Anna Sperotto
Cited by
Cited by
An overview of IP flow-based intrusion detection
A Sperotto, G Schaffrath, R Sadre, C Morariu, A Pras, B Stiller
IEEE communications surveys & tutorials 12 (3), 343-356, 2010
Flow monitoring explained: From packet capture to data analysis with netflow and ipfix
R Hofstede, P Čeleda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras
IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014
Inside dropbox: understanding personal cloud storage services
I Drago, M Mellia, M M. Munafo, A Sperotto, R Sadre, A Pras
Proceedings of the 2012 internet measurement conference, 481-494, 2012
Booters—An analysis of DDoS-as-a-service attacks
JJ Santanna, R van Rijswijk-Deij, R Hofstede, A Sperotto, M Wierbosch, ...
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
A labeled data set for flow-based intrusion detection
A Sperotto, R Sadre, F Van Vliet, A Pras
IP Operations and Management: 9th IEEE International Workshop, IPOM 2009 …, 2009
DNSSEC and its potential for DDoS attacks: a comprehensive measurement study
R van Rijswijk-Deij, A Sperotto, A Pras
Proceedings of the 2014 Conference on Internet Measurement Conference, 449-460, 2014
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti
Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017
A high-performance, scalable infrastructure for large-scale active DNS measurements
R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras
IEEE journal on selected areas in communications 34 (6), 1877-1888, 2016
SSHCure: a flow-based SSH intrusion detection system
L Hellemons, L Hendriks, R Hofstede, A Sperotto, R Sadre, A Pras
Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012
Measuring the adoption of DDoS protection services
M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras
Proceedings of the 2016 Internet Measurement Conference, 279-285, 2016
Hidden Markov Model modeling of SSH brute-force attacks
A Sperotto, R Sadre, PT de Boer, A Pras
Integrated Management of Systems, Services, Processes and People in IT: 20th …, 2009
SSH compromise detection using NetFlow/IPFIX
R Hofstede, L Hendriks, A Sperotto, A Pras
ACM SIGCOMM computer communication review 44 (5), 20-26, 2014
Towards real-time intrusion detection for NetFlow and IPFIX
R Hofstede, V Bartoš, A Sperotto, A Pras
Proceedings of the 9th International Conference on Network and Service …, 2013
How to exchange security events? overview and evaluation of formats and protocols
J Steinberger, A Sperotto, M Golling, H Baier
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
Flow-based detection of DNS tunnels
W Ellens, P Żuraniewski, A Sperotto, H Schotanus, M Mandjes, ...
Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 …, 2013
Flow-based intrusion detection
A Sperotto, A Pras
Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium …, 2011
Flow-based web application brute-force attack and compromise detection
R Hofstede, M Jonker, A Sperotto, A Pras
Journal of network and systems management 25, 735-758, 2017
DDoS defense using MTD and SDN
J Steinberger, B Kuhnert, C Dietz, L Ball, A Sperotto, H Baier, A Pras, ...
NOMS 2018-2018 IEEE/IFIP network operations and management symposium, 1-9, 2018
Attacks by “Anonymous‿ WikiLeaks Proponents not Anonymous
A Pras, A Sperotto, GM Moura, I Drago, RRR Barbosa, R Sadre, ...
Centre for Telematics and Information Technology (CTIT), 2010
A responsible internet to increase trust in the digital world
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Journal of Network and Systems Management 28, 882-922, 2020
The system can't perform the operation now. Try again later.
Articles 1–20