Aiko Pras

Orcid: 0000-0002-5091-8608

Affiliations:
  • University of Twente, Enschede, Netherlands


According to our database1, Aiko Pras authored at least 179 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring the Benefit of Path Plausibility Algorithms in BGP.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

2022
DMEF: Dynamic Malware Evaluation Framework.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
TANGLED: A Cooperative Anycast Testbed.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

2020
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google.
IEEE Trans. Netw. Serv. Manag., 2020

A Responsible Internet to Increase Trust in the Digital World.
J. Netw. Syst. Manag., 2020

Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands.
CoRR, 2020

Characterising attacks targeting low-cost routers: a MikroTik case study (Extended).
CoRR, 2020

Distributed DDoS Defense: A collaborative Approach at Internet Scale.
Proceedings of the NOMS 2020, 2020

DDoS Mitigation: A Measurement-Based Approach.
Proceedings of the NOMS 2020, 2020

Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD.
Proceedings of the NOMS 2020, 2020

MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification.
Proceedings of the NOMS 2020, 2020

Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
The Dagstuhl beginners guide to reproducibility for experimental networking research.
Comput. Commun. Rev., 2019

On the Usage of DSCP and ECN Codepoints in Internet Backbone Traffic Traces for IPv4 and IPv6.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

2018
Updated Taxonomy for the Network and Service Management Research Field.
J. Netw. Syst. Manag., 2018

Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity.
J. Netw. Syst. Manag., 2018

Booter list generation: The basis for investigating DDoS-for-hire websites.
Int. J. Netw. Manag., 2018

Flow-Based Compromise Detection: Lessons Learned.
IEEE Secur. Priv., 2018

DDoS defense using MTD and SDN.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

IoT-Botnet Detection and Isolation by Access Routers.
Proceedings of the 9th International Conference on the Network of the Future, 2018

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild.
Proceedings of the Internet Measurement Conference 2018, 2018

Towards European Network Sovereignty.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

2017
Quantitative Comparison of the Efficiency and Scalability of the Current and Future LTE Network Architectures.
Wirel. Commun. Mob. Comput., 2017

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation.
IEEE/ACM Trans. Netw., 2017

Flow-Based Web Application Brute-Force Attack and Compromise Detection.
J. Netw. Syst. Manag., 2017

Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire?
J. Inf. Commun. Ethics Soc., 2017

Using Networks to Teach About Networks (Dagstuhl Seminar 17112).
Dagstuhl Reports, 2017

Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options?
IEEE Commun. Mag., 2017

Using Networks to Teach About Networks (Report on Dagstuhl Seminar #17112).
Comput. Commun. Rev., 2017

Software Defined Networking to support IP address mobility in future LTE network.
Proceedings of the 2017 Wireless Days, Porto, Portugal, March 29-31, 2017, 2017

Double-NAT Based Mobility Management for Future LTE Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Threats and surprises behind IPv6 extension headers.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

On the Potential of IPv6 Open Resolvers for DDoS Attacks.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

MultiPath TCP to support user's mobility in future LTE network.
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017

Broad and load-aware anycast mapping with verfploeter.
Proceedings of the 2017 Internet Measurement Conference, 2017

Cloudified mobility and bandwidth prediction in virtualized LTE networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

IPv6-specific misconfigurations in the DNS.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Flow-Based Detection of IPv6-specific Network Layer Attacks.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements.
IEEE J. Sel. Areas Commun., 2016

Taxonomy for the Network and Service Management Research Field.
J. Netw. Syst. Manag., 2016

Exploiting traffic periodicity in industrial control networks.
Int. J. Crit. Infrastructure Prot., 2016

Assessing the Quality of Flow Measurements from OpenFlow Devices.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Collaborative DDoS defense using flow-based security event information.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Exploring security vulnerabilities of unmanned aerial vehicles.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

ITSA: Internet traffic statistics archive.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

DDoS 3.0 - How Terrorists Bring Down the Internet.
Proceedings of the Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, 2016

Enabling a Mobility Prediction-Aware Follow-Me Cloud Model.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Measuring the Adoption of DDoS Protection Services.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Booter blacklist: Unveiling DDoS-for-hire websites.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Anycast and Its Potential for DDoS Mitigation.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

In Whom Do We Trust - Sharing Security Events.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

How to Achieve Early Botnet Detection at the Provider Level?
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
Impact of Packet Sampling on Link Dimensioning.
IEEE Trans. Netw. Serv. Manag., 2015

Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case.
J. Netw. Syst. Manag., 2015

QoE-driven in-network optimization for Adaptive Video Streaming based on packet sampling measurements.
Comput. Networks, 2015

Making the Case for Elliptic Curves in DNSSEC.
Comput. Commun. Rev., 2015

The Internet of Names: A DNS Big Dataset.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Collaborative attack mitigation and response: A survey.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Real-time DDoS attack detection for Cisco IOS using NetFlow.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Measurement-based network link dimensioning.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Booters - An analysis of DDoS-as-a-service attacks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Inside booters: An analysis on operational databases.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Unveiling flat traffic on the Internet: An SSH attack case study.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A demonstration of mobility prediction as a service in cloudified LTE networks.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

Mobility and bandwidth prediction as a service in virtualized LTE systems.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

How Asymmetric Is the Internet? - A Study to Support the Use of Traceroute.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

Characterizing the IPv6 Security Landscape by Large-Scale Measurements.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX.
IEEE Commun. Surv. Tutorials, 2014

A hybrid procedure for efficient link dimensioning.
Comput. Networks, 2014

Network and service management [Series Editorial].
IEEE Commun. Mag., 2014

Bad neighborhoods on the internet.
IEEE Commun. Mag., 2014

SSH Compromise Detection using NetFlow/IPFIX.
Comput. Commun. Rev., 2014

Ethics in Data Sharing: Developing a Model for Best Practice.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Taking on Internet Bad Neighborhoods.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Internet Bad Neighborhoods temporal behavior.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Linking network usage patterns to traffic Gaussianity fit.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

DNSSEC and its potential for DDoS attacks: a comprehensive measurement study.
Proceedings of the 2014 Internet Measurement Conference, 2014

Performance evaluation of a SDN/OpenFlow-based Distributed Mobility Management (DMM) approach in virtualized LTE systems.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

Software Defined Networking to Improve Mobility Management Performance.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Networking for the Cloud: Challenges and Trends.
Prax. Inf.verarb. Kommun., 2013

Flow whitelisting in SCADA networks.
Int. J. Crit. Infrastructure Prot., 2013

Measurement Artifacts in NetFlow Data.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Gaussian traffic revisited.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Benchmarking personal cloud storage.
Proceedings of the 2013 Internet Measurement Conference, 2013

Evaluating third-party Bad Neighborhood blacklists for Spam detection.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Large-scale geolocation for NetFlow.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Self-management of Hybrid Networks - Hidden Costs Due to TCP Performance Problems.
Proceedings of the Advances in Communication Networking, 2013

Lightweight link dimensioning using sFlow sampling.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Towards real-time intrusion detection for NetFlow and IPFIX.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study.
IEEE Trans. Netw. Serv. Manag., 2012

Difficulties in Modeling SCADA Traffic: A Comparative Analysis.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

The effects of DDoS attacks on flow monitoring applications.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Internet bad neighborhoods aggregation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A first look into SCADA network traffic.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Inside dropbox: understanding personal cloud storage services.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

The Impact of IPv6 on Penetration Testing.
Proceedings of the Information and Communication Technologies, 2012

The Costs of Web Advertisements While Mobile Browsing.
Proceedings of the Information and Communication Technologies, 2012

Towards periodicity based anomaly detection in SCADA networks.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

Towards Bandwidth Estimation Using Flow-Level Measurements.
Proceedings of the Dependable Networks and Services, 2012

Real-Time and Resilient Intrusion Detection: A Flow-Based Approach.
Proceedings of the Dependable Networks and Services, 2012

SSHCure: A Flow-Based SSH Intrusion Detection System.
Proceedings of the Dependable Networks and Services, 2012

2011
Report of the Third Workshop on the Usage of NetFlow/IPFIX in Network Management.
J. Netw. Syst. Manag., 2011

Report of the Second Workshop on the Usage of NetFlow/IPFIX in Network Management.
J. Netw. Syst. Manag., 2011

Learning from the Past: Implications for the Future Internet and its Management? (Dagstuhl Seminar 11042).
Dagstuhl Reports, 2011

Topics in network and service management.
IEEE Commun. Mag., 2011

Flow-based intrusion detection.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Self-management of hybrid optical and packet switching networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

On the Evaluation of Self-addressing Strategies for Ad-Hoc Networks.
Proceedings of the Energy-Aware Communications - 17th International Workshop, 2011

Flow Monitoring Experiences at the Ethernet-Layer.
Proceedings of the Energy-Aware Communications - 17th International Workshop, 2011

Self-management of Hybrid Networks: Introduction, Pros and Cons.
Proceedings of the Energy-Aware Communications - 17th International Workshop, 2011

Internet Bad Neighborhoods: The spam case.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Estimating Bandwidth Requirements Using Flow-Level Measurements.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

Finding and Analyzing Evil Cities on the Internet.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

Carrier Ethernet OAM: An Overview and Comparison to IP OAM.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

Cleaning Your House First: Shifting the Paradigm on How to Secure Networks.
Proceedings of the Managing the Dynamics of Networks and Services, 2011

2010
Report on the Dagstuhl Seminar on Visualization and Monitoring of Network Traffic.
J. Netw. Syst. Manag., 2010

Filtering spam from bad neighborhoods.
Int. J. Netw. Manag., 2010

An Overview of IP Flow-Based Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2010

Fighting Spam on the Sender Side: A Lightweight Approach.
Proceedings of the Networked Services and Applications, 2010

The Network Data Handling War: MySQL vs. NfDump.
Proceedings of the Networked Services and Applications, 2010

On the Performance of Grooming Strategies for Offloading IP Flows onto Lightpaths in Hybrid Networks.
Proceedings of the Networked Services and Applications, 2010

Scalable Service Performance Monitoring.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

Intrusion Detection in SCADA Networks.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
Dimensioning network links: a new look at equivalent bandwidth.
IEEE Netw., 2009

Using NetFlow/IPFIX for Network Management.
J. Netw. Syst. Manag., 2009

Survey of SNMP performance analysis studies.
Int. J. Netw. Manag., 2009

A Labeled Data Set for Flow-Based Intrusion Detection.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

Optical Switching Impact on TCP Throughput Limited by TCP Buffers.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

Self-management of hybrid networks: Can we trust netflow data?
Proceedings of the Integrated Network Management, 2009

Detecting Spam at the Network Level.
Proceedings of the Internet of the Future, 2009

Consistency Analysis of Network Traffic Repositories.
Proceedings of the Internet of the Future, 2009

Hidden Markov Model Modeling of SSH Brute-Force Attacks.
Proceedings of the Integrated Management of Systems, 2009

09211 Executive Summary - Visualization and Monitoring of Network Traffic.
Proceedings of the Visualization and Monitoring of Network Traffic, 17.05. - 20.05.2009, 2009

09211 Abstracts Collection - Visualization and Monitoring of Network Traffic.
Proceedings of the Visualization and Monitoring of Network Traffic, 17.05. - 20.05.2009, 2009

09052 Report - Management of the Future Internet.
Proceedings of the Management of the Future Internet, 27.01. - 30.01.2009, 2009

Scalable Detection and Isolation of Phishing.
Proceedings of the Scalability of Networks and Services, 2009

Consistency of Network Traffic Repositories: An Overview.
Proceedings of the Scalability of Networks and Services, 2009

A Statistical Analysis of Network Parameters for the Self-management of Lambda-Connections.
Proceedings of the Scalability of Networks and Services, 2009

2008
Topics in Network and Service Management [Guest Editorial].
IEEE Commun. Mag., 2008

Characterization of IP flows eligible for lambda-connections in optical networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Anomaly Characterization in Flow-Based Traffic Time Series.
Proceedings of the IP Operations and Management, 8th IEEE International Workshop, 2008

08043 Summary -- Perspectives Workshop: Telecommunication Economics.
Proceedings of the Perspectives Workshop: Telecommunication Economics, 23.1. - 26.1.2008, 2008

SNMP Trace Analysis Definitions.
Proceedings of the Resilient Networks and Services, 2008

2007
Peer-to-Peer Technologies in Network and Service Management.
J. Netw. Syst. Manag., 2007

Key research challenges in network management.
IEEE Commun. Mag., 2007

Network and Service Management [Guest Editorial].
IEEE Commun. Mag., 2007

SNMP Traffic Analysis: Approaches, Tools, and First Results.
Proceedings of the Integrated Network Management, 2007

Finding Elephant flows for optical networks.
Proceedings of the Integrated Network Management, 2007

Analysis of Techniques for Protection Against Spam over Internet Telephony.
Proceedings of the Dependable and Adaptable Networks and Services, 2007

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks.
Proceedings of the Dependable and Adaptable Networks and Services, 2007

Scheduling Feed Retrieval.
Proceedings of IEEE International Conference on Communications, 2007

Smart Dimensioning of IP Network Links.
Proceedings of the Managing Virtualization of Networks and Services, 2007

Offloading IP Flows onto Lambda-Connections.
Proceedings of the Managing Virtualization of Networks and Services, 2007

Self-management of Lambda-Connections in Optical Networks.
Proceedings of the Inter-Domain Management, 2007

2006
QoS-aware bandwidth provisioning for IP network links.
Comput. Networks, 2006

Network and service management.
IEEE Commun. Mag., 2006

Network and service management series.
IEEE Commun. Mag., 2006

A Policy-Based Hierarchical Approach for Management of Grids and Networks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Gaussian traffic everywhere?
Proceedings of IEEE International Conference on Communications, 2006

How to Identify the Speed Limiting Factor of a TCP Flow.
Proceedings of the Fourth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, 2006

2005
Managing New Networked Worlds - A Report on IM 2005.
J. Netw. Syst. Manag., 2005

Introducing the series on network and service management.
IEEE Commun. Mag., 2005

QoS in Hybrid Networks - An Operator's Perspective.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

DNS: A Statistical Analysis of Name Server Traffic at Local Network-to-Internet Connections.
Proceedings of the EUNICE 2005: Networks and Applications Towards a Ubiquitously Connected World, 2005

Second generation micropayment systems: lessons learned.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

Data on Retention.
Proceedings of the Ambient Networks, 2005

An interconnection architecture for micropayment systems.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2004
Comparing the performance of SNMP and Web services-based management.
IEEE Trans. Netw. Serv. Manag., 2004

Guest editorial - XML-based management of networks and services.
IEEE Commun. Mag., 2004

Panel three: Monitoring and controlling networks: Have we lost control of our networks?
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Internet management: status and challenges.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

2003
On the Difference between Information Models and Data Models.
RFC, January, 2003

On the future of Internet management technologies.
IEEE Commun. Mag., 2003

Traffic Measurements for Link Dimensioning - A Case Study.
Proceedings of the Self-Managing Distributed Systems, 2003

2002
Internet Services: Management Beyond the ElementA Report on DSOM'2001.
J. Netw. Syst. Manag., 2002

Remote MIB-item look-up service.
Proceedings of the Management Solutions for the New Communications World, 2002

2001
Internet accounting.
IEEE Commun. Mag., 2001

2000
A Customer Service Management Architecture for the Internet.
Proceedings of the Services Management in Intelligent Networks, 2000

1989
Replacing the Ethernet access mechanism with the real-time access mechanism of Twentenet.
Comput. Commun., 1989


  Loading...