Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Hendriks, Luuk"'
Autor:
Westerbaan, Abraham, Hendriks, Luuk
We describe a system, PEP3, for storage and retrieval of IP flow information in which the IP addresses are replaced by pseudonyms. Every eligible party gets its own set of pseudonyms. A single entity, the transcryptor, that is composed of five indepe
Externí odkaz:
http://arxiv.org/abs/1911.02674
Autor:
Gasser, Oliver, Scheitle, Quirin, Foremski, Pawel, Lone, Qasim, Korczynski, Maciej, Strowes, Stephen D., Hendriks, Luuk, Carle, Georg
Publikováno v:
Proceedings of the 2018 Internet Measurement Conference (IMC '18)
Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In recent years, several studies have proposed the use of target lists of I
Externí odkaz:
http://arxiv.org/abs/1806.01633
Publikováno v:
Boutaba, R. (ed.), IFIP Networking 2020: Conference and WorkshopsJune 22-25, 2020-Paris, France, 494-498. Los Alamitos : IEEE
STARTPAGE=494;ENDPAGE=498;TITLE=Boutaba, R. (ed.), IFIP Networking 2020: Conference and WorkshopsJune 22-25, 2020-Paris, France
Boutaba, R. (ed.), IFIP Networking 2020: Conference and WorkshopsJune 22-25, 2020-Paris, France, pp. 494-498
STARTPAGE=494;ENDPAGE=498;TITLE=Boutaba, R. (ed.), IFIP Networking 2020: Conference and WorkshopsJune 22-25, 2020-Paris, France
Boutaba, R. (ed.), IFIP Networking 2020: Conference and WorkshopsJune 22-25, 2020-Paris, France, pp. 494-498
Contains fulltext : 222051.pdf (Publisher’s version ) (Closed access) IFIP Networking 2020
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::78bdbf54b95db93d76401ec9c5dff685
http://hdl.handle.net/2066/222051
http://hdl.handle.net/2066/222051
Autor:
Hendriks, Luuk, Velan, Petr, de O. Schmidt, Ricardo, de Boer, Pieter-Tjerk, Pras, Aiko, Tuncer, Daphne, Koch, Robert, Badonne, Rémi, Stiller, Burkhard
Publikováno v:
Lecture Notes in Computer Science
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS)
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.137-142, ⟨10.1007/978-3-319-60774-0_11⟩
Lecture Notes in Computer Science ISBN: 9783319607733
AIMS
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Proceedings, 137-142
STARTPAGE=137;ENDPAGE=142;TITLE=Security of Networks and Services in an All-Connected World
AIMS 2017-11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS)
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.137-142, ⟨10.1007/978-3-319-60774-0_11⟩
Lecture Notes in Computer Science ISBN: 9783319607733
AIMS
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Proceedings, 137-142
STARTPAGE=137;ENDPAGE=142;TITLE=Security of Networks and Services in an All-Connected World
AIMS 2017-11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security
Part 4: Short Papers: Security, Intrusion Detection, and Configuration; International audience; With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While man
Autor:
Hendriks, Luuk, de Oliveira Schmidt, Ricardo, van Rijswijk-Deij, Roland, Pras, Aiko, Kaafar, Mohamed Ali, Uhlig, Steve, Amann, Johanna
Publikováno v:
Passive and Active Measurement: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings, 17-29
STARTPAGE=17;ENDPAGE=29;TITLE=Passive and Active Measurement
Passive and Active Measurement ISBN: 9783319543277
PAM
STARTPAGE=17;ENDPAGE=29;TITLE=Passive and Active Measurement
Passive and Active Measurement ISBN: 9783319543277
PAM
Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e978b090a25679e5f7cc819615a8dd7b
https://research.utwente.nl/en/publications/b40bc123-0944-4f21-b83a-ed79b905554f
https://research.utwente.nl/en/publications/b40bc123-0944-4f21-b83a-ed79b905554f
Publikováno v:
STARTPAGE=1;ENDPAGE=8;TITLE=None
Since its initial proposal in 2008, OpenFlow has evolved to become today’s main enabler of Software-Defined Networking. OpenFlow specifies operations for network forwarding devices and a communication protocol between data and control planes. Altho
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::3c1515ed1e9a6576c076ff94f3ad7274
https://research.utwente.nl/en/publications/e5a32c43-4859-43ae-b509-d1f4d093e889
https://research.utwente.nl/en/publications/e5a32c43-4859-43ae-b509-d1f4d093e889
Autor:
Hofstede, R.J., Hendriks, Luuk
Publikováno v:
Proceedings of the International Conference on Networked Systems, NetSys 2015
Network-based intrusion detection systems have always been designed to report on the presence of attacks. Due to the sheer and ever-increasing number of attacks on the Internet, Computer Security Incident Response Teams (CSIRTs) are overwhelmed with
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::095879acf8ea3f571b21084ee113a480
https://research.utwente.nl/en/publications/unveiling-sshcure-30-flowbased-ssh-compromise-detection(c0087279-2b4a-4e5e-b7f1-c81b7a504b0e).html
https://research.utwente.nl/en/publications/unveiling-sshcure-30-flowbased-ssh-compromise-detection(c0087279-2b4a-4e5e-b7f1-c81b7a504b0e).html
Autor:
Hofstede, R.J., Hendriks, Luuk
Publikováno v:
FloCon 2015
Dictionary attacks against SSH daemons are a common type of brute-force attack, in which attackers perform authentication attempts on a remote machine. By now, we are used to observing a steady number of SSH dictionary attacks in our networks every d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::72b28c9b0abee3a4dbfab86595f598d7
https://research.utwente.nl/en/publications/ssh-compromise-detection-using-netflowipfix(0fe34e24-d853-4883-971f-6197ec5096aa).html
https://research.utwente.nl/en/publications/ssh-compromise-detection-using-netflowipfix(0fe34e24-d853-4883-971f-6197ec5096aa).html
Publikováno v:
Proceedings of the Innovating the Network for Data Intensive Science Workshop, INDIS 2014
In this demo we will demonstrate the possibility of using OpenFlow traffic measurements for link dimensioning purposes. Our solution runs on top of the Ryu OpenFlow controller and retrieves per-flow statistics metered at the OpenFlow switch. The stat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::59c76546979dffa690fa9ec505159adb
https://research.utwente.nl/en/publications/openflowbased-link-dimensioning(a6d2e27b-530b-4435-840c-1ae22fbb5d1d).html
https://research.utwente.nl/en/publications/openflowbased-link-dimensioning(a6d2e27b-530b-4435-840c-1ae22fbb5d1d).html
Publikováno v:
TERENA Networking Conference 2014
With this poster, we present our SSH Intrusion Detection System named SSHCure: it is the first IDS capable of distinguishing successful attacks from unsuccessful attacks, thus detecting actual compromises. As powerful as SSH is to administrators, as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::4af38f7dcbcad5f36496fe35cea65b1e
https://research.utwente.nl/en/publications/sshcure-ssh-intrusion-detection-using-netflow-and-ipfix(561a6d67-b782-4687-b30d-adc6cc9418a0).html
https://research.utwente.nl/en/publications/sshcure-ssh-intrusion-detection-using-netflow-and-ipfix(561a6d67-b782-4687-b30d-adc6cc9418a0).html