Open Access
Cisco Systems NetFlow Services Export Version 9
Benoit Claise
- Vol. 3954, pp 1-33
TLDR
This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs.Abstract:
This document specifies the data export format for version 9 of Cisco
Systems' NetFlow services, for use by implementations on the
network elements and/or matching collector programs. The version 9
export format uses templates to provide access to observations of IP
packet flows in a flexible and extensible manner. A template defines a
collection of fields, with corresponding descriptions of structure and
semantics. This memo provides information for the Internet community.read more
Citations
More filters
Posted Content
Polymorphic Encryption and Pseudonymisation of IP Network Flows
Abraham Westerbaan,Luuk Hendriks +1 more
TL;DR: A system, PEP3, for storage and retrieval of IP flow information in which the IP addresses are replaced by pseudonyms, where the peers are central, but need not be fully trusted.
Proceedings ArticleDOI
Sharing of Network Flow Data across Organizations using Searchable Encryption
TL;DR: In this article, the authors focus on enabling encrypted search at network flow granularity and propose several customized encoding techniques for network flow information in order to reduce the overhead of applying state-of-the-art searchable encryption techniques.
Fine-Grained and Distributed Traffic Monitoring Platform in Software-Defined Networks
TL;DR: Software Defined Network (SDN) in general and OpenFlow as its current implementation instance in particular, provides a centralized visibility with global network and application information, a programmability without a need to handle individual network elements, and a traffic flow based controllability with flow table pipelines in OpenFlow switches making flow management more flexible and efficient.
Proceedings ArticleDOI
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffic
TL;DR: The measurements results show that the proposed method improves bandwidth usage and decreases call-blocking ratio while incurring low measurement load and may cause oscillation or long-term evolution that lasts for 100 to 150 minutes, and it may also cause band-width “overshooting”.
Journal ArticleDOI
Addressing the Security Challenges of Big Data Analytics in Healthcare Research
TL;DR: The CDSH is shown to overcome the security challenges presented in the different stages of the big data analytics pipeline and is argued for the approach by providing a detailed introduction to the security mechanisms implemented in a novel data safe haven.