Difference between revisions of "Anna Sperotto"

From SimpleWiki
Jump to navigationJump to search
 
(5 intermediate revisions by 2 users not shown)
Line 33: Line 33:
 
<DIV style="text-align:justify">
 
<DIV style="text-align:justify">
 
== Biography ==
 
== Biography ==
 +
Anna Sperotto is a PostDoc researcher at the Design and Analysis of Communication Systems (DACS) group, at the University of Twente, The Netherlands. Anna obtained her PhD in October 2010 at the University of Twente, and her BSc and MSc in Computer Science at the University Ca' Foscari, Venice, Italy.
 +
 +
Anna's main topics of interest are Network Security, Monitoring and Modeling.
  
 
== PhD project description ==
 
== PhD project description ==
Line 55: Line 58:
  
 
== Recent publications ==
 
== Recent publications ==
# Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko Pras, "The Network Data Handling War: MySQL vs NfDump", Proceedings of the 16th EUNICE Open European Summer School 2010 (EUNICE 2010), 28-30 June 2010, Trondheim, Norway. (to appear)
+
#Moreira Moura, G. C., and Sperotto, A., and Sadre, R. and Pras, A. Evaluating Third- Party Bad Neighborhood Blacklists for Spam Detection In: 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 27-31 May 2013, Ghent, Brussel
# Sperotto, A., Schaffrath, G.,Sadre, R., Morariu, C., Pras, A., Stiller, B. "An Overview of IP Flow-based Intrusion Detection" In: IEEE Communications Surveys & Tutorials. (to appear)
+
# Hofstede, R., and Drago, I., and Sperotto, A., and Sadre, R. and Pras, A. Measurement Artifacts in NetFlow Data In: Proceedings of the Passive and Active Measurement conference (PAM 2013), 18-20 May 2013, Hong Kong, China '''Best Paper Award'''
# Pras, A., Sadre, R., Sperotto, A., Fioreze, T., Hausheer, D., Schönwälder, J.: "Using NetFlow/IPFIX for Network Management" In: Journal of Network and Systems Management
+
#Drago, I. and Mellia, M. and Munafò, M. M. and Sperotto, A. and Sadre, R. and Pras, A. Inside Dropbox: Understanding Personal Cloud Storage Services. In: Proceedings of the 12th ACM Internet Measurement Conference - IMC'12, Boston, Nov. 2012 '''Awarded with the IRTF Applied Networking Research Prize 2013'''
# Sperotto, A., Sadre, R., de Boer, P.-T., Pras, A. "Hidden Markov Model modeling of SSH brute-force attacks" In: 20th IEEE/IFIP International Workshop on Distributed Systems: Operation and Management (DSOM 09). Best paper award
+
#Hellemons, L., Hendriks, L., Hofstede, R., Sperotto, A., Sadre, R., and Pras, A. SSHCure: A Flow-Based SSH Intrusion Detection System In: Proceedings of the 6th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2012) '''Best Paper Award'''
# Sperotto, A., Sadre, R., van Vliet, F., Pras, A. "A Labeled Data Set For Flow-based Intrusion Detection" In: 9th IEEE International Workshop on IP Operations and Management (IPOM 09).
+
# Sperotto, A. and Mandjes, M. and Sadre, R. and de Boer, P.T. and Pras, A. Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study , In IEEE Transactions on Network and Service Management (2012)
# Sperotto, A., Vliek, G., Sadre, R., Pras, A. "Detecting spam at the network level" In: Eunice workshop 2009
 
# Fioreze, T., Zambenedetti Granville,L. Pras, A., Sperotto,A. and Sadre, R. "Self-management of Hybrid Networks: can we trust NetFlow data?" In: Mini-conference proceedings of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM 2009)  
 
 
 
  
== Additional information ==
 
  
 +
You can find a complete list of publications [http://eprints.eemcs.utwente.nl/view/author/Sperotto,_A.html here].
  
 
== External links ==
 
== External links ==
* [_URL_ Homepage] of Anna Sperotto
+
* [http://wwwhome.cs.utwente.nl/~sperottoa Homepage] of Anna Sperotto
* Publications of Anna Sperotto, as [http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/_XXXX_  indexed by DBLP]
+
* Publications of Anna Sperotto, as [http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/s/Sperotto:Anna.html indexed by DBLP]
  
 
[[Category:PhD students]]
 
[[Category:PhD students]]
 
[[Category:People]]
 
[[Category:People]]
 +
[[Category:Flamingo Project]]

Latest revision as of 12:26, 18 June 2013

Summary
Student: Anna Sperotto
Title: High-Speed Self-Learning Network Intrusion Detection
e-mail: a.sperotto@utwente.nl
Affiliation: UT
Supervisor: Aiko Pras
Committee:
Start: 2006
End: 2010
Funding: UT

Biography

Anna Sperotto is a PostDoc researcher at the Design and Analysis of Communication Systems (DACS) group, at the University of Twente, The Netherlands. Anna obtained her PhD in October 2010 at the University of Twente, and her BSc and MSc in Computer Science at the University Ca' Foscari, Venice, Italy.

Anna's main topics of interest are Network Security, Monitoring and Modeling.

PhD project description

Intrusion Detection (ID) aims to recognise malicious activities in the monitored system, through the analysis of massive quantities of data (audit data, log files, network packets, flows). In particular, in the past few year there has been an increasing interest in ID for IP networks, in order to provide a secure network environment and services. The first phase of ID saw 10/100Mbps networks as protagonists: the wire speed permitted a deep inspection of all the traffic, as well as the amount of data allowed the researchers to consider payload based analysis methodologies. Nowadays, this scenario is not exhaustive anymore. This PhD project, in front of the the spread of 1-10Gbps technology and the offer of new on-line services, faces the necessity of developing systems that can cope with the always increasing network speed and quantity of data to be analysed. The most promising approach to this problem is in our opinion the use of aggregated network information, as it is with flow-based techniques. At the same time, this PhD project also aims to address the problem of adaptability in high-speed networks, i.e. self-learning solutions that permit a fast reconfiguration of the system in order to recognise new threats and reduce the need of human interaction.


Recent publications

  1. Moreira Moura, G. C., and Sperotto, A., and Sadre, R. and Pras, A. Evaluating Third- Party Bad Neighborhood Blacklists for Spam Detection In: 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 27-31 May 2013, Ghent, Brussel
  2. Hofstede, R., and Drago, I., and Sperotto, A., and Sadre, R. and Pras, A. Measurement Artifacts in NetFlow Data In: Proceedings of the Passive and Active Measurement conference (PAM 2013), 18-20 May 2013, Hong Kong, China Best Paper Award
  3. Drago, I. and Mellia, M. and Munafò, M. M. and Sperotto, A. and Sadre, R. and Pras, A. Inside Dropbox: Understanding Personal Cloud Storage Services. In: Proceedings of the 12th ACM Internet Measurement Conference - IMC'12, Boston, Nov. 2012 Awarded with the IRTF Applied Networking Research Prize 2013
  4. Hellemons, L., Hendriks, L., Hofstede, R., Sperotto, A., Sadre, R., and Pras, A. SSHCure: A Flow-Based SSH Intrusion Detection System In: Proceedings of the 6th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2012) Best Paper Award
  5. Sperotto, A. and Mandjes, M. and Sadre, R. and de Boer, P.T. and Pras, A. Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study , In IEEE Transactions on Network and Service Management (2012)


You can find a complete list of publications here.

External links