CompactFlow: A Hybrid Binary Format for Network Flow Data

Author(s):  
Michal Piskozub ◽  
Riccardo Spolaor ◽  
Ivan Martinovic
Keyword(s):  
Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1747
Author(s):  
Hansaka Angel Dias Edirisinghe Kodituwakku ◽  
Alex Keller ◽  
Jens Gregor

The complexity and throughput of computer networks are rapidly increasing as a result of the proliferation of interconnected devices, data-driven applications, and remote working. Providing situational awareness for computer networks requires monitoring and analysis of network data to understand normal activity and identify abnormal activity. A scalable platform to process and visualize data in real time for large-scale networks enables security analysts and researchers to not only monitor and study network flow data but also experiment and develop novel analytics. In this paper, we introduce InSight2, an open-source platform for manipulating both streaming and archived network flow data in real time that aims to address the issues of existing solutions such as scalability, extendability, and flexibility. Case-studies are provided that demonstrate applications in monitoring network activity, identifying network attacks and compromised hosts and anomaly detection.


2018 ◽  
Vol 113 (522) ◽  
pp. 519-533 ◽  
Author(s):  
Xi Chen ◽  
Kaoru Irie ◽  
David Banks ◽  
Robert Haslinger ◽  
Jewell Thomas ◽  
...  

Author(s):  
D. Phan ◽  
J. Gerth ◽  
M. Lee ◽  
A. Paepcke ◽  
T. Winograd

2012 ◽  
Vol 2 (3) ◽  
pp. 71-73 ◽  
Author(s):  
Kiran Bejjanki ◽  
A. Bhaskar

In this paper we present an approach for identifying networkanomalies by visualizing network flow data which is stored inweblogs. Various clustering techniques can be used to identifydifferent anomalies in the network. Here, we present a newapproach based on simple K-Means for analyzing networkflow data using different attributes like IP address, Protocol,Port number etc. to detect anomalies. By using visualization,we can identify which sites are more frequently accessed bythe users. In our approach we provide overview about givendataset by studying network key parameters. In this processwe used preprocessing techniques to eliminate unwantedattributes from weblog data.


Author(s):  
Mohamed Nassar ◽  
Bechara al Bouna ◽  
Qutaibah Malluhi

Author(s):  
Eric D. Kolaczyk ◽  
Gábor Csárdi
Keyword(s):  

Author(s):  
Henry Clausen ◽  
Mark Briers ◽  
Niall M. Adams
Keyword(s):  

Computing ◽  
2013 ◽  
Vol 96 (1) ◽  
pp. 15-26 ◽  
Author(s):  
Lothar Braun ◽  
Mario Volke ◽  
Johann Schlamp ◽  
Alexander von Bodisco ◽  
Georg Carle

2016 ◽  
Author(s):  
Jędrzej Bieniasz ◽  
Mariusz Rawski ◽  
Krzysztof Skowron ◽  
Mateusz Trzepiński

Sign in / Sign up

Export Citation Format

Share Document