2020
DOI: 10.1109/comst.2020.2989695
|View full text |Cite
|
Sign up to set email alerts
|

Why are My Flows Different? A Tutorial on Flow Exporters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…In addition, as this approach uses aggregations, it is not as privacy-sensitive as deep packet inspection, which is particularly sought for from the perspective of various privacy-related laws and legislations, such as the GDPR [40]. Some of the available formats providing these benefits, along with flow capture tools and exporters are described in [52].…”
Section: Methods 31 Flow-based Datamentioning
confidence: 99%
“…In addition, as this approach uses aggregations, it is not as privacy-sensitive as deep packet inspection, which is particularly sought for from the perspective of various privacy-related laws and legislations, such as the GDPR [40]. Some of the available formats providing these benefits, along with flow capture tools and exporters are described in [52].…”
Section: Methods 31 Flow-based Datamentioning
confidence: 99%
“…3) where srcIP (srcPort) and dstIP (dstPort) are the source and destination IP addresses (network ports) of the two involved hosts, t is the timestamp of the first connection, d is the duration of the communication session, proto is the network protocol of the communication. Depending on the NetFlow software and its configuration, additional metrics can be computed: the most typical fields include the number of packets and bytes exchanged during the communication [57].…”
Section: A Overviewmentioning
confidence: 99%
“…The definition of F is software dependent[57], and outside our scope 8. www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/…”
mentioning
confidence: 99%
“…The packet capture was processed by the Flowmon flow exporter to obtain primary flow data containing information from TLS and HTTP protocols (1). Additional statistical features were extracted using GoFlows [83] flow exporter (2). The primary flows were filtered (3) to remove incomplete records and network scans before merging the data from both exporters (4).…”
Section: Dataset Creationmentioning
confidence: 99%