Follow
John Kristoff
Title
Cited by
Cited by
Year
Botnets, detection and mitigation: DNS-based techniques
J Kristoff
http://aharp. ittns. northwestern. edu/talks/bots-dns. pdf, 2005
2942005
Botnets
J Kristoff
North American Network Operators Group (NANOG32), 2004
582004
Visualizing DNS traffic
P Ren, J Kristoff, B Gooch
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
502006
Tales of favicons and caches: Persistent tracking in modern browsers
K Solomos, J Kristoff, C Kanich, J Polakis
Network and Distributed System Security Symposium, 2021
402021
On measuring RPKI relying parties
J Kristoff, R Bush, C Kanich, G Michaelson, A Phokeer, TC Schmidt, ...
Proceedings of the ACM Internet Measurement Conference, 484-491, 2020
232020
On the potential abuse of IGMP
M Sargent, J Kristoff, V Paxson, M Allman
ACM SIGCOMM Computer Communication Review 47 (1), 27-35, 2017
222017
The transmission control protocol
J Kristoff
Retrieved from URL https://condor. depaul. edu/jkristof/technotes/tcp. html, 2004
142004
Anycast Addressing on the Internet
J Kristoff
Kuro5hin, December, 2003
122003
Experiences with conficker c sinkhole operation and analysis
J Kristoff
Proceedings of Australian Computer Emergency Response Team Conference 178, 2009
92009
Botnets, north american network operators group (nanog32), reston, virginia
J Kristoff
http://www. nanog. org/mtg-0410/kristoff. html, 2004
82004
TCP congestion control
J Kristoff
Tech Notes, 2002
82002
An automated incident response system using BIND query logs
J Kristoff
June, 2006
72006
Botnets, detection and mitigation: DNS-based techniques, Northwestern University, 2005
J Kristoff
72004
Internet infrastructure security
J Nazario, J Kristoff
IEEE Security & Privacy 10 (4), 24-25, 2012
62012
The trouble with UDP scanning
J Kristoff
DePaul University, Chicago, IL, 2002
62002
Botnets, North American Network Operators Group (NANOG32), Reston, Virginia (2004)
J Kristoff
6
DNS inconsistency
J Kristoff, B Vamanan, C Kanich
Aug, 2018
52018
Botnets and packet flooding ddos attacks on the domain name system
J Kristoff, R Joffee
The International Journal of Forensic Computer Science 2, 9-18, 2007
52007
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
M Nawrocki, J Kristoff, R Hiesgen, C Kanich, TC Schmidt, M Wählisch
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 576-591, 2023
42023
Plight at the End of the Tunnel: Legacy IPv6 Transition Mechanisms in the Wild
J Kristoff, M Ghasemisharif, C Kanich, J Polakis
Passive and Active Measurement: 22nd International Conference, PAM 2021 …, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20