Aiko Pras

ORCID: 0000-0002-5091-8608
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Agent-Based Network Management
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Service-Oriented Architecture and Web Services
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Malware Detection Techniques
  • Advanced Optical Network Technologies
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Software System Performance and Reliability
  • Spam and Phishing Detection
  • Network Packet Processing and Optimization
  • Smart Grid Security and Resilience
  • Distributed and Parallel Computing Systems
  • Information and Cyber Security
  • Wireless Networks and Protocols
  • Multimedia Communication and Technology
  • Business Process Modeling and Analysis
  • Complex Network Analysis Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Anomaly Detection Techniques and Applications
  • Advanced Wireless Network Optimization
  • Mobile Ad Hoc Networks

University of Twente
2014-2024

Universidade Federal do Rio Grande do Sul
2017

UCLouvain
2016

University College London
2014

Interface (United Kingdom)
2013

Aalborg University
2013

Naval University of Engineering
2012

Wichita State University
2011

University of Montenegro
2011

Research Network (United States)
2007

Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks inspect contents every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches, such as flow-based intrusion detection. In that flow data through network analyzed, instead each individual The goal this paper provide a survey current research in starts with motivation why needed. concept...

10.1109/surv.2010.032210.00054 article EN IEEE Communications Surveys & Tutorials 2010-01-01

Flow monitoring has become a prevalent method for traffic in high-speed networks. By focusing on the analysis of flows, rather than individual packets, it is often said to be more scalable traditional packet-based analysis. embraces complete chain packet observation, flow export using protocols such as NetFlow and IPFIX, data collection, In contrast what assumed, all stages are closely intertwined. Each these therefore thoroughly understood, before being able perform sound measurements....

10.1109/comst.2014.2321898 article EN IEEE Communications Surveys & Tutorials 2014-01-01

Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing offer cheap space, it is be expected that will soon generate high amount Internet traffic. Very little known about architecture performance such systems, workload they have face. This understanding essential for designing efficient systems predicting their impact on network.

10.1145/2398776.2398827 article EN 2012-11-14

We are currently observing a significant increase in the popularity of Unmanned Aerial Vehicles (UAVs), popularly also known by their generic term drones. This is not only case for recreational UAVs, that one can acquire few hundred dollars, but more sophisticated ones, namely professional whereby cost reach several thousands dollars. These UAVs to be largely employed sensitive missions such as monitoring critical infrastructures and operations police force. Given these applications,...

10.1109/noms.2016.7502939 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2016-04-01

In 2012, the Dutch National Research and Education Network, SURFnet, observed a multitude of Distributed Denial Service (DDoS) attacks against educational institutions. These were effective enough to cause online exams hundreds students be cancelled. Surprisingly, these purchased by from Web sites, known as Booters. sites provide DDoS paid service (DDoS-as-a-Service) at costs starting 1 USD. Since this problem was first identified Booters have been used repeatedly perform on schools in...

10.1109/inm.2015.7140298 article EN 2015-05-01

Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and people. However, little is known about each service capabilities, architecture -- most all performance implications design choices. This paper presents methodology to study services. We apply our compare 5 popular offers, revealing system architectures capabilities. The on designs assessed executing series...

10.1145/2504730.2504762 preprint EN 2013-10-22

The domain name system (DNS) is a core component of the Internet. It performs vital task mapping human readable names into machine data (such as IP addresses, which hosts handle e-mail, and so on). content DNS reveals lot about technical operations domain. Thus, studying state large parts over time valuable information evolution We collect unique long-term set with daily measurements for all domains under main top-level (TLDs) on Internet (including .com, .net, .org, comprising 50% global...

10.1109/jsac.2016.2558918 article EN IEEE Journal on Selected Areas in Communications 2016-04-28

Over the past five years we have witnessed introduction of DNSSEC, a security extension to DNS that relies on digital signatures. DNSSEC strengthens by preventing attacks such as cache poisoning. However, common argument against deployment is its potential for abuse in Distributed Denial Service (DDoS) attacks, particular reflection and amplification attacks. responses DNSSEC-signed domain are typically larger than those an unsigned domain, thus, it may seem could actually worsen problem...

10.1145/2663716.2663731 article EN 2014-11-05

Although network management has always played a key role for industry, it only recently received similar level of attention from many research communities, accelerated by funding opportunities new initiatives, including the FP7 Program in Europe and GENI/FIND United States. Work is ongoing to assess state art identify challenges future field, this article contributes discussion. It presents major findings two-day workshop organized jointly IRTF/NMRG EMANICS Network Excellence, at which...

10.1109/mcom.2007.4342832 article EN IEEE Communications Magazine 2007-10-01

10.1016/j.ijcip.2013.08.003 article EN International Journal of Critical Infrastructure Protection 2013-08-20

As the Internet continues to grow, it becomes more and apparent that existing management technologies need be improved, extended or replaced in order extend functionality reduce development time operational costs. Within IETF, IRTF, IAB, several new approaches are currently under discussion. Evolutionary aim at improving used technologies, whereas revolutionary try replace management-specific with standard distributed systems technologies. This article surveys research work way develop future

10.1109/mcom.2003.1235600 article EN IEEE Communications Magazine 2003-10-01

Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of critical infrastructures, such as water distribution facilities. These provide automated processes that ensure correct functioning these in a much similar those management operations found traditional Internet Protocol (IP), particular Simple Network Management (SNMP). In this paper we first look into characteristics SCADA traffic, with goal building an empirical foundation for future...

10.1109/noms.2012.6211945 article EN 2012-04-01

Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities. The polling mechanism used retrieve data from field devices causes transmission be highly periodic. In this paper, we propose an approach that exploits traffic periodicity detect anomalies, which represent potential intrusion attempts. We present a proof concept show feasibility our approach.

10.1109/etfa.2012.6489745 article EN 2012-09-01

The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape new, high-bandwidth Internet services. At same time, we have also observed increasingly frequent and widely diversified attacks. To this threat, research community answered with growing interest intrusion detection, aiming timely detect intruders prevent damage. We believe that detection problem is key component field detection. Our studies, however, made us realize additional needed, particular...

10.1109/inm.2011.5990529 article EN 2011-05-01

Flow-based approaches for SSH intrusion detection have been developed to overcome the scalability issues of host-based alternatives. Although many attacks in a flow-based fashion is fairly straightforward, no insight typically provided whether an attack was successful. We address this shortcoming by presenting algorithm compromises, i.e., hosts that compromised during attack. Our has implemented as part our open-source IDS SSHCure and validated using almost 100 servers, workstations...

10.1145/2677046.2677050 article EN ACM SIGCOMM Computer Communication Review 2014-10-10

Distributed Denial-of-Service (DDoS) attacks have steadily gained in popularity over the last decade, their intensity ranging from mere nuisance to severe. The increased number of attacks, combined with loss revenue for targets, has given rise a market DDoS Protection Service (DPS) providers, whom victims can outsource cleansing traffic by using diversion.

10.1145/2987443.2987487 article EN 2016-11-10

Reproducibility is one of the key characteristics good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice researchers, particularly those new field, on designing experiments so that their work more likely be reproducible serve as a foundation follow-on by others.

10.1145/3314212.3314217 article EN ACM SIGCOMM Computer Communication Review 2019-02-20

This paper compares the performance of Web services based network monitoring to traditional, SNMP based, monitoring. The study focuses on ifTable, and investigates as function number retrieved objects. following aspects are examined: bandwidth usage, CPU time, memory consumption round trip delay. For our several prototypes agents were implemented; these can retrieve single ifTable elements, rows, columns or entire ifTable. presents a generic formula calculate SNMP's requirements; was...

10.1109/tnsm.2004.4798292 article EN IEEE Transactions on Network and Service Management 2004-12-01

In recent years, emerging technologies such as the Internet of Things gain increasing interest in various communities. However, majority IoT devices have little or no protection at software and infrastructure levels thus are also opening up new vulnerabilities that might be misused by cybercriminals to perform large-scale cyber attacks means botnets. These kind lead service outages cause enormous financial loss, image reputation damage. One approach proactively block spreading botnets is...

10.1109/nof.2018.8598138 article EN 2018-11-01

Abstract Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of foundations their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose novel notion a responsible Internet, which provides higher degrees trust for critical service providers (e.g., power grids) all kinds other users by improving transparency, accountability, controllability Internet at...

10.1007/s10922-020-09564-7 article EN cc-by Journal of Network and Systems Management 2020-09-07

It is often assumed that Internet traffic exhibits Gaussian characteristics, and this assumption has been validated in various studies of real traffic. Less known, however, about possible boundaries: at what timescales how much user aggregation required for to be Gaussian? The goal paper investigate these questions by analyzing hundreds traces, collected four representative locations. To assess whether Gaussian, the starts with introducing an easy fast procedure, based on earlier work Kilpi...

10.1109/icc.2006.254856 article EN IEEE International Conference on Communications 2006-01-01
Coming Soon ...