An overview of IP flow-based intrusion detection A Sperotto, G Schaffrath, R Sadre, C Morariu, A Pras, B Stiller IEEE communications surveys & tutorials 12 (3), 343-356, 2010 | 657 | 2010 |
Flow monitoring explained: From packet capture to data analysis with netflow and ipfix R Hofstede, P Čeleda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014 | 621 | 2014 |
Inside dropbox: understanding personal cloud storage services I Drago, M Mellia, M M. Munafo, A Sperotto, R Sadre, A Pras Proceedings of the 2012 internet measurement conference, 481-494, 2012 | 586 | 2012 |
Booters—An analysis of DDoS-as-a-service attacks JJ Santanna, R van Rijswijk-Deij, R Hofstede, A Sperotto, M Wierbosch, ... 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 241 | 2015 |
A labeled data set for flow-based intrusion detection A Sperotto, R Sadre, F Van Vliet, A Pras IP Operations and Management: 9th IEEE International Workshop, IPOM 2009 …, 2009 | 226 | 2009 |
DNSSEC and its potential for DDoS attacks: a comprehensive measurement study R van Rijswijk-Deij, A Sperotto, A Pras Proceedings of the 2014 Conference on Internet Measurement Conference, 449-460, 2014 | 177 | 2014 |
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017 | 162 | 2017 |
A high-performance, scalable infrastructure for large-scale active DNS measurements R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras IEEE journal on selected areas in communications 34 (6), 1877-1888, 2016 | 141 | 2016 |
SSHCure: a flow-based SSH intrusion detection system L Hellemons, L Hendriks, R Hofstede, A Sperotto, R Sadre, A Pras Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012 | 118 | 2012 |
Hidden Markov Model modeling of SSH brute-force attacks A Sperotto, R Sadre, PT de Boer, A Pras Integrated Management of Systems, Services, Processes and People in IT: 20th …, 2009 | 88 | 2009 |
Measuring the adoption of DDoS protection services M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras Proceedings of the 2016 Internet Measurement Conference, 279-285, 2016 | 87 | 2016 |
SSH compromise detection using NetFlow/IPFIX R Hofstede, L Hendriks, A Sperotto, A Pras ACM SIGCOMM computer communication review 44 (5), 20-26, 2014 | 84 | 2014 |
Towards real-time intrusion detection for NetFlow and IPFIX R Hofstede, V Bartoš, A Sperotto, A Pras Proceedings of the 9th International Conference on Network and Service …, 2013 | 78 | 2013 |
How to exchange security events? overview and evaluation of formats and protocols J Steinberger, A Sperotto, M Golling, H Baier 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 71 | 2015 |
Flow-based detection of DNS tunnels W Ellens, P Żuraniewski, A Sperotto, H Schotanus, M Mandjes, ... Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 …, 2013 | 66 | 2013 |
Flow-based intrusion detection A Sperotto, A Pras Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium …, 2011 | 66 | 2011 |
Flow-based web application brute-force attack and compromise detection R Hofstede, M Jonker, A Sperotto, A Pras Journal of network and systems management 25, 735-758, 2017 | 53 | 2017 |
Attacks by “Anonymous‿ WikiLeaks Proponents not Anonymous A Pras, A Sperotto, GM Moura, I Drago, RRR Barbosa, R Sadre, ... Centre for Telematics and Information Technology (CTIT), 2010 | 51 | 2010 |
DDoS defense using MTD and SDN J Steinberger, B Kuhnert, C Dietz, L Ball, A Sperotto, H Baier, A Pras, ... NOMS 2018-2018 IEEE/IFIP network operations and management symposium, 1-9, 2018 | 50 | 2018 |
A responsible internet to increase trust in the digital world C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ... Journal of Network and Systems Management 28, 882-922, 2020 | 46 | 2020 |