2020
DOI: 10.1109/tnsm.2020.3034278
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Network-Wide Flow Data With Flowyager

Abstract: Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori un… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 73 publications
0
1
0
Order By: Relevance
“…Contrary to other papers that use linear objective functions, we employ quadratic optimization that is better suited for this application domain. From the network monitoring research, network traffic analysis and visualization tools like NVisionIP [25], Flowyager [26] and VITALflow [27] have been designed for the purpose of network security [25,28,29] and management [26,27]. To the best of our knowledge, none of these tools can reliably project the flow traffic on each link, unless making assumptions on the underlying router configurations, which can be difficult to obtain for larger networks.…”
Section: Introductionmentioning
confidence: 99%
“…Contrary to other papers that use linear objective functions, we employ quadratic optimization that is better suited for this application domain. From the network monitoring research, network traffic analysis and visualization tools like NVisionIP [25], Flowyager [26] and VITALflow [27] have been designed for the purpose of network security [25,28,29] and management [26,27]. To the best of our knowledge, none of these tools can reliably project the flow traffic on each link, unless making assumptions on the underlying router configurations, which can be difficult to obtain for larger networks.…”
Section: Introductionmentioning
confidence: 99%