FloCon 2008 Collection
At FloCon this year, attendees described useful experiences in flow analysis and presented innovative solutions in security analysis.
Attack Reduction and Anomaly Modeling in Popularly Targeted Protocols
In this presentation, Michael Collins discusses noise in traffic flows and its effect on anomaly detection, two-stage filtering, and methods to reduce attacks.Learn More
Design for Large-Scale Collection System Using Flow Mediators
By Atsushi Kobayashi (NTT Corporation), Tsuyoshi Kondoh (NTT Corporation), Keisuke Ishibashi (NTT Corporation)
In this presentation, the authors discuss the use of flow mediators in designing large-scale collection systems.Learn More
Dynamic Adaptation of Flow Information Granularity for Incident Analysis
By Marc P. Stoecklin (Zurich Research Laboratory), Andreas Kind (Zurich Research Laboratory), Jean-Yves Le Boudec (Zurich Research Laboratory)
In this presentation, the authors describe how they extended a collector system to provide more accurate incident analysis.Learn More
Flow Analysis in a Wireless Environment with Short DHCP Leases
The authors describe the analysis of wireless network data, the use of MAC layer information in netflow tools, and how the tools return converted flow data.Learn More
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.