Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Luuk Hendriks is active.

Publication


Featured researches published by Luuk Hendriks.


autonomous infrastructure management and security | 2012

SSHCure: a flow-based SSH intrusion detection system

Laurens Hellemons; Luuk Hendriks; Rick Hofstede; Anna Sperotto; Ramin Sadre; Aiko Pras

SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the inspection of individual packets and, hence, do not scale to todays high-speed networks. To overcome this issue, this paper proposes SSHCure, a flow-based intrusion detection system for SSH attacks. It employs an efficient algorithm for the real-time detection of ongoing attacks and allows identification of compromised attack targets. A prototype implementation of the algorithm, including a graphical user interface, is implemented as a plugin for the popular NfSen monitoring tool. Finally, the detection performance of the system is validated with empirical traffic data.


acm special interest group on data communication | 2014

SSH Compromise Detection using NetFlow/IPFIX

Rick Hofstede; Luuk Hendriks; Anna Sperotto; Aiko Pras

Flow-based approaches for SSH intrusion detection have been developed to overcome the scalability issues of host-based alternatives. Although the detection of many SSH attacks in a flow-based fashion is fairly straightforward, no insight is typically provided in whether an attack was successful. We address this shortcoming by presenting a detection algorithm for the flow-based detection of compromises, i.e., hosts that have been compromised during an attack. Our algorithm has been implemented as part of our open-source IDS SSHCure and validated using almost 100 servers, workstations and honeypots, featuring an accuracy close to 100%.


ieee international conference on cloud networking | 2015

Mobility and bandwidth prediction as a service in virtualized LTE systems

Morteza Karimzadeh; Zhongliang Zhao; Luuk Hendriks; Ricardo de Oliveira Schmidt; Sebastiaan la Fleur; Hans van den Berg; Aiko Pras; Torsten Braun; Marius Iulian Corici

Recently telecommunication industry benefits from infrastructure sharing, one of the most fundamental enablers of cloud computing, leading to emergence of the Mobile Virtual Network Operator (MVNO) concept. The most momentous intents by this approach are the support of on-demand provisioning and elasticity of virtualized mobile network components, based on data traffic load. To realize it, during operation and management procedures, the virtualized services need be triggered in order to scale-up/down or scale-out/in an service instance. In this paper we propose an architecture called MOBaaS (Mobility and Bandwidth Availability Prediction as a Service), comprising two algorithms in order to predict user(s) mobility and network link bandwidth availability, that can be implemented in cloud based mobile network structure and can be used as a support service by any other virtualized mobile network service. MOBaaS can provide prediction information in order to generate required triggers for on-demand deploying, provisioning, disposing of virtualized network components. This information can be used for self-adaptation procedures and optimal network function configuration during run-time operation, as well. Through the preliminary experiments with the prototype implementation on the OpenStack platform, we evaluated and confirmed the feasibility and the effectiveness of the prediction algorithms and the proposed architecture.


vehicular networking conference | 2011

Oldest packet drop (OPD): A buffering mechanism for beaconing in IEEE 802.11p VANETs (poster)

Martijn van Eenennaam; Luuk Hendriks; Georgios Karagiannis; Geert Heijenk

The IEEE 802.11p MAC technology can be used to provide connectivity for real-time vehicle control known as Cooperative Adaptive Cruise Control. Due to the real-time nature of this system, it is paramount the delay of the received information is as small as possible. This paper researches the Oldest Packet Drop buffering mechanism to increase freshness of beacons compared to the standard EDCA transmission queues, which have a tail-drop policy. We find that using the Oldest Packet Drop buffering mechanism instead of the standard tail-drop can significantly improve the freshness of the received beacons by reducing the queueing delay experienced by the beacons under near-saturation conditions.


autonomous infrastructure management and security | 2015

Characterizing the IPv6 security landscape by large-scale measurements

Luuk Hendriks; Anna Sperotto; Aiko Pras

Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are overlooked, even those that are emphasized in literature. Reusing existing security solutions for IPv4 might seem easy and cost-effective, but is based on the unproven assumption that IPv6 attack traffic features the same characteristics. By performing network measurements and analyzing IPv6 attacks on the network-level, we determine the current state of security in the IPv6 domain. With the inevitable switch to the new protocol version, assessing the applicability of existing security approaches and determining the requirements for new solutions becomes a necessity.


traffic monitoring and analysis | 2017

Threats and surprises behind IPv6 extension headers

Luuk Hendriks; Petr Velan; Ricardo de Oliveira Schmidt; Pieter-Tjerk de Boer; Aiko Pras

The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header — a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate traffic as well. To determine whether threats indeed occur, and evaluate the actual nature of the traffic, measurement solutions need to be adapted. By implementing these specific parsing capabilities in flow exporters and performing measurements on two different production networks, we show it is feasible to quantify the metrics directly related to these threats, and thus allow for monitoring and detection. Analysing the traffic that is hidden behind Extension Headers, we find mostly benign traffic that directly affects end-user QoE: simply dropping all traffic containing Extension Headers is thus a bad practice with more consequences than operators might be aware of.


conference on network and service management | 2017

IPv6-specific misconfigurations in the DNS

Luuk Hendriks; Pieter-Tjerk de Boer; Aiko Pras

With the Internet transitioning from IPv4 to IPv6, the number of IPv6-specific DNS records (AAAA) increases. Misconfigurations in these records often go unnoticed, as most systems are provided with connectivity over both IPv4 and IPv6, and automatically fall back to IPv4 in case of connection problems. With IPv6-only networks on the rise, such misconfigurations result in servers or services rendered unreachable. Using long-term active DNS measurements over multiple zones, we qualify and quantify these IPv6-specific misconfigurations. Applying pattern matching on AAAA records revealed which configuration mistakes occur most, the distribution of faulty records per DNS operator, and how these numbers evolved over time. We show that more than 97% of invalid records can be categorized into one of our ten defined main configuration mistakes. Furthermore, we show that while the number and ratio of invalid records decreased over the last two years, the number of DNS operators with at least one faulty AAAA record increased. This emphasizes the need for easily applicable checks in DNS management systems, for which we provide recommendations in the conclusions of this work.


autonomous infrastructure management and security | 2017

Flow-Based Detection of IPv6-specific Network Layer Attacks

Luuk Hendriks; Petr Velan; Ricardo de Oliveira Schmidt; Pieter-Tjerk de Boer; Aiko Pras

With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been proposed. In this study we identify and characterise IPv6-specific attacks that can be detected using flow monitoring. By constructing flow-based signatures, detection can be performed using available technologies such as NetFlow and IPFIX. To validate our approach, we implemented these signatures in a prototype, monitoring two production networks and injecting attacks into the production traffic.


Journal of Network and Systems Management | 2016

Flow-Based Network Management: A Report from the IRTF NMRG Workshop

Ricardo de Oliveira Schmidt; Ramin Sadre; Luuk Hendriks

AbstractThis is the report on the Workshop on Flow-Based Network Management, held within the 37th IRTF NMRG meeting, during IETF 93, on 24th July 2015, in Prague, Czech Republic. Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level traffic measurements for network management.


Lecture Notes in Computer Science | 2012

SSHCure: A Flow-Based SSH Intrusion Detection System

Laurens Hellemons; Luuk Hendriks; Rick Hofstede; Anna Sperotto; Ramin Sadre; Aiko Pras

Collaboration


Dive into the Luuk Hendriks's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ramin Sadre

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

Ramin Sadre

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge