icon-carat-right menu search cmu-wordmark

Privacy Preserving Network Flow Recording

Presentation
In this presentation, the authors describe ways to use netflow data in ways that preserve privacy.
Publisher

Software Engineering Institute

Abstract

Outline:

  • Basic Ideas
  • Requirements
  • NetFlow
  • Threat Model and Challenges
  • Scenarios
  • Algorithm Steps, Queries, and Setup
  • Results
  • Discussion and Future Work

This presentation was delivered at FloCon 2011

Part of a Collection

FloCon 2011 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.