scispace - formally typeset
Open Access

Cisco Systems NetFlow Services Export Version 9

Benoit Claise
- Vol. 3954, pp 1-33
TLDR
This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs.
Abstract
This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs. The version 9 export format uses templates to provide access to observations of IP packet flows in a flexible and extensible manner. A template defines a collection of fields, with corresponding descriptions of structure and semantics. This memo provides information for the Internet community.

read more

Citations
More filters

Scalable and efficient self-configuring networks

TL;DR: This dissertation focuses on enabling self-configuration in edge networks—corporate or university-campus, data-center, or virtual private networks—which are rapidly growing and yet significantly under-explored.

Omniscient: Towards realizing near real-time data center network traffic maps

TL;DR: Omniscient, a system that aims to increase the visibility into the data center network traffic by computing link utilization broken down by application instance using OpenFlow stats in an SDN-enabled data center, is presented.
DissertationDOI

Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence

TL;DR: In this paper, the authors used data collected from a university campus network via Deep Packet Inspection (DPI) monitoring and from the largest public BitTorrent tracker to characterize the extent of unauthorized transfers of copyrighted content using Peer-to-Peer (P2P) and to evaluate the effectiveness and limitations of DPI in detection of such activity, both to provide a perspective of how much copyright infringement happens using P2P and to inform those seeking to deploy DPI technology.
Proceedings ArticleDOI

TDSC: Two-Stage DDoS Detection and Defense System Based on Clustering

TL;DR: Results show that TDSC can detect the DDoS attack in 6 seconds and extract the features which can describe the attack traffic accurately, and with the traffic features calculated by the first stage, T DSC can filter out 99.89% of the attack Traffic in the second stage.
Journal ArticleDOI

Flow-Aggregation Accelerating Strategy for TCP Traffic

TL;DR: Based on in-depth study of flow characteristics and TCP protocol specifications, the packet status, packet arrival interval and SYN packet size can identify single-packet flows accurately, and a flow-aggregation accelerating strategy for TCP traffic is proposed that aims to quickly identifySingle-Packet flows.
Related Papers (5)