Millions of targets under attack: a macroscopic characterization of the DoS ecosystem M Jonker, A King, J Krupp, C Rossow, A Sperotto, A Dainotti Proceedings of the 2017 Internet Measurement Conference, 100-113, 2017 | 177 | 2017 |
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras IEEE Journal on Selected Areas in Communications 34 (6), 1877-1888, 2016 | 151 | 2016 |
Measuring the Adoption of DDoS Protection Services M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras Proceedings of the 2016 ACM on Internet Measurement Conference, 279-285, 2016 | 96 | 2016 |
Flow-Based Web Application Brute-Force Attack and Compromise Detection R Hofstede, M Jonker, A Sperotto, A Pras Journal of Network and Systems Management 25 (4), 735-758, 2017 | 57 | 2017 |
A Responsible Internet to Increase Trust in the Digital World C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ... Journal of Network and Systems Management 28 (4), 882-922, 2020 | 51 | 2020 |
At home and abroad: The use of denial-of-service attacks during elections in nondemocratic regimes PM Lutscher, NB Weidmann, ME Roberts, M Jonker, A King, A Dainotti Journal of Conflict Resolution 64 (2-3), 373-401, 2020 | 50 | 2020 |
When parents and children disagree: Diving into DNS delegation inconsistency R Sommese, GCM Moura, M Jonker, R van Rijswijk-Deij, A Dainotti, ... International Conference on Passive and Active Network Measurement, 175-189, 2020 | 36 | 2020 |
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild M Jonker, A Pras, A Dainotti, A Sperotto Proceedings of the Internet Measurement Conference 2018, 457-463, 2018 | 36 | 2018 |
The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core M Nawrocki, M Jonker, TC Schmidt, M Wählisch Proceedings of the 21st ACM Internet Measurement Conference, 419-434, 2021 | 31 | 2021 |
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC R van Rijswijk-Deij, M Jonker, A Sperotto 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 31 | 2016 |
MAnycast2: Using Anycast to Measure Anycast R Sommese, L Bertholdo, G Akiwate, M Jonker, R van Rijswijk-Deij, ... Proceedings of the ACM Internet Measurement Conference, 456-463, 2020 | 30 | 2020 |
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations G Akiwate, M Jonker, R Sommese, I Foster, GM Voelker, S Savage, ... Proceedings of the ACM Internet Measurement Conference, 281-294, 2020 | 25 | 2020 |
Who's got your mail? Characterizing mail service provider usage E Liu, G Akiwate, M Jonker, A Mirian, S Savage, GM Voelker Proceedings of the 21st ACM Internet Measurement Conference, 122-136, 2021 | 21 | 2021 |
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP N Hinze, M Nawrocki, M Jonker, A Dainotti, TC Schmidt, M Wählisch Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 57-59, 2018 | 21 | 2018 |
The Internet of names: A DNS big dataset R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 21 | 2015 |
Investigating the impact of DDoS attacks on DNS infrastructure R Sommese, KC Claffy, R van Rijswijk-Deij, A Chattopadhyay, A Dainotti, ... Proceedings of the 22nd ACM Internet Measurement Conference, 51-64, 2022 | 20 | 2022 |
Unveiling flat traffic on the Internet: An SSH attack case study M Jonker, R Hofstede, A Sperotto, A Pras 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 20 | 2015 |
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure R Sommese, G Akiwate, M Jonker, GCM Moura, M Davids, ... Network Traffic Measurement and Analysis Conference (TMA'21), 2021 | 17 | 2021 |
Hosting Industry Centralization and Consolidation L Zembruzki, R Sommese, LZ Granville, AS Jacobs, M Jonker, ... NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2022 | 16 | 2022 |
A first look at HTTP (S) intrusion detection using NetFlow/IPFIX O van der Toorn, R Hofstede, M Jonker, A Sperotto 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 16 | 2015 |