20132018
If you made any changes in Pure these will be visible here soon.

Research Output 2013 2018

Filter
Conference contribution
2017

Booters and Certificates: An Overview of TLS in the DDoS-as-a-Service Landscape

Kuhnert, B., Steinberger, J., Baier, H., Sperotto, A. & Pras, A., 28 Jun 2017, ACCSE 2017: The Second International Conference on Advances in Computation, Communications and Services. Lorenz, P. & Trienekens, J. (eds.). IARIA/Thinkmind, p. 37 44 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
2016
3 Citations

Collaborative DDoS Defense using Flow-based Security Event Information

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., Apr 2016, Proceedings of the IEEE/IFIP Network Operations and Management Symposium, IEEE NOMS 2016. USA: IEEE Communications Society, p. 516-552 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations

DDoS 3.0 - How Terrorists Bring Down the Internet

Pras, A., Cardoso de Santanna, J. J., Steinberger, J. & Sperotto, A., 4 Apr 2016, Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016. Remke, A. K. I. & Haverkort, B. R. H. M. (eds.). Berlin: Springer, p. 1-4 4 p. (Lecture Notes in Computer Science; vol. 9629).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
1 Citations

In Whom Do We Trust - Sharing Security Events

Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H. & Pras, A., 21 Jun 2016, Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016). London: Springer Verlag, p. 111-124 14 p. (Lecture Notes in Computer Science; vol. 9701).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

"LUDO" - Kids playing Distributed Denial of Service

Steinberger, J., Cardoso de Santanna, J. J., Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U., Sperotto, A., Baier, H. & Pras, A., 15 Dec 2016, Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016). Bergström, J., Hórvath, G. & Schofield, B. (eds.). Sweden: EUNIS Research and Analysis Initiative, p. 3 15 p. (European Journal of Higher Education IT; vol. 2016-02).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2015
9 Citations

Collaborative Attack Mitigation and Response: A survey

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 14 May 2015, Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 910-913 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

Exchanging security events of flow-based intrusion detection systems at internet scale

Steinberger, J., Sperotto, A., Baier, H. & Pras, A., 19 Jun 2015, Proceedings of the Internet Architecture Board and Internet Society Coordinating Attack Response at Internet Scale Workshop (CARIS 2015). USA: Internet Architecture Board Website, p. 3 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
14 Citations

How to exchange security events? Overview and evaluation of formats and protocols

Steinberger, J., Sperotto, A., Golling, M. & Baier, H., 13 May 2015, IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). USA: IEEE Computer Society, p. 261-269 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations

Towards automated incident handling: how to select an appropriate response against a network-based attack?

Ossenbühl, S., Steinberger, J. & Baier, H., 18 May 2015, Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics (IMF 2015). USA: IEEE Computer Society, p. 51-67 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2014

Real-time DDoS defense: a collaborative approach at internet scale

Steinberger, J., Sperotto, A., Pras, A. & Baier, H., 19 May 2014, Trans-European Research and Education Networking Association (TNC 2014). Amsterdam: GEANT Association, p. 133 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2013
7 Citations

Anomaly Detection and Mitigation at Internet Scale: A Survey

Steinberger, J., Schehlmann, L., Abt, S. & Baier, H., Jun 2013, 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013. Doyen, G., Waldburger, M., Celeda, P., Sperotto, A. & Stiller, B. (eds.). Berlin: Springer, p. 49-60 12 p. (Lecture notes in computer science; vol. 7943).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File