Difference between revisions of "Anna Sperotto"

From SimpleWiki
Jump to navigationJump to search
Line 54: Line 54:
 
</DIV>
 
</DIV>
  
== References ==
+
== Recent publications ==
# Sperotto, A. and Vliek, G. and Sadre, R. and Pras, A. (2009) Detecting Spam at the Network Level. In: Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009, 7-9 Sep 2009, Barcelona. pp. 208-216. Lecture Notes in Computer Science 5733. Springer Verlag. ISSN 0302-9743  ISBN 978-3-642-03699-6
+
# Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko Pras, "The Network Data Handling War: MySQL vs NfDump", Proceedings of the 16th EUNICE Open European Summer School 2010 (EUNICE 2010), 28-30 June 2010, Trondheim, Norway. (to appear)
# Sperotto, A. and Sadre, R. and Pras, A. (2008) Anomaly Characterization in Flow-Based Traffic Time Series. In: 8th IEEE International Workshop on IP Operations and Management, IPOM 2008, 22-26 September 2008, Samos, Greece. pp. 15-27. Lecture Notes in Computer Science 5275/2008. Springer Verlag. ISSN 1611-3349  ISBN 978-3-540-87356-3
+
# Sperotto, A., Schaffrath, G.,Sadre, R., Morariu, C., Pras, A., Stiller, B. "An Overview of IP Flow-based Intrusion Detection" In: IEEE Communications Surveys & Tutorials. (to appear)
# Sperotto, A. and van de Meent, R. (2007) A Survey of the High-Speed Self-Learning Intrusion Detection Research Area. In: First International Conference on Autonomous Infrastructure, Management and Security, 21-22 Jun 2007, Oslo, Norway. pp. 196-199. Lecture Notes in Computer Science 4543. Springer Verlag. ISBN 978-3-540-72985-3
+
#  Pras, A., Sadre, R., Sperotto, A., Fioreze, T., Hausheer, D., Schönwälder, J.: "Using NetFlow/IPFIX for Network Management" In: Journal of Network and Systems Management
 +
# Sperotto, A., Sadre, R., de Boer, P.-T., Pras, A. "Hidden Markov Model modeling of SSH brute-force attacks" In: 20th IEEE/IFIP International Workshop on Distributed Systems: Operation and Management (DSOM 09). Best paper award
 +
# Sperotto, A., Sadre, R., van Vliet, F., Pras, A. "A Labeled Data Set For Flow-based Intrusion Detection" In: 9th IEEE International Workshop on IP Operations and Management (IPOM 09).
 +
# Sperotto, A., Vliek, G., Sadre, R., Pras, A. "Detecting spam at the network level" In: Eunice workshop 2009
 +
# Fioreze, T., Zambenedetti Granville,L. Pras, A., Sperotto,A. and Sadre, R. "Self-management of Hybrid Networks: can we trust NetFlow data?" In: Mini-conference proceedings of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM 2009)
 +
 
  
 
== Additional information ==
 
== Additional information ==

Revision as of 16:47, 15 May 2010

Summary
Student: Anna Sperotto
Title: High-Speed Self-Learning Network Intrusion Detection
e-mail: a.sperotto@utwente.nl
Affiliation: UT
Supervisor: Aiko Pras
Committee:
Start: 2006
End: 2010
Funding: UT

Biography

PhD project description

Intrusion Detection (ID) aims to recognise malicious activities in the monitored system, through the analysis of massive quantities of data (audit data, log files, network packets, flows). In particular, in the past few year there has been an increasing interest in ID for IP networks, in order to provide a secure network environment and services. The first phase of ID saw 10/100Mbps networks as protagonists: the wire speed permitted a deep inspection of all the traffic, as well as the amount of data allowed the researchers to consider payload based analysis methodologies. Nowadays, this scenario is not exhaustive anymore. This PhD project, in front of the the spread of 1-10Gbps technology and the offer of new on-line services, faces the necessity of developing systems that can cope with the always increasing network speed and quantity of data to be analysed. The most promising approach to this problem is in our opinion the use of aggregated network information, as it is with flow-based techniques. At the same time, this PhD project also aims to address the problem of adaptability in high-speed networks, i.e. self-learning solutions that permit a fast reconfiguration of the system in order to recognise new threats and reduce the need of human interaction.


Recent publications

  1. Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko Pras, "The Network Data Handling War: MySQL vs NfDump", Proceedings of the 16th EUNICE Open European Summer School 2010 (EUNICE 2010), 28-30 June 2010, Trondheim, Norway. (to appear)
  2. Sperotto, A., Schaffrath, G.,Sadre, R., Morariu, C., Pras, A., Stiller, B. "An Overview of IP Flow-based Intrusion Detection" In: IEEE Communications Surveys & Tutorials. (to appear)
  3. Pras, A., Sadre, R., Sperotto, A., Fioreze, T., Hausheer, D., Schönwälder, J.: "Using NetFlow/IPFIX for Network Management" In: Journal of Network and Systems Management
  4. Sperotto, A., Sadre, R., de Boer, P.-T., Pras, A. "Hidden Markov Model modeling of SSH brute-force attacks" In: 20th IEEE/IFIP International Workshop on Distributed Systems: Operation and Management (DSOM 09). Best paper award
  5. Sperotto, A., Sadre, R., van Vliet, F., Pras, A. "A Labeled Data Set For Flow-based Intrusion Detection" In: 9th IEEE International Workshop on IP Operations and Management (IPOM 09).
  6. Sperotto, A., Vliek, G., Sadre, R., Pras, A. "Detecting spam at the network level" In: Eunice workshop 2009
  7. Fioreze, T., Zambenedetti Granville,L. Pras, A., Sperotto,A. and Sadre, R. "Self-management of Hybrid Networks: can we trust NetFlow data?" In: Mini-conference proceedings of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM 2009)


Additional information

External links

  • [_URL_ Homepage] of Anna Sperotto
  • Publications of Anna Sperotto, as indexed by DBLP