scispace - formally typeset
Open Access

Cisco Systems NetFlow Services Export Version 9

Benoit Claise
- Vol. 3954, pp 1-33
TLDR
This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs.
Abstract
This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs. The version 9 export format uses templates to provide access to observations of IP packet flows in a flexible and extensible manner. A template defines a collection of fields, with corresponding descriptions of structure and semantics. This memo provides information for the Internet community.

read more

Citations
More filters
Book ChapterDOI

Network Analysis and Forensics

TL;DR: This chapter begins the first of four on recognition strategies by providing an introduction to the OSI model as a method of contextualizing network operations and to provide a mental model.
DissertationDOI

Measurement-based link dimensioning for the future internet

TL;DR: Focusing on proper allocation of link resources, a validated link dimensioning approaches that are easy-to-deploy and accurate are developed and validated that show that current traffic is Gaussian even though its characteristics have changed due to the recent advent of new online services.
Proceedings ArticleDOI

VizNet — Dynamic visualization of networks and internet of things

TL;DR: This work introduces here their prototype 3D visualization system for real-time monitoring of both the status of networked devices (wired, wireless, IoT devices) and the network's dynamics (“pulse”) (e.g. configuration, load, traffic, abnormal events, suspicious connections, failed IoT devices, etc.).
Proceedings ArticleDOI

Using principal component analysis for selecting network behavioral anomaly metrics

TL;DR: This work addresses new approaches to behavioral analysis of networks and hosts for the purposes of security monitoring and anomaly detection by reducing the resources required to properly identify misbehaving hosts, protocols, or networks by dedicating system resources to only those metrics that actually matter in detecting network deviations.
Journal ArticleDOI

Mobile control and management of computer networks using SMS services

TL;DR: By introducing a novel method for mobile control and management of computer and telecommunication networks, network administrators will be able to control and manage their networks fully just by sending a short message rather than needing access to the Internet or having to be present physically on the spot.
Related Papers (5)