuring the Adoption of DDoS Protection Services

Jonker, M., Sperotto, A., van Rijswijk, R. M., Sadre, R. & Pras, A., 14 Nov 2016, Proceedings of the 2016 ACM Internet Measurement Conference, IMC 2016. New York, NY, USA: Association for Computing Machinery, p. 279-285 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Monitoring the DNS Infrastructure for Proactive Botnet Detection

Dietz, C., Sperotto, A., Dreo, G. & Pras, A., Jun 2016, Proceedings of the 11th SPRING graduate workshop of the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) (SPRING 2016). Germany: Special interest group Security - Intrusion Detection and Response (SIDAR) German Informatics Society (GI), p. 3-4 2 p. (SIDAR reports; vol. SR-2016-01).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
2015
2 Citations

A First Look at HTTP(S) Intrusion Detection using NetFlow/IPFIX

van der Toorn, O. I., Hofstede, R. J., Jonker, M. & Sperotto, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 862-865 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
46 Citations

Booters - an analysis of DDoS-as-a-Service attacks

Cardoso de Santanna, J. J., van Rijswijk, R. M., Hofstede, R. J., Sperotto, A., Wierbosch, M., Zambenedetti Granville, L. & Pras, A., 11 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). 978-3-901882-76-0: IEEE Computer Society, p. 243 -251 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Booter websites characterization: Towards a list of threats

Chromik, J. J., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., May 2015, Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015. Brazil: Brazilian Computer Society (SBC), p. 445-458 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citations

Characterizing the IPv6 Security Landscape by Large-Scale Measurements

Hendriks, L., Sperotto, A. & Pras, A., 22 Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Switzerland: Springer International Publishing, p. 145-149 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations

Collaborative Attack Mitigation and Response: A survey

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 14 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 910-913 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Exchanging security events of flow-based intrusion detection systems at internet scale

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 19 Jun 2015, Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015). USA: Internet Architecture Board Website, p. 3 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citations

How asymmetric is the Internet? A Study to Support the use of Traceroute

de Vries, W. B., Cardoso de Santanna, J. J., Sperotto, A. & Pras, A., Jun 2015, Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer, p. 113-125 13 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations

How to exchange security events? Overview and evaluation of formats and protocols

Steinberger, J., Sperotto, A., Golling, M. & Baier, H., 13 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 261-269 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
16 Citations

Inside Booters: an analysis on operational databases

Cardoso de Santanna, J. J., Durban, R., Sperotto, A. & Pras, A., 11 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Badonnel, R., Xiao, J., Ata, S., De Turck, F., Groza, V. & dos Santos, C. R. P. (eds.). USA: IEEE Computer Society, p. 432-440 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Citations

Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

Jonker, M. & Sperotto, A., Jun 2015, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015. Latré, S., Charalambides, M., François, J., Schmitt, C. & Stiller, B. (eds.). Switzerland: Springer International Publishing, p. 129-133 5 p. (Lecture Notes in Computer Science; vol. 9122).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations

Real-time DDoS attack detection for Cisco IOS using NetFlow

van der Steeg, D., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 972-977 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations

The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., 18 Aug 2015, Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015. New York: Association for Computing Machinery, p. 91-92 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations

Unveiling Flat Traffic on the Internet: An SSH Attack Case Study

Jonker, M., Hofstede, R. J., Sperotto, A. & Pras, A., May 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Communications Society, p. 270-278 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2014
5 Citations

Characterisation of the Kelihos.B Botnet

Kerkers, M., Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 79-91 13 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
8 Citations

Characterizing and Mitigating the DDoS-as-a-Service Phenomenon

Cardoso de Santanna, J. J. & Sperotto, A., 30 Jun 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014. Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin Heidelberg: Springer, p. 74-78 5 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
32 Citations

DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

van Rijswijk, R. M., Sperotto, A. & Pras, A., Nov 2014, Proceedings of the Fourteenth ACM Internet Measurement Conference, ACM IMC 2014. New York: Association for Computing Machinery, p. 449-460 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Amplification
Electronic document identification systems
Denial-of-service attack
2 Citations

Ethics in data sharing: developing a model for best practice

Dietrich, S., van der Ham, J., Pras, A., van Rijswijk-Deij, R., van Rijswijk, R. M., Shou, D., Sperotto, A., van Wynsberghe, A. L. & Zuck, L. D., 17 May 2014, Proceedings of the IEEE CS Security and Privacy Workshop on Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS). USA: IEEE Computer Society, p. 5-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File

Real-time DDoS defense: a collaborative approach at internet scale

Steinberger, J., Sperotto, A., Pras, A. & Baier, H., 19 May 2014, Trans-European Research and Education Networking Association (TNC 2014). Amsterdam: GEANT Association, p. 133 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

ReFlow: Reports on Internet Traffic

Hoogesteger, M., de Oliveira Schmidt, R., Sperotto, A. & Pras, A., May 2014, TERENA Networking Conference. Amsterdam, the Netherlands: TERENA, p. - 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
Statistics
Internet
Websites
Students
Feedback
3 Citations

Software defined networking to improve mobility management performance

Karimzadeh Motallebi Azar, M., Sperotto, A. & Pras, A., 1 Jul 2014, Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). Sperotto, A., Doyen, G., Latré, S., Charalambides, M. & Stiller, B. (eds.). Berlin: Springer, p. 118-122 5 p. (Lecture Notes in Computer Science; vol. 8508).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

SSHCure: SSH Intrusion Detection using NetFlow and IPFIX

Hendriks, L., Hofstede, R. J., Sperotto, A. & Pras, A., May 2014, TERENA Networking Conference 2014. Amsterdam: Trans-European Research and Education Networking Association, p. 22 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Intrusion detection
Visualization
3 Citations

Towards validation of the Internet Census 2012

Maan, D., Cardoso de Santanna, J. J., Sperotto, A. & de Boer, P-T., 1 Dec 2014, Proceedings of the 20th EUNICE/IFIP Workshop on Advances in Communication Networking, Revised Selected Papers. Kermarrec, Y. (ed.). London: Springer Verlag, p. 85-96 12 p. (Lecture Notes in Computer Science; vol. 8846).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2013
8 Citations

Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection

Moreira Moura, G., Sperotto, A., Sadre, R. & Pras, A., May 2013, Proceedings of IFIP/IEEE International Symposium on Integrated Network Management 2013. Seon Hong, C., Diao, Y. & De Turk, F. (eds.). USA: IEEE Communications Society, p. 252-259 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
4 Citations

Lightweight link dimensioning using sFlow sampling

de Oliveira Schmidt, R., Sadre, R., Sperotto, A. & Pras, A., 14 Oct 2013, Proceedings of the 9th International Conference on Network and Services Management (CNSM 2013). USA: IEEE Computer Society, p. 152-155 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
11 Citations

Measurement Artifacts in NetFlow Data

Hofstede, R. J., Drago, I., Sperotto, A., Sadre, R. & Pras, A., Mar 2013, 14th International Conference on Passive and Active Measurement, PAM 2013. Roughan, M. & Chang, R. (eds.). Berlin: Springer Verlag, p. 1-10 10 p. (Lecture Notes in Computer Science; vol. 7799).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Reports on internet traffic statistics

Hoogesteger, M., de Oliveira Schmidt, R., Sperotto, A. & Pras, A., 3 Jun 2013, TERENA Networking Conference, TNC 2013. Maastricht, The Netherlands: Trans-European Research and Education Networking Association, p. 19 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
19 Citations

Towards real-time intrusion detection for NetFlow and IPFIX

Hofstede, R. J., Bartos, V., Sperotto, A. & Pras, A., Oct 2013, Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013. USA: IEEE Computer Society, p. 227-234 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2012

Improving Response Deliverability in DNS(SEC)

van den Broek, G., van Rijswijk, R., van Rijswijk, R. M., Pras, A. & Sperotto, A., May 2012, TERENA Networking Conference 2012. Amsterdam, The Netherlands: Trans-European Research and Education Networking Association, p. - 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
Internet
203 Citations

Inside Dropbox: Understanding Personal Cloud Storage Services

Drago, I., Mellia, M., Munafò, M. M., Sperotto, A., Sadre, R. & Pras, A., Nov 2012, Proceedings of the 2012 ACM Conference on Internet measurement, IMC 2012. New York: Association for Computing Machinery, p. 481-494 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
7 Citations

Internet Bad Neighborhoods Aggregation

Moreira Moura, G., Sadre, R., Sperotto, A. & Pras, A., Apr 2012, Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS 2012). Paschoal Gaspary, L. & De Turk, F. (eds.). USA: IEEE Communications Society, p. 343-350 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
30 Citations

SSHCure: A Flow-Based SSH Intrusion Detection System

Hellemons, L., Hendriks, L., Hendriks, L., Hofstede, R. J., Sperotto, A., Sadre, R. & Pras, A., Jun 2012, Proceedings of the 6th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2012). Berlin: Springer Verlag, p. 86-97 12 p. (Lecture Notes in Computer Science; vol. 7279).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
13 Citations

The effects of DDoS attacks on flow monitoring applications

Sadre, R., Sperotto, A. & Pras, A., Apr 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium (NOMS 2012). USA: IEEE Computer Society, p. 269-277 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations

Towards Bandwidth Estimation Using Flow-Level Measurements

de Oliveira Schmidt, R., Sperotto, A. & Pras, A., Jun 2012, 6th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012. Sadre, R., Novotny, J., Celeda, P., Waldburger, M. & Stiller, B. (eds.). Berlin: Springer Verlag, p. 127-138 12 p. (Lecture Notes in Computer Science; vol. 7279/2012).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2011

Ethernet Flow Monitoring with IPFIX

Hofstede, R. J., Drago, I., Sperotto, A. & Pras, A., May 2011, TERENA Networking Conference 2011. Amsterdam: Trans-European Research and Education Networking Association, p. 23 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
Ethernet
Monitoring
Next generation networks
Telecommunication traffic
Managers
23 Citations

Flow-Based Intrusion Detection

Sperotto, A. & Pras, A., May 2011, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. USA: IEEE Communications Society, p. 958-963 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations

Flow Monitoring Experiences at the Ethernet-Layer

Hofstede, R., Hofstede, R. J., Drago, I., Sperotto, A. & Pras, A., 24 Aug 2011, Proceedings of the 17th EUNICE Workshop on Energy-Aware Communications. Lehnert, R. (ed.). Berlin: Springer Verlag, p. 129-140 12 p. (Lecture Notes in Computer Science; vol. 6955).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2010
11 Citations

The Network Data Handling War: MySQL vs. NfDump

Hofstede, R., Hofstede, R. J., Sperotto, A., Fioreze, T. & Pras, A., Jun 2010, 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management. Berlin: Springer Verlag, p. 167-176 10 p. 10.1007/978-3-642-13971-0_16. (Lecture Notes in Computer Science; vol. 6164).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2009
58 Citations

A Labeled Data Set For Flow-based Intrusion Detection

Sperotto, A., Sadre, R., van Vliet, F. & Pras, A., 21 Oct 2009, IP Operations and Management: 9th IEEE International Workshop, IPOM 2009, Venice, Italy, October 29-30, 2009. Proceedings. Nunzi, G., Scoglio, C. & Li, X. (eds.). Berlin: Springer, p. 39-50 12 p. (Lecture Notes in Computer Science; vol. 5843).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Intrusion detection
HIgh speed networks
Benchmarking
Labeling
Tuning
10 Citations

Detecting Spam at the Network Level

Sperotto, A., Vliek, G., Sadre, R. & Pras, A., 26 Aug 2009, Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009. Berlin: Springer Verlag, p. 208-216 9 p. 10.1007/978-3-642-03700-9_22. (Lecture Notes in Computer Science; vol. 5733).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
28 Citations

Hidden Markov Model modeling of SSH brute-force attacks

Sperotto, A., Sadre, R., de Boer, P-T. & Pras, A., 21 Oct 2009, Integrated Management of Systems, Services, Processes and People in IT, Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009. Berlin: Springer Verlag, p. 164-176 13 p. 10.1007/978-3-642-04989-7_13. (Lecture Notes in Computer Science; vol. 5841/2009).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File