Flow monitoring explained: From packet capture to data analysis with netflow and ipfix

R Hofstede, P Čeleda, B Trammell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Flow monitoring has become a prevalent method for monitoring traffic in high-speed
networks. By focusing on the analysis of flows, rather than individual packets, it is often said …

Managing IoT cyber-security using programmable telemetry and machine learning

A Sivanathan, HH Gharakheili… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber-security risks for Internet of Things (IoT) devices sourced from a diversity of vendors
and deployed in large numbers, are growing rapidly. Therefore, management of these …

Flow length and size distributions in campus Internet traffic

P Jurkiewicz, G Rzym, P Boryło - Computer Communications, 2021 - Elsevier
The efficiency of flow-based networking mechanisms strongly depends on traffic
characteristics and should thus be assessed using accurate flow models. For example, in …

IoT behavioral monitoring via network traffic analysis

A Sivanathan - arXiv preprint arXiv:2001.10632, 2020 - arxiv.org
Smart homes, enterprises, and cities are increasingly being equipped with a plethora of
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …

Retina: analyzing 100GbE traffic on commodity hardware

G Wan, F Gong, T Barbette, Z Durumeric - Proceedings of the ACM …, 2022 - dl.acm.org
As network speeds have increased to over 100 Gbps, operators and researchers have lost
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …

Using security logs for collecting and reporting technical security metrics

R Vaarandi, M Pihelgas - 2014 ieee military communications …, 2014 - ieeexplore.ieee.org
During recent years, establishing proper metrics for measuring system security has received
increasing attention. Security logs contain vast amounts of information which are essential …

Flow-based compromise detection: Lessons learned

R Hofstede, A Pras, A Sperotto… - IEEE security & …, 2018 - ieeexplore.ieee.org
Although the aggregated nature of exported flow data provides many advantages in terms of
privacy and scalability, flow data may contain artifacts that impair data analysis. In this …

Assessing the quality of flow measurements from OpenFlow devices

L Hendriks, R de Oliveira Schmidt… - … Workshop on Traffic …, 2016 - research.utwente.nl
Since its initial proposal in 2008, OpenFlow has evolved to become today's main enabler of
Software-Defined Networking. OpenFlow specifies operations for network forwarding …

Analysis of fog computing: an integrated internet of things (IoT) fog cloud infrastructure for big data analytics and cyber security

N Raj - 2023 International Conference on Artificial Intelligence …, 2023 - ieeexplore.ieee.org
The phrase" internet of things"(IoT) is used to refer to the proliferation of non-traditional
computer devices that can transmit and receive data and instructions through the internet …

[HTML][HTML] flow-models: A framework for analysis and modeling of IP network flows

P Jurkiewicz - SoftwareX, 2022 - Elsevier
Recent developments in SDN technologies have resulted in flow-based forwarding
becoming are a feasible alternative for traditional mechanisms. However, as the efficiency of …