If you made any changes in Pure these will be visible here soon.

Research Output 2007 2018

Filter
Article
2018

Flow-Based Compromise Detection: Lessons Learned

Hofstede, R., Pras, A., Sperotto, A. & Dreo Rodosek, G., Jan 2018, In : IEEE security & privacy. 16, 1, p. 82-89

Research output: Contribution to journalArticleAcademicpeer-review

Data flow analysis
compromise
Scalability
data analysis
privacy
2017
2 Citations

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation

van Rijswijk, R. M., Hageman, K., Sperotto, A. & Pras, A., Apr 2017, In : IEEE/ACM transactions on networking. 25, 2, p. 738-750

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Electronic document identification systems
Program processors
Computer systems
Switches
2016
20 Citations

A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements

van Rijswijk, R. M., Jonker, M., Sperotto, A. & Pras, A., Jun 2016, In : IEEE journal on selected areas in communications. 34, 6, p. 1877-1888 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

2015

Editorial special issue on measure, detect and mitigate – challenges and trends in network security

Sperotto, A., Hofstede, R. J., Dainotti, A., Schmitt, C. & Dreo Rodosek, G., Sep 2015, In : International journal of network management. 25, 5, p. 261-262 2 p.

Research output: Contribution to journalArticleAcademic

File

Impact of packet sampling on link dimensioning

de Oliveira Schmidt, R., Stadler, R. (ed.), Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Sep 2015, In : IEEE transactions on network and service management. 12, 3, p. 392-405 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

7 Citations

Making the Case for Elliptic Curves in DNSSEC

van Rijswijk, R. M., Sperotto, A. & Pras, A., Oct 2015, In : Computer communication review. 45, 5, p. 13-19 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

Measuring cloud service health using NetFlow/IPFIX: the WikiLeaks case

Drago, I., Hofstede, R. J., Sadre, R., Sperotto, A. & Pras, A., Jan 2015, In : Journal of network and systems management. 23, 1, p. 58-88 31 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations

Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)

Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Famaey, J., Velan, P. & Celeda, P., Jul 2015, In : Journal of network and systems management. 23, 3, p. 794-802 9 p.

Research output: Contribution to journalArticleAcademic

File
2014
3 Citations

A hybrid procedure for efficient link dimensioning

de Oliveira Schmidt, R., Sadre, R., Sperotto, A., van den Berg, H. L. & Pras, A., Jul 2014, In : Computer networks. 67, p. 252-269 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
8 Citations

DNSSEC meets real world: dealing with unreachability caused by fragmentation

van den Broek, G., van Rijswijk-Deij, R., van Rijswijk, R. M., Sperotto, A. & Pras, A., Apr 2014, In : IEEE communications magazine. 52, 4, p. 154-160 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2 Citations

Flow-based approaches in network management: recent advances and future trends - Editorial

Sadre, R., Sperotto, A., Hofstede, R. J. & Brownlee, N., 29 Jun 2014, In : International journal of network management. 24, 4, p. 219-220 2 p.

Research output: Contribution to journalArticleAcademic

File
106 Citations

Flow monitoring explained: from packet capture to data analysis with NetFlow and IPFIX

Hofstede, R. J., Celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A. & Pras, A., Nov 2014, In : IEEE communications surveys & tutorials. 16, 4, p. 2037-2064 29 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
1 Citations

Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet

Doyen, G., Waldburger, M., Sperotto, A., Celeda, P., Gorricho, J-L., Schaaf, T. & Serrat, J., 1 Dec 2014, In : Journal of network and systems management. 22, 2, p. 289-296

Research output: Contribution to journalArticleAcademicpeer-review

Internet
Spain
World Wide Web
Tutorial
19 Citations

SSH Compromise Detection using NetFlow/IPFIX

Hofstede, R. J., Hendriks, L., Sperotto, A. & Pras, A., Oct 2014, In : Computer communication review. 44, 5, p. 20-26 7 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2013

Networking for the Cloud: Challenges and Trends

Drago, I., de Oliveira Schmidt, R., Hofstede, R. J., Sperotto, A., Karimzadeh Motallebi Azar, M., Haverkort, B. R. H. M. & Pras, A., 11 Dec 2013, In : PIK: Praxis der Informationsverarbeitung und Kommunikation. 36, 4, p. 207-214 8 p.

Research output: Contribution to journalArticleAcademic

2012
14 Citations

Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study

Sperotto, A., Mandjes, M. R. H., Sadre, R., de Boer, P-T. & Pras, A., Jun 2012, In : IEEE transactions on network and service management. 9, 2, p. 128-141 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2010

An Overview of IP Flow-Based Intrusion Detection

Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A. & Stiller, B., 2010, In : IEEE communications surveys & tutorials. 12, 3, p. 343-356 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
2009
10 Citations

Using NetFlow/IPFIX for Network Management

Pras, A., Sadre, R., Sperotto, A., Fioreze, T., Hausheer, D. & Schönwälder, J., 22 Nov 2009, In : Journal of network and systems management. 17, 4, p. 482-487 6 p., 10.1007/s10922-009-9138-0.

Research output: Contribution to journalArticleAcademic

File