FloCon 2019 Presentations
• Collection
Publisher
Software Engineering Institute
Subjects
Abstract
This collection of presentations were given at FloCon 2019, an annual event where attendees discuss the analysis of large volumes of traffic and showcase the next generation of flow-based analysis techniques.
Collection Items

Time-Based Correlation of Malicious Events and Their Connections
• Presentation
By Steve Henderson, Brittany Nicholls (Enlighten IT Consulting), Brian Ehmann (Enlighten IT Consulting)
In this presentation, the authors discuss how to automate the use of statistics to help link events and connections in a timeline during an incident or forensic investigation.
Learn More
IMPACT: Information Marketplace for Policy and Analysis of Cyber-risk & Trust
• Presentation
By Jeff Schmidt (Columbus Collaboratory)
In this presentation, Jeff Schmidt introduces a U.S. Department of Homeland Security (DHS) program called Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT).
Learn More
InSight2: IRNC Advanced Measurements and Instrumentation (AMI)
• Presentation
By Angel Kodituwakku (The University of Tennessee Knoxville), Dr. Jens Gregor (The University of Tennessee Knoxville), Buseung Cho (KISTI), Carter Bullard (QuSient LLC)
In this presentation, the authors discuss InSight2, an open platform, intended to monitor and facilitate the development of network analytics for these large-scale networks.
Learn More
Detecting Automatic Flows
• Presentation
By Jeffrey Dean (United States Air Force)
In this presentation, Jeffrey Dean, PhD., discusses specific Netflow-derived features that can be used to discriminate between flows generated by user actions and those generated automatically by applications or systems.
Learn More
Quantum Approach to Inverse Malware Eradication
• Presentation
By Daniel Medina (Glasswall Solutions Inc.), Matt Shabat (Glasswall Solutions Inc.)
The goal of this presentation is to inform people that using a 'pass only known good' methodology through a quantum approach simplifies the solution, and the future of information security …
Learn More