Follow
Marcin Nawrocki
Marcin Nawrocki
Verified email at fu-berlin.de - Homepage
Title
Cited by
Year
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
M Nawrocki, J Kristoff, R Hiesgen, C Kanich, TC Schmidt, M Wählisch
arXiv preprint arXiv:2302.04614, 2023
12023
On the Interplay between TLS Certificates and QUIC Performance
M Nawrocki, PF Tehrani, R Hiesgen, J Mücke, TC Schmidt, M Wählisch
Proc. of CoNEXT 2022, 204-213, 2022
62022
Waiting for QUIC: On the opportunities of passive measurements to understand QUIC deployments
J Mücke, M Nawrocki, R Hiesgen, P Sattler, J Zirngibl, G Carle, ...
arXiv preprint arXiv:2209.00965, 2022
42022
The Race to the Vulnerable: Measuring the Log4j Shell Incident
R Hiesgen, M Nawrocki, TC Schmidt, M Wählisch
Proc. of TMA 2022, 2022
232022
Securing Name Resolution in the IoT: DNS over CoAP
MS Lenders, C Amsüss, C Gündogan, M Nawrocki, TC Schmidt, ...
arXiv preprint arXiv:2207.07486, 2022
12022
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope
R Hiesgen, M Nawrocki, A King, A Dainotti, TC Schmidt, M Wählisch
Proc. of USENIX Sec 2022, 431-448, 2022
172022
Transparent Forwarders: An Unnoticed Component of the Open DNS Infrastructure
M Nawrocki, M Koch, TC Schmidt, M Wählisch
Proc. of CoNEXT 2021, 454-462, 2021
112021
The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core
M Nawrocki, M Jonker, TC Schmidt, M Wählisch
Proc. of IMC 2021, 419-434, 2021
142021
QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events
M Nawrocki, R Hiesgen, TC Schmidt, M Wählisch
Proc. of IMC 2021, 283-291, 2021
122021
Uncovering Vulnerable Industrial Control Systems from the Internet Core
M Nawrocki, TC Schmidt, M Wählisch
Proc. of NOMS 2020, 1-9, 2020
37*2020
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs
M Nawrocki, J Blendin, C Dietzel, TC Schmidt, M Wählisch
Proc. of IMC 2019, 435-448, 2019
292019
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP
N Hinze, M Nawrocki, M Jonker, A Dainotti, TC Schmidt, M Wählisch
Proc. of SIGCOMM 2018 Posters & Demos, 57-59, 2018
192018
Towards Distributed Threat Intelligence in Real-Time
P Meyer, R Hiesgen, TC Schmidt, M Nawrocki, M Wählisch
Proc. of SIGCOMM 2017 Posters & Demos, 76-78, 2017
22017
A Survey on Honeypot Software and Data Analysis
M Nawrocki, M Wählisch, TC Schmidt, C Keil, J Schönfelder
arXiv preprint arXiv:1608.06249, 2016
2022016
Design, Implementation, and Operation of a Mobile Honeypot
M Wählisch, A Vorbach, C Keil, J Schönfelder, TC Schmidt, JH Schiller
arXiv preprint arXiv:1301.7257, 2013
332013
The system can't perform the operation now. Try again later.
Articles 1–15