Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX R Hofstede, P Celeda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras IEEE Communication Surveys & Tutorials 16 (4), 2037-2064, 2014 | 660 | 2014 |
Booters-An analysis of DDoS-as-a-Service Attacks JJ Santanna, R van Rijswijk-Deij, A Sperotto, R Hofstede, M Wierbosch, ... Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and …, 2014 | 255 | 2014 |
SSHCure: A Flow-Based SSH Intrusion Detection System L Hellemons, L Hendriks, R Hofstede, A Sperotto, R Sadre, A Pras Dependable Networks and Services, 86-97, 2012 | 118 | 2012 |
SSH compromise detection using NetFlow/IPFIX R Hofstede, L Hendriks, A Sperotto, A Pras ACM SIGCOMM computer communication review 44 (5), 20-26, 2014 | 87 | 2014 |
Towards Real-Time Intrusion Detection for NetFlow and IPFIX R Hofstede, V Bartos, A Sperotto, A Pras Network and Service Management (CNSM), 2013 9th International Conference on …, 2013 | 82 | 2013 |
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ... Proceedings of the 33rd Annual computer security applications Conference …, 2017 | 58 | 2017 |
Flow-based web application brute-force attack and compromise detection R Hofstede, M Jonker, A Sperotto, A Pras Journal of network and systems management 25, 735-758, 2017 | 57 | 2017 |
Attacks by “Anonymous” WikiLeaks Proponents not Anonymous A Pras, A Sperotto, G Moura, I Drago, R Barbosa, R Sadre, R Schmidt, ... University of Twente, Centre for Telematics and, 2010 | 55 | 2010 |
Measurement Artifacts in NetFlow Data R Hofstede, I Drago, A Sperotto, R Sadre, A Pras Passive and Active Measurement, 1-10, 2013 | 36 | 2013 |
SURFmap: A Network Monitoring Tool Based on the Google Maps API R Hofstede, T Fioreze Integrated Network Management, 2009. IM'09. IFIP/IEEE International …, 2009 | 35 | 2009 |
The Network Data Handling War: MySQL vs NfDump R Hofstede, A Sperotto, T Fioreze, A Pras Networked Services and Applications-Engineering, Control and Management, 167-176, 2010 | 28 | 2010 |
Towards multi-layered intrusion detection in high-speed networks M Golling, R Hofstede, R Koch 2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014 | 27 | 2014 |
Flow-based compromise detection: Lessons learned R Hofstede, A Pras, A Sperotto, GD Rodosek IEEE security & privacy 16 (1), 82-89, 2018 | 26 | 2018 |
Real-time DDoS attack detection for Cisco IOS using NetFlow D van der Steeg, R Hofstede, A Sperotto, A Pras 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 26 | 2015 |
Unveiling flat traffic on the internet: an SSH attack case study M Jonker, R Hofstede, A Sperotto, A Pras 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 20 | 2015 |
Pavel ˇCeleda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, and Aiko Pras. Flow monitoring explained: From packet capture to data analysis with netflow and ipfix R Hofstede IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014 | 19 | 2014 |
A first look at HTTP (S) intrusion detection using NetFlow/IPFIX O van der Toorn, R Hofstede, M Jonker, A Sperotto 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 16 | 2015 |
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach R Hofstede, A Pras Dependable Networks and Services, 109-112, 2012 | 11 | 2012 |
Flow-based approaches in network management: Recent advances and future trends R Sadre, A Sperotto, RJ Hofstede, N Brownlee International Journal of Network Management 24 (4), 219-220, 2014 | 8 | 2014 |
Carrier Ethernet OAM: An Overview and Comparison to IP OAM R Hofstede, I Drago, G Moura, A Pras Managing the Dynamics of Networks and Services, 112-123, 2011 | 8 | 2011 |