Follow
John Kristoff
John Kristoff
DePaul University, The University of Illinois Chicago
Verified email at depaul.edu - Homepage
Title
Cited by
Cited by
Year
Botnets, detection and mitigation: DNS-based techniques
J Kristoff
http://aharp. ittns. northwestern. edu/talks/bots-dns. pdf, 2005
2772005
Botnets
J Kristoff
http://www. nanog. org/mtg-0410/kristoff. html, 2004
572004
Visualizing DNS traffic
P Ren, J Kristoff, B Gooch
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
502006
Tales of favicons and caches: Persistent tracking in modern browsers
K Solomos, J Kristoff, C Kanich, J Polakis
Network and Distributed System Security Symposium, 2021
232021
On the Potential Abuse of IGMP
M Sargent, J Kristoff, V Paxson, M Allman
ACM SIGCOMM Computer Communication Review 47 (1), 27-35, 2017
202017
On measuring RPKI relying parties
J Kristoff, R Bush, C Kanich, G Michaelson, A Phokeer, TC Schmidt, ...
Proceedings of the ACM Internet Measurement Conference, 484-491, 2020
162020
The transmission control protocol
J Kristoff
Retrieved from URL https://condor. depaul. edu/jkristof/technotes/tcp. html, 2004
152004
Anycast Addressing on the Internet
J Kristoff
Kuro5hin, December, 2003
122003
Experiences with conficker c sinkhole operation and analysis
J Kristoff
Proceedings of Australian Computer Emergency Response Team Conference 178, 2009
92009
TCP congestion control
J Kristoff
Tech Notes, 2002
82002
Botnets, detection and mitigation: DNS-based techniques, Northwestern University, 2005
J Kristoff
72004
Botnets, north american network operators group (nanog32), reston, virginia
J Kristoff
http://www. nanog. org/mtg-0410/kristoff. html, 2004
72004
Internet infrastructure security
J Nazario, J Kristoff
IEEE Security & Privacy 10 (4), 24-25, 2012
62012
Botnets, North American Network Operators Group (NANOG32), Reston, Virginia (2004)
J Kristoff
6
DNS inconsistency
J Kristoff, B Vamanan, C Kanich
Aug, 2018
52018
Botnets and packet flooding ddos attacks on the domain name system
J Kristoff, R Joffee
The International Journal of Forensic Computer Science 2, 9-18, 2007
52007
An automated incident response system using BIND query logs
J Kristoff
June, 2006
52006
Ephemeral Source Port Selection Strategies
J Kristoff
Team Cymru. August, 2015
32015
comp. Dcom. xdsl Frequently Asked Questions
J Kristoff
22006
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
M Nawrocki, J Kristoff, R Hiesgen, C Kanich, TC Schmidt, M Wählisch
arXiv preprint arXiv:2302.04614, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20