scispace - formally typeset
Open Access

Cisco Systems NetFlow Services Export Version 9

Benoit Claise
- Vol. 3954, pp 1-33
TLDR
This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs.
Abstract
This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs. The version 9 export format uses templates to provide access to observations of IP packet flows in a flexible and extensible manner. A template defines a collection of fields, with corresponding descriptions of structure and semantics. This memo provides information for the Internet community.

read more

Citations
More filters
Proceedings ArticleDOI

INT-react: An O(E) Path Planner for Resilient Network-Wide Telemetry Over Megascale Networks

TL;DR: In this paper , the authors proposed improved INT-path and INT-react, two refined path planning algorithms with a much reduced time complexity of only $O(k(3E+V-15k/2)).
Book ChapterDOI

Unsupervised Anomaly Detection in Daily WAN Traffic Patterns

TL;DR: In this paper, the authors introduce novel methods that process very large network datasets quickly for outlier identification, which can help identify and understand anomalous behaviors at the network edge, allowing reactions to unexpected traffic or attacks on facilities and their peerings.
Posted Content

Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows

TL;DR: LOFT as mentioned in this paper detects 1.5x overuse flows in one second, whereas prior approaches fail to detect 2x over-use flows within a timeout of 300 seconds, and demonstrates the suitability for high-speed packet processing on an FPGA.
Proceedings ArticleDOI

Detection of Cyber-attacks using Deep Convolution in Honeyed Framework

TL;DR: In this paper , the authors proposed a honeyed framework to detect DoS attacks using deep convolutional reinforcement neural network (DNN) for network surveillance and to classify network users from potential threats (DCRNN).
Related Papers (5)