Flow monitoring explained: From packet capture to data analysis with netflow and ipfix

R Hofstede, P Čeleda, B Trammell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Flow monitoring has become a prevalent method for monitoring traffic in high-speed
networks. By focusing on the analysis of flows, rather than individual packets, it is often said …

Why are my flows different? a tutorial on flow exporters

G Vormayr, J Fabini, T Zseby - IEEE Communications Surveys & …, 2020 - ieeexplore.ieee.org
Network flows build the basis of modern network data analysis by aggregating properties of
network packets with common characteristics. A consistent and unambiguous definition of …

Research challenges towards the Future Internet

M Conti, S Chong, S Fdida, W Jia, H Karl, YD Lin… - Computer …, 2011 - Elsevier
The convergence of computer-communication networks towards an all-IP integrated network
has transformed Internet in a commercial commodity that has stimulated an un-precedent …

The state of enterprise network traffic in 2012

D Murray, T Koziniec - 2012 18th Asia-Pacific Conference on …, 2012 - ieeexplore.ieee.org
Timely and accurate studies on the composition and nature of the Internet are crucial for
continued research and innovation. The aim of this research is to aid and service emulated …

Libtrace: A packet capture and analysis library

S Alcock, P Lorier, R Nelson - ACM SIGCOMM Computer …, 2012 - dl.acm.org
This paper introduces libtrace, an open-source software library for reading and writing
network packet traces. Libtrace offers performance and usability enhancements compared to …

[PDF][PDF] Breaking and improving protocol obfuscation

E Hjelmvik, W John - Chalmers University of Technology, Tech. Rep, 2010 - iis.se
Different techniques for traffic classification are utilized in various fields of application. In this
technical report, we look closer on how statistical analysis can be used to identify network …

An analysis of changing enterprise network traffic characteristics

D Murray, T Koziniec, S Zander… - 2017 23rd Asia …, 2017 - ieeexplore.ieee.org
Studies on the composition and nature of Internet protocols are crucial for continued
research and innovation. This study used three different methods to investigate the presence …

Estimating routing symmetry on single links by passive flow measurements

W John, M Dusi, KC Claffy - Proceedings of the 6th International …, 2010 - dl.acm.org
The assumption of routing symmetry is often embedded into traffic analysis and classification
tools. This paper uses passively captured network data to estimate the amount of traffic …

Towards multi-layered intrusion detection in high-speed networks

M Golling, R Hofstede, R Koch - 2014 6th International …, 2014 - ieeexplore.ieee.org
Traditional Intrusion Detection approaches rely on the inspection of individual packets, often
referred to as Deep Packet Inspection (DPI), where individual packets are scanned for …

Fluid flow approximation of time-limited TCP/UDP/XCP streams

J Domańska, A Domański, T Czachórski… - Bulletin of the Polish …, 2014 - yadda.icm.edu.pl
This article presents the use of fluid flow approximation to model interactions between a set
of TCP, UDP and XCP flows in the environment of IP routers using AQM (Active Queue …