FloCon 2009 Collection
At FloCon 2009, presenters discussed topics dealing with flow for network forensics, network inventory, and incident response.
An Analysis of Sampling Effects on Graph Structures Derived from Network Flow Data
In this presentation, Mark Meiss describes a study of the effects of sampling on flows and asks how graph structures built from flow data are affected.Learn More
Analyzing the Effectiveness of Phishing at Network Level
By Sagar Mehta (Georgia Institute of Technology), Nitya Sundareswaran (Georgia Institute of Technology), Kevin D. Fairbanks (Georgia Institute of Technology), Nick Feamster (Georgia Institute of Technology)
In this presentation, the authors discuss the challenges of analyzing phishing at the network level.Learn More
CAMNEP: Multistage Collective Network Behavior Analysis System with Hardware Accelerated NetFlow Probes
By Martin Rehak (CESNET), Pavel Celeda (Liberouter), Michal Pechoucek (Czech Technical University), Jiri Novotny (Masaryk University)
In this presentation, the authors discuss network intrusion detection systems, anomaly detection models, and trust-based anomaly integration.Learn More
Data Structures for IPv6 Network Traffic Analysis Using Sets and Bags
In this presentation, the authors discuss network traffic analysis, tree and hash-based representations, and column-oriented databases.Learn More
Detecting Anomalies in Interhosts Communication Graph
By Keisuke Ishibashi (NTT Corporation), Tsuyoshi Kondoh (NTT Corporation), Shigeaki Harada (NTT Service Integration Laboratories), Tatsuya Mori (NTT Service Integration Laboratories), Ryoichi Kawahara (NTT Service Integration Laboratories), Shoichiro Asano (National Information Institute)
In this presentation, the authors discuss anomalous traffic detection, communication graphs, and a method for detecting graphic anomalies.Learn More
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.