2010 International Conference on Intelligent System Design and Engineering Application 2010
DOI: 10.1109/isdea.2010.337
|View full text |Cite
|
Sign up to set email alerts
|

Next Generation Internet Traffic Monitoring System Based on NetFlow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Concerning non-eBPF technologies, the de-facto monitoring protocols are NetFlow and IPFIX [27], its open counterpart. A famous compliant implementation used also as evaluation metric in this paper is nProbe [5], which relies on different underlying packet processing technologies (PF_RING 5 and libpcap 6 ). However, it does not support changing the monitoring pipeline at runtime, hence extracting a constant set of features from the traffic.…”
Section: B Non-ebpf Based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Concerning non-eBPF technologies, the de-facto monitoring protocols are NetFlow and IPFIX [27], its open counterpart. A famous compliant implementation used also as evaluation metric in this paper is nProbe [5], which relies on different underlying packet processing technologies (PF_RING 5 and libpcap 6 ). However, it does not support changing the monitoring pipeline at runtime, hence extracting a constant set of features from the traffic.…”
Section: B Non-ebpf Based Approachesmentioning
confidence: 99%
“…• Second, it evaluates the fully-adaptive network monitoring methodology and compares it against nProbe [5], a NetFlow-compatible [6] implementation, and the adaptive and a non-adaptive approach in eBPF, reporting significant advantages in terms of number of network packets processed and memory consumption of adopting such methodology. The rest of the paper is structured as follows: Section II reviews and discusses related works.…”
Section: Introductionmentioning
confidence: 99%
“…NetFlow data has been used for intrusion detection system development [7], [10], [13], [14] and bandwidth evaluation and provisioning in both Campus [4] and public networks [9], [15].…”
Section: Related Workmentioning
confidence: 99%
“…Existing research on IP network behavior analysis mainly focus on traffic pattern analysis [1][2][3][4][5][6][7][8] , anomaly detection [9][10][11][12] , traffic classification and application protocol identification [13] , user behavior analysis and model building [14 -16] , analysis system building [15][16][17][18][19][20] .…”
Section: Introductionmentioning
confidence: 99%
“…Zhang J. and Liu Y. [18][19] et al constructed NetFlow IPv6 traffic monitoring and behavior analysis system.…”
Section: Introductionmentioning
confidence: 99%