Follow
Rick Hofstede
Title
Cited by
Cited by
Year
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX
R Hofstede, P Celeda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras
IEEE Communication Surveys & Tutorials 16 (4), 2037-2064, 2014
6292014
Booters-An analysis of DDoS-as-a-Service Attacks
JJ Santanna, R van Rijswijk-Deij, A Sperotto, R Hofstede, M Wierbosch, ...
Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and …, 2014
2382014
SSHCure: A Flow-Based SSH Intrusion Detection System
L Hellemons, L Hendriks, R Hofstede, A Sperotto, R Sadre, A Pras
Dependable Networks and Services, 86-97, 2012
1172012
SSH compromise detection using NetFlow/IPFIX
R Hofstede, L Hendriks, A Sperotto, A Pras
ACM SIGCOMM computer communication review 44 (5), 20-26, 2014
842014
Towards Real-Time Intrusion Detection for NetFlow and IPFIX
R Hofstede, V Bartos, A Sperotto, A Pras
Network and Service Management (CNSM), 2013 9th International Conference on …, 2013
792013
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
562017
Flow-based web application brute-force attack and compromise detection
R Hofstede, M Jonker, A Sperotto, A Pras
Journal of network and systems management 25, 735-758, 2017
522017
Attacks by “Anonymous” WikiLeaks Proponents not Anonymous
A Pras, A Sperotto, G Moura, I Drago, R Barbosa, R Sadre, R Schmidt, ...
University of Twente, Centre for Telematics and, 2010
512010
Measurement Artifacts in NetFlow Data
R Hofstede, I Drago, A Sperotto, R Sadre, A Pras
Passive and Active Measurement, 1-10, 2013
352013
SURFmap: A Network Monitoring Tool Based on the Google Maps API
R Hofstede, T Fioreze
Integrated Network Management, 2009. IM'09. IFIP/IEEE International …, 2009
352009
The Network Data Handling War: MySQL vs NfDump
R Hofstede, A Sperotto, T Fioreze, A Pras
Networked Services and Applications-Engineering, Control and Management, 167-176, 2010
282010
Towards multi-layered intrusion detection in high-speed networks
M Golling, R Hofstede, R Koch
2014 6th International Conference on Cyber Conflict (CyCon 2014), 191-206, 2014
272014
Flow-based compromise detection: Lessons learned
R Hofstede, A Pras, A Sperotto, GD Rodosek
IEEE security & privacy 16 (1), 82-89, 2018
262018
Real-time DDoS attack detection for Cisco IOS using NetFlow
D van der Steeg, R Hofstede, A Sperotto, A Pras
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
262015
Unveiling flat traffic on the internet: an SSH attack case study
M Jonker, R Hofstede, A Sperotto, A Pras
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
192015
Pavel ˇCeleda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, and Aiko Pras. Flow monitoring explained: From packet capture to data analysis with netflow and ipfix
R Hofstede
IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014
172014
A first look at HTTP (S) intrusion detection using NetFlow/IPFIX
O van der Toorn, R Hofstede, M Jonker, A Sperotto
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
162015
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach
R Hofstede, A Pras
Dependable Networks and Services, 109-112, 2012
112012
Carrier Ethernet OAM: An Overview and Comparison to IP OAM
R Hofstede, I Drago, G Moura, A Pras
Managing the Dynamics of Networks and Services, 112-123, 2011
82011
Unveiling sshcure 3.0: Flow-based ssh compromise detection
RJ Hofstede, L Hendriks
2015 International Conference and Workshops on Networked Systems, NetSys 2015, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20