Anna Sperotto

Orcid: 0000-0002-9481-5846

According to our database1, Anna Sperotto authored at least 94 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

2022
Addressing the challenges of modern DNS a comprehensive tutorial.
Comput. Sci. Rev., 2022

Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

DMEF: Dynamic Malware Evaluation Framework.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Saving Brian's privacy: the perils of privacy exposure through reverse DNS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Investigating the impact of DDoS attacks on DNS infrastructure.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

ANYway: Measuring the Amplification DDoS Potential of Domains.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
A Responsible Internet to Increase Trust in the Digital World.
J. Netw. Syst. Manag., 2020

Lessons learned organizing the PAM 2020 virtual conference.
Comput. Commun. Rev., 2020

Update on ACM SIGCOMM CCR reviewing process: towards a more open review process.
Comput. Commun. Rev., 2020

When Parents and Children Disagree: Diving into DNS Delegation Inconsistency.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

Distributed DDoS Defense: A collaborative Approach at Internet Scale.
Proceedings of the NOMS 2020, 2020

DDoS Mitigation: A Measurement-Based Approach.
Proceedings of the NOMS 2020, 2020

Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD.
Proceedings of the NOMS 2020, 2020

MAnycast2: Using Anycast to Measure Anycast.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Forgotten Side of DNS: Orphan and Abandoned Records.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2018
Flow-Based Compromise Detection: Lessons Learned.
IEEE Secur. Priv., 2018

Melting the snow: Using active DNS measurements to detect snowshoe spam domains.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

DDoS defense using MTD and SDN.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

IoT-Botnet Detection and Isolation by Access Routers.
Proceedings of the 9th International Conference on the Network of the Future, 2018

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild.
Proceedings of the Internet Measurement Conference 2018, 2018

Threat Identification Using Active DNS Measurements.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

2017
The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation.
IEEE/ACM Trans. Netw., 2017

Flow-Based Web Application Brute-Force Attack and Compromise Detection.
J. Netw. Syst. Manag., 2017

Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options?
IEEE Commun. Mag., 2017

TIDE: Threat Identification Using Active DNS Measurements.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Challenges with Reproducibility.
Proceedings of the Reproducibility Workshop, 2017

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem.
Proceedings of the 2017 Internet Measurement Conference, 2017

Measuring exposure in DDoS protection services.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements.
IEEE J. Sel. Areas Commun., 2016

Collaborative DDoS defense using flow-based security event information.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

DDoS 3.0 - How Terrorists Bring Down the Internet.
Proceedings of the Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, 2016

Measuring the Adoption of DDoS Protection Services.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC.
Proceedings of the 12th International Conference on Network and Service Management, 2016

In Whom Do We Trust - Sharing Security Events.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

How to Achieve Early Botnet Detection at the Provider Level?
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
Impact of Packet Sampling on Link Dimensioning.
IEEE Trans. Netw. Serv. Manag., 2015

Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014) - Monitoring and Securing Virtualized Networks and Services.
J. Netw. Syst. Manag., 2015

Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case.
J. Netw. Syst. Manag., 2015

Special issue on measure, detect and mitigate-challenges and trends in network security.
Int. J. Netw. Manag., 2015

Making the Case for Elliptic Curves in DNSSEC.
Comput. Commun. Rev., 2015

The Internet of Names: A DNS Big Dataset.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

A first look at HTTP(S) intrusion detection using NetFlow/IPFIX.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

How to exchange security events? Overview and evaluation of formats and protocols.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Collaborative attack mitigation and response: A survey.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Real-time DDoS attack detection for Cisco IOS using NetFlow.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Booters - An analysis of DDoS-as-a-service attacks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Inside booters: An analysis on operational databases.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Unveiling flat traffic on the Internet: An SSH attack case study.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

How Asymmetric Is the Internet? - A Study to Support the Use of Traceroute.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

Characterizing the IPv6 Security Landscape by Large-Scale Measurements.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet.
J. Netw. Syst. Manag., 2014

Flow-based Approaches in Network Management: Recent Advances and Future Trends.
Int. J. Netw. Manag., 2014

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX.
IEEE Commun. Surv. Tutorials, 2014

A hybrid procedure for efficient link dimensioning.
Comput. Networks, 2014

SSH Compromise Detection using NetFlow/IPFIX.
Comput. Commun. Rev., 2014

Ethics in Data Sharing: Developing a Model for Best Practice.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

DNSSEC and its potential for DDoS attacks: a comprehensive measurement study.
Proceedings of the 2014 Internet Measurement Conference, 2014

Towards Validation of the Internet Census 2012.
Proceedings of the Advances in Communication Networking, 2014

Characterizing and Mitigating the DDoS-as-a-Service Phenomenon.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

Characterisation of the Kelihos.B Botnet.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

Software Defined Networking to Improve Mobility Management Performance.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Networking for the Cloud: Challenges and Trends.
Prax. Inf.verarb. Kommun., 2013

Measurement Artifacts in NetFlow Data.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Evaluating third-party Bad Neighborhood blacklists for Spam detection.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Lightweight link dimensioning using sFlow sampling.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Towards real-time intrusion detection for NetFlow and IPFIX.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Flow-Based Detection of DNS Tunnels.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study.
IEEE Trans. Netw. Serv. Manag., 2012

The effects of DDoS attacks on flow monitoring applications.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Internet bad neighborhoods aggregation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Inside dropbox: understanding personal cloud storage services.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Towards Bandwidth Estimation Using Flow-Level Measurements.
Proceedings of the Dependable Networks and Services, 2012

SSHCure: A Flow-Based SSH Intrusion Detection System.
Proceedings of the Dependable Networks and Services, 2012

2011
Flow-based intrusion detection.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Flow Monitoring Experiences at the Ethernet-Layer.
Proceedings of the Energy-Aware Communications - 17th International Workshop, 2011

2010
Flow-based intrusion detection.
PhD thesis, 2010

An Overview of IP Flow-Based Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2010

The Network Data Handling War: MySQL vs. NfDump.
Proceedings of the Networked Services and Applications, 2010

2009
Using NetFlow/IPFIX for Network Management.
J. Netw. Syst. Manag., 2009

A Labeled Data Set for Flow-Based Intrusion Detection.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

Self-management of hybrid networks: Can we trust netflow data?
Proceedings of the Integrated Network Management, 2009

Detecting Spam at the Network Level.
Proceedings of the Internet of the Future, 2009

Hidden Markov Model Modeling of SSH Brute-Force Attacks.
Proceedings of the Integrated Management of Systems, 2009

2008
Anomaly Characterization in Flow-Based Traffic Time Series.
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008

2007
Szemerédi's Regularity Lemma and Its Applications to Pairwise Clustering and Segmentation.
Proceedings of the Energy Minimization Methods in Computer Vision and Pattern Recognition, 2007

A Survey of the High-Speed Self-learning Intrusion Detection Research Area.
Proceedings of the Inter-Domain Management, 2007


  Loading...