12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops 2011
DOI: 10.1109/inm.2011.5990529
|View full text |Cite
|
Sign up to set email alerts
|

Flow-based intrusion detection

Abstract: The spread of 1-10Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, we depend on the Internet in our daily life for simple tasks such as checking emails, but also for managing private and financial information. However, entrusting such information to the Internet also means that the network has become an alluring place for hackers. To this threat, the research community has answered with an increased interest in intrusion detection.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 48 publications
(12 citation statements)
references
References 106 publications
0
12
0
Order By: Relevance
“…A common flow export protocol is Cisco's Netflow, which is supported by almost all major vendors. Internet Engineering Task Force (IETF) adopted Netflow's version 9 and standardized it as IP Flow Information Exchange (IPFIX) protocol (Sperotto and Pras, 2011). IPFIX specifies a standard architecture for collection and processing of IP flow records.…”
Section: Introductionmentioning
confidence: 99%
“…A common flow export protocol is Cisco's Netflow, which is supported by almost all major vendors. Internet Engineering Task Force (IETF) adopted Netflow's version 9 and standardized it as IP Flow Information Exchange (IPFIX) protocol (Sperotto and Pras, 2011). IPFIX specifies a standard architecture for collection and processing of IP flow records.…”
Section: Introductionmentioning
confidence: 99%
“…However, Cisco's Netflow is a common flow export and collection protocol and is supported by almost all major vendors. Due to the increased requirement of IP flow information for network management, the Internet Engineering Task Force (IETF) has standardized the flow export and collection protocol as IP Flow Information Exchange (IPFIX) protocol [19]. IPFIX is very flexible protocol and defines around 280 attributes for IP flow records.…”
Section: Introductionmentioning
confidence: 99%
“…Following this trend, security analysis applications should evolve from packet-based to flow-based solutions [3]. Research has already been performed on flow-based anomaly detection in past years, such as in [4][5][6].…”
Section: Introductionmentioning
confidence: 99%