Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Cardoso de Santanna, José Jair"'
Why should you care about Distributed Denial of Service (DDoS) attacks? If your Internet home connection would be the target of a DDoS attack, then not only your connectivity is gone, but also your telephone and TV programs. This is because many home
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::3ef4c97be68af428208862ac0b72d349
https://research.utwente.nl/en/publications/ddosasaservice(2d2e34c7-c051-4c25-8ccf-688d979fb74a).html
https://research.utwente.nl/en/publications/ddosasaservice(2d2e34c7-c051-4c25-8ccf-688d979fb74a).html
Autor:
Kerkers, Max, Cardoso de Santanna, José Jair, Sperotto, Anna, Doyen, Guillaume, Latré, Steven, Charalambides, Marinos, Stiller, Burkhard
Publikováno v:
Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, 79-91
STARTPAGE=79;ENDPAGE=91;TITLE=Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014
Monitoring and Securing Virtualized Networks and Services ISBN: 9783662438619
AIMS
STARTPAGE=79;ENDPAGE=91;TITLE=Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014
Monitoring and Securing Virtualized Networks and Services ISBN: 9783662438619
AIMS
Botnets are organized networks of infected computers that are used for malicious purposes. An example is Kelihos.B, a botnet of the Kelihos family used primarily for mining bitcoins, sending spam and stealing bitcoin wallets. A large part of the Keli
Autor:
Steinberger, Jessica, Cardoso de Santanna, José Jair, Spatharas, E., Amler, H., Breuer, N., Graul, K., Kuhnert, B., Piontek, U., Sperotto, Anna, Baier, H., Pras, Aiko, Bergström, Johan, Hórvath, Gyöngyi, Schofield, Brook
Publikováno v:
Proceedings of the 32th Trans European Research and Education Networking Conference (TNC 2016)
Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services. GE̿ANT, the pan-European network with terabit capacities witnesses close to hundreds of DDoS attacks on a daily basis. The r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::3b0737d3f7cefef5fd74a2d77c22c062
https://research.utwente.nl/en/publications/ludo--kids-playing-distributed-denial-of-service(a434fa9e-e1db-4197-951c-b366e3c69b85).html
https://research.utwente.nl/en/publications/ludo--kids-playing-distributed-denial-of-service(a434fa9e-e1db-4197-951c-b366e3c69b85).html
Autor:
Steinberger, Jessica, Kuhnert, B., Alavi, S., Cardoso de Santanna, José Jair, Sperotto, Anna, Baier, H., Pras, Aiko
Publikováno v:
STARTPAGE=14;ENDPAGE=14;TITLE=None
SPRING 2016, 11th edition of the SPRING series, is a single-track event that was sponsored by the special interest group Security – Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The purpose of SPRING is to provide
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::beede3b73abed46acd70f812a411f6ce
https://research.utwente.nl/en/publications/whom-do-we-trust--booters-and-ssltls-certificates(2ba7f12a-16c4-4093-95d3-04af9e4cdf40).html
https://research.utwente.nl/en/publications/whom-do-we-trust--booters-and-ssltls-certificates(2ba7f12a-16c4-4093-95d3-04af9e4cdf40).html
Autor:
Pras, Aiko, Cardoso de Santanna, José Jair, Steinberger, Jessica, Sperotto, Anna, Remke, Anne Katharina Ingrid, Haverkort, Boudewijn R.H.M.
Publikováno v:
Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016, 1-4
STARTPAGE=1;ENDPAGE=4;TITLE=Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016
Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems ISBN: 9783319315584
MMB/DFT
STARTPAGE=1;ENDPAGE=4;TITLE=Proceedings of the 18th International GI/ITG Conference on “Measurement, Modelling and Evaluation of Computing Systems‿ and “Dependability and Fault-Tolerance‿, MMB & DFT 2016
Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems ISBN: 9783319315584
MMB/DFT
Dependable operation of the Internet is of crucial importance for our society. In recent years Distributed Denial of Service (DDoS) attacks have quickly become a major problem for the Internet. Most of these attacks are initiated by kids that target
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::121d105c1cae6840aeb89ec58dd4e157
https://research.utwente.nl/en/publications/80dc89d9-e6ba-4502-acfc-64bf65bafb6a
https://research.utwente.nl/en/publications/80dc89d9-e6ba-4502-acfc-64bf65bafb6a
Autor:
Cardoso de Santanna, José Jair, van Rijswijk, Roland M., Hofstede, R.J., Sperotto, Anna, Wierbosch, Mark, Zambenedetti Granville, Lisandro, Pras, Aiko, Badonnel, Remi, Xiao, Jin, Ata, Shingo, De Turck, Filip, Groza, Voicy, dos Santos, Carlos Raniery P.
Publikováno v:
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, 243-251
STARTPAGE=243;ENDPAGE=251;TITLE=Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015
STARTPAGE=243;ENDPAGE=251;TITLE=Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, IM 2015
In 2012, the Dutch National Research and Education Network, SURFnet, observed a multitude of Distributed Denial of Service (DDoS) attacks against educational institutions. These attacks were effective enough to cause the online exams of hundreds of s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::70b913c696797cfe77164d29de1c64b9
https://research.utwente.nl/en/publications/665bf1e1-0f7e-40fa-867c-4b8c81833ebf
https://research.utwente.nl/en/publications/665bf1e1-0f7e-40fa-867c-4b8c81833ebf
Autor:
Cardoso de Santanna, José Jair, Durban, Romain, Sperotto, Anna, Pras, Aiko, Badonnel, Remi, Xiao, Jin, Ata, Shingo, De Turck, Filip, Groza, Voicu, dos Santos, Carlos Raniery P.
Publikováno v:
IFIP/IEEE International Symposium on Integrated Network Management (IM 2015), 432-440
STARTPAGE=432;ENDPAGE=440;TITLE=IFIP/IEEE International Symposium on Integrated Network Management (IM 2015)
IM
STARTPAGE=432;ENDPAGE=440;TITLE=IFIP/IEEE International Symposium on Integrated Network Management (IM 2015)
IM
Distributed Denial of Service (DDoS) attacks are an increasing threat on the Internet. One of the reasons is that Web sites selling attacks for prices starting from $1.00 are becoming popular. These Web sites, called Booters, facilitate attacks by ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f5840af7cc402be74260c799abe98d22
https://research.utwente.nl/en/publications/d9a36b32-7d75-437c-a82c-67d0c957f8c9
https://research.utwente.nl/en/publications/d9a36b32-7d75-437c-a82c-67d0c957f8c9
Publikováno v:
Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015, 445-458
STARTPAGE=445;ENDPAGE=458;TITLE=Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015
STARTPAGE=445;ENDPAGE=458;TITLE=Proceedings of 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2015
Distributed Denial of Service (DDoS) attacks mean millions in revenue losses to many industries, such e-commerce and online financial services. The amount of reported DDoS attacks has increased with 47% compared to 2013. One of the reasons for this i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::9acdd9f42520b0abebe658e0d7624ea1
https://research.utwente.nl/en/publications/booter-websites-characterization-towards-a-list-of-threats(693807fb-f8d1-4464-b260-5b7c96e8d864).html
https://research.utwente.nl/en/publications/booter-websites-characterization-towards-a-list-of-threats(693807fb-f8d1-4464-b260-5b7c96e8d864).html
Autor:
de Vries, Wouter Bastiaan, Cardoso de Santanna, José Jair, Sperotto, Anna, Pras, Aiko, Latré, Steven, Charalambides, Marinos, François, Jerome, Schmitt, Corinna, Stiller, Burkhard
Publikováno v:
Intelligent Mechanisms for Network Configuration and Security ISBN: 9783319200330
AIMS
Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, 113-125
STARTPAGE=113;ENDPAGE=125;TITLE=Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015
AIMS
Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, 113-125
STARTPAGE=113;ENDPAGE=125;TITLE=Intelligent Mechanisms for Network Configuration and Security, Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015
A network path is a path that a packet takes to reach its target. However, determining the network path that a host uses to reach it's target from the viewpoint of the latter is less trivial than it appears. Tools such as Traceroute allow the user to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::43c47a77da62214457ee12b63629984b
https://doi.org/10.1007/978-3-319-20034-7_12
https://doi.org/10.1007/978-3-319-20034-7_12
Autor:
Cardoso de Santanna, José Jair, Sperotto, Anna, Doyen, Guillaume, Latré, Steven, Charalambides, Marinos, Stiller, Burkhard
Publikováno v:
Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, 74-78
STARTPAGE=74;ENDPAGE=78;TITLE=Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014
Monitoring and Securing Virtualized Networks and Services ISBN: 9783662438619
AIMS
STARTPAGE=74;ENDPAGE=78;TITLE=Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014
Monitoring and Securing Virtualized Networks and Services ISBN: 9783662438619
AIMS
Distributed Denial of Service (DDoS) attacks are an increasing threat on the Internet. Until a few years ago, these types of attacks were only launched by people with advanced knowledge of computer networks. However, nowadays the ability to launch at
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cc3a0cbb70aa54ea3701b4d48d7b231a
https://research.utwente.nl/en/publications/175e4c6c-be6b-45a9-84b1-828dc0b4e6fc
https://research.utwente.nl/en/publications/175e4c6c-be6b-45a9-84b1-828dc0b4e6fc