메뉴 건너뛰기




Volumn 36, Issue 2, 2013, Pages 567-581

A survey of network flow applications

Author keywords

Machine learning; NetFlow; Network security; Network traffic analysis; sFlow

Indexed keywords

INFORMATION TECHNOLOGY INFRASTRUCTURE; NETFLOWS; NETWORK FLOWS; NETWORK TRAFFIC ANALYSIS; RESEARCH TOPICS; SFLOW; STATE OF THE ART;

EID: 84874724334     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.12.020     Document Type: Review
Times cited : (204)

References (161)
  • 4
    • 79952438076 scopus 로고    scopus 로고
    • Analysis of the impact of sampling on NetFlow traffic classification
    • P. Barlet-ros, and A. Cabellos-aparicio Analysis of the impact of sampling on NetFlow traffic classification Methodology 55 5 2010 1083 1099
    • (2010) Methodology , vol.55 , Issue.5 , pp. 1083-1099
    • Barlet-Ros, P.1    Cabellos-Aparicio, A.2
  • 8
    • 39649109444 scopus 로고    scopus 로고
    • A NetFlow based flow analysis and monitoring system in enterprise networks
    • L. Bin, L. Chuang, Q. Jian, H. Jianping, and P. Ungsunan A NetFlow based flow analysis and monitoring system in enterprise networks Computer Networks 52 5 2008 1074 1092
    • (2008) Computer Networks , vol.52 , Issue.5 , pp. 1074-1092
    • Bin, L.1    Chuang, L.2    Jian, Q.3    Jianping, H.4    Ungsunan, P.5
  • 17
  • 18
    • 34548009809 scopus 로고    scopus 로고
    • A resource-efficient flow monitoring system
    • G. Cheng, and J. Gong A resource-efficient flow monitoring system Communications Letters, IEEE 11 June (6) 2007 558 560
    • (2007) Communications Letters, IEEE , vol.11 , Issue.JUNE 6 , pp. 558-560
    • Cheng, G.1    Gong, J.2
  • 20
    • 67349158355 scopus 로고    scopus 로고
    • Fast detection and visualization of network attacks on parallel coordinates
    • H. Choi, H. Lee, and H. Kim Fast detection and visualization of network attacks on parallel coordinates Computers Security 28 5 2009 276 288
    • (2009) Computers Security , vol.28 , Issue.5 , pp. 276-288
    • Choi, H.1    Lee, H.2    Kim, H.3
  • 23
    • 84874674897 scopus 로고    scopus 로고
    • Deri L. ntop. Retrieved June 3, 2012
    • Deri L. ntop. 〈 http://www.ntop.org 〉. Retrieved June 3, 2012.
  • 28
    • 16344383315 scopus 로고    scopus 로고
    • Sampling for passive internet measurement a review
    • N. Duffield Sampling for passive internet measurement a review Statistical Science 19 2004 472 498
    • (2004) Statistical Science , vol.19 , pp. 472-498
    • Duffield, N.1
  • 37
    • 79956034020 scopus 로고    scopus 로고
    • BotTrack tracking botnets using NetFlow and PageRank
    • J. François, S. Wang, R. State, and T. Engel BotTrack tracking botnets using NetFlow and PageRank NETWORKING 2011 6640 2011 1 14
    • (2011) NETWORKING 2011 , vol.6640 , pp. 1-14
    • François, J.1    Wang, S.2    State, R.3    Engel, T.4
  • 40
  • 43
    • 33845446718 scopus 로고    scopus 로고
    • Behavior-based network security goes mainstream
    • D. Geer Behavior-based network security goes mainstream Computer 39 March (3) 2006 14 17
    • (2006) Computer , vol.39 , Issue.MARCH 3 , pp. 14-17
    • Geer, D.1
  • 53
    • 84874695116 scopus 로고    scopus 로고
    • Retrieved June 3
    • Internet Traffic Classification. 〈 http://www.caida.org/research/ traffic-analysis/classification-overview/ 〉. Retrieved June 3, 2012.
    • (2012) Internet Traffic Classification
  • 54
    • 70349446395 scopus 로고    scopus 로고
    • Retrieved June 3
    • Introduction to Cisco IOS ® NetFlow - a technical overview. 〈 http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/ prod-white-paper0900aecd80406232.html 〉. Retrieved June 3, 2012.
    • (2012) Introduction to Cisco IOS ® NetFlow - A Technical Overview
  • 55
    • 84874710347 scopus 로고    scopus 로고
    • IPFIX. Retrieved September 13
    • IPFIX. 〈 http://datatracker.ietf.org/wg/ipfix/ 〉. Retrieved September 13, 2012.
    • (2012)
  • 56
    • 78649491247 scopus 로고    scopus 로고
    • Network prefix-level traffic profiling characterizing, modeling, and evaluation
    • H. Jiang, Z. Ge, S. Jin, and J. Wang Network prefix-level traffic profiling characterizing, modeling, and evaluation Computer Networks 54 December (18) 2010 3327 3340
    • (2010) Computer Networks , vol.54 , Issue.DECEMBER 18 , pp. 3327-3340
    • Jiang, H.1    Ge, Z.2    Jin, S.3    Wang, J.4
  • 67
    • 79952910428 scopus 로고    scopus 로고
    • One-way delay measurement based on flow data: Quantification and compensation of errors by exporter profiling
    • Köandgel J. One-way delay measurement based on flow data: quantification and compensation of errors by exporter profiling. In: 2011 International conference on information networking (ICOIN), 2011. p. 25-30.
    • (2011) 2011 International Conference on Information Networking (ICOIN) , pp. 25-30
    • Köandgel, J.1
  • 75
    • 4243116400 scopus 로고    scopus 로고
    • The spinning cube of potential doom
    • S. Lau The spinning cube of potential doom Communications of the ACM 47 June (6) 2004 25 26
    • (2004) Communications of the ACM , vol.47 , Issue.JUNE 6 , pp. 25-26
    • Lau, S.1
  • 77
    • 79960855780 scopus 로고    scopus 로고
    • RelSamp: Preserving application structure in sampled flow measurements
    • April 2011
    • Lee M, Hajjat M, Kompella RR, Rao S. RelSamp: preserving application structure in sampled flow measurements. In: INFOCOM, 2011 Proceedings IEEE, April 2011. p. 2354-62.
    • INFOCOM, 2011 Proceedings IEEE , pp. 2354-2362
    • Lee, M.1    Hajjat, M.2    Kompella, R.R.3    Rao, S.4
  • 81
    • 84863063180 scopus 로고    scopus 로고
    • Fast application-level traffic classification using Net Flow records
    • C. Liang, and G. Jian Fast application-level traffic classification using Net Flow records Journal on Communications 33 1 2012 145 152
    • (2012) Journal on Communications , vol.33 , Issue.1 , pp. 145-152
    • Liang, C.1    Jian, G.2
  • 83
    • 38049051221 scopus 로고    scopus 로고
    • Heterogeneous multi-sensor data fusion with multi-class support vector machines: Creating network security situation awareness
    • Liu X-W, Wang H-Q, Liang Y, Lai J-B. Heterogeneous multi-sensor data fusion with multi-class support vector machines: creating network security situation awareness. In: 2007 international conference on machine learning and cybernetics, vol. 5, 2007. p. 2689-94.
    • (2007) 2007 International Conference on Machine Learning and Cybernetics , vol.5 , pp. 2689-2694
    • Liu, X.-W.1    Wang, H.-Q.2    Liang, Y.3    Lai, J.-B.4
  • 84
    • 84898842146 scopus 로고    scopus 로고
    • Visualization of host behavior for network security
    • Mansman F, Meier L, Keim DA. Visualization of host behavior for network security. Network Security 2007:187-202.
    • (2007) Network Security , pp. 187-202
    • Mansman, F.1    Meier, L.2    Keim, D.A.3
  • 85
    • 84874674099 scopus 로고    scopus 로고
    • Interactive analysis of netflows for misuse detection in large IP networks
    • Müller P, Neumair B, Rodosek GD, editors GI
    • Mansmann F, Fischer F, Keim DA, Pietzko S, Waldvogel M. Interactive analysis of netflows for misuse detection in large IP networks. In: Müller P, Neumair B, Rodosek GD, editors. DFN-Forum Kommunikationstechnologien, LNI, vol. 149, GI, 2009. p. 115-24.
    • (2009) DFN-Forum Kommunikationstechnologien, LNI , vol.149 , pp. 115-124
    • Mansmann, F.1    Fischer, F.2    Keim, D.A.3    Pietzko, S.4    Waldvogel, M.5
  • 87
    • 77954869647 scopus 로고    scopus 로고
    • Cybermetrics: User identification through network flow analysis
    • Stiller B, De Turck F, editors. Mechanisms for autonomous management of networks and services Berlin, Heidelberg: Springer
    • Melnikov N, Schönwälder J. Cybermetrics: user identification through network flow analysis. In: Stiller B, De Turck F, editors. Mechanisms for autonomous management of networks and services. Lecture notes in computer science, vol. 6155. Berlin, Heidelberg: Springer; 2010. p. 167-70.
    • (2010) Lecture Notes in Computer Science , vol.6155 , pp. 167-170
    • Melnikov Schönwälder N, J.1
  • 98
    • 84874755487 scopus 로고    scopus 로고
    • Retrieved September 13
    • NetFlow applications 〈 http://netflow.caligare.com/applications.htm 〉. Retrieved September 13, 2012.
    • (2012) NetFlow Applications
  • 99
    • 84874742511 scopus 로고    scopus 로고
    • Retrieved September 13
    • NFSen - Netflow Sensor. 〈 http://nfsen.sourceforge.net/ 〉. Retrieved September 13, 2012.
    • (2012) NFSen - Netflow Sensor
  • 100
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for Internet traffic classification using machine learning
    • T.T.T. Nguyen, and G. Armitage A survey of techniques for Internet traffic classification using machine learning Communications Surveys Tutorials, IEEE 10 4 2008 56 76
    • (2008) Communications Surveys Tutorials, IEEE , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.T.T.1    Armitage, G.2
  • 101
    • 84855807951 scopus 로고    scopus 로고
    • Towards a flow-based internet traffic classification for bandwidth optimization
    • S.M. Nor, and A.B. Mohd Towards a flow-based internet traffic classification for bandwidth optimization International Journal of Computer Science and Security 3 3 2009 146
    • (2009) International Journal of Computer Science and Security , vol.3 , Issue.3 , pp. 146
    • Nor, S.M.1    Mohd, A.B.2
  • 102
    • 34250776964 scopus 로고    scopus 로고
    • Flamingo: Visualizing internet traffic. In: Network operations and management symposium, 2006
    • April
    • Oberheide J, Goff M, Karir M. Flamingo: visualizing internet traffic. In: Network operations and management symposium, 2006. NOMS 2006. 10th IEEE/IFIP, April 2006. p. 150-61.
    • (2006) NOMS 2006. 10th IEEE/IFIP , pp. 150-161
    • Oberheide, J.1    Goff, M.2    Karir, M.3
  • 105
    • 80052708742 scopus 로고    scopus 로고
    • Flow signatures of popular applications
    • Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors
    • Perelman V, Melnikov N, Schönwälder J. Flow signatures of popular applications. In: Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors. Integrated network management, IEEE; 2011. p. 9-16.
    • (2011) Integrated Network Management, IEEE , pp. 9-16
    • Perelman, V.1    Melnikov, N.2    Schönwälder, J.3
  • 106
    • 84870637005 scopus 로고    scopus 로고
    • FlowScan: A network traffic flow reporting and visualization tool
    • Berkeley, CA, USA: USENIX Association
    • Plonka D. FlowScan: a network traffic flow reporting and visualization tool. In: Proceedings of the 14th USENIX conference on system administration. Berkeley, CA, USA: USENIX Association; 2000. p. 305-18.
    • (2000) Proceedings of the 14th USENIX Conference on System Administration , pp. 305-318
    • Plonka, D.1
  • 115
    • 84874708025 scopus 로고    scopus 로고
    • sFlow Collectors. Retrieved September 13, 2012
    • sFlow Collectors. 〈 http://www.sflow.org/products/collectors.php 〉. Retrieved September 13, 2012.
  • 117
    • 79952918906 scopus 로고    scopus 로고
    • FACT: Flow-based approach for connectivity tracking
    • Spring N, Riley GF, editors. PAM Springer
    • Schatzmann D, Leinen S, Kögel J, Mühlbauer W. FACT: flow-based approach for connectivity tracking. In: Spring N, Riley GF, editors. PAM, Lecture notes in computer science, vol. 6579. Springer; 2011. p. 214-23.
    • (2011) Lecture Notes in Computer Science , vol.6579 , pp. 214-223
    • Schatzmann, D.1    Leinen, S.2    Kögel, J.3    Mühlbauer, W.4
  • 120
    • 84859108931 scopus 로고    scopus 로고
    • Gerbilsphere inner sphere network visualization
    • D.S. Shelley, and M.H. Gunes Gerbilsphere inner sphere network visualization Computer Networks 56 3 2012 1016 1028
    • (2012) Computer Networks , vol.56 , Issue.3 , pp. 1016-1028
    • Shelley, D.S.1    Gunes, M.H.2
  • 125
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • Sommer R, Paxson V. Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy, 2010. p. 305-16.
    • (2010) 2010 IEEE Symposium on Security and Privacy , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 126
    • 77950921112 scopus 로고    scopus 로고
    • Machine learning algorithms for accurate flow-based network traffic classification evaluation and comparison
    • M. Soysal, and E.G. Schmidt Machine learning algorithms for accurate flow-based network traffic classification evaluation and comparison Performance Evaluation 67 June (6) 2010 451 467
    • (2010) Performance Evaluation , vol.67 , Issue.JUNE 6 , pp. 451-467
    • Soysal, M.1    Schmidt, E.G.2
  • 127
    • 80052768358 scopus 로고    scopus 로고
    • Flow-based intrusion detection
    • Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors
    • Sperotto A, Pras A. Flow-based intrusion detection. In: Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors. Integrated network management. IEEE; 2011. p. 958-63.
    • (2011) Integrated Network Management. IEEE , pp. 958-963
    • Sperotto, A.1    Pras, A.2
  • 132
    • 77949348071 scopus 로고    scopus 로고
    • NetBytes viewer: An entity-based NetFlow visualization utility for identifying intrusive behavior
    • Taylor T, Brooks S, McHugh J. NetBytes viewer: an entity-based NetFlow visualization utility for identifying intrusive behavior. VizSEC 2007, 2008. p. 101-14.
    • (2008) VizSEC 2007 , pp. 101-114
    • Taylor, T.1    Brooks, S.2    McHugh, J.3
  • 134
  • 135
    • 70350501463 scopus 로고    scopus 로고
    • A heuristic method of finding heavy hitter prefix pairs in IP traffic
    • P. Truong, and F. Guillemin A heuristic method of finding heavy hitter prefix pairs in IP traffic Communications Letters, IEEE 13 October (10) 2009 803 805
    • (2009) Communications Letters, IEEE , vol.13 , Issue.OCTOBER 10 , pp. 803-805
    • Truong, P.1    Guillemin, F.2
  • 144
    • 70449469997 scopus 로고    scopus 로고
    • Profiling and clustering internet hosts
    • Wei S, Mirkovic J, Kissel E. Profiling and clustering internet hosts. In: DMIN'06, 2006. p. 269-75.
    • (2006) DMIN'06 , pp. 269-275
    • Wei, S.1    Mirkovic, J.2    Kissel, E.3
  • 145
    • 84856261742 scopus 로고    scopus 로고
    • The machine that would predict the future
    • D. Weinberger The machine that would predict the future Scientific American 305 6 2011 52 57
    • (2011) Scientific American , vol.305 , Issue.6 , pp. 52-57
    • Weinberger, D.1
  • 146
    • 84874696134 scopus 로고    scopus 로고
    • Botnet detection using netflow information finding new botnets based on client connections
    • Weststrate H. Botnet detection using netflow information finding new botnets based on client connections. In: Structure, 2009.
    • (2009) Structure
    • Weststrate, H.1
  • 149
    • 79960853919 scopus 로고    scopus 로고
    • Network-aware behavior clustering of Internet end hosts
    • April
    • Xu K, Wang F, Gu L. Network-aware behavior clustering of Internet end hosts. In: INFOCOM, 2011 Proceedings IEEE, April 2011. p. 2078-86.
    • (2011) INFOCOM, 2011 Proceedings IEEE , pp. 2078-2086
    • Xu, K.1    Wang, F.2    Gu, L.3
  • 150
    • 33750711125 scopus 로고    scopus 로고
    • Profiling Internet backbone traffic behavior models and applications
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya Profiling Internet backbone traffic behavior models and applications SIGCOMM Computer Communication Review 35 August (4) 2005 169 180
    • (2005) SIGCOMM Computer Communication Review , vol.35 , Issue.AUGUST 4 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 156
    • 84874719821 scopus 로고    scopus 로고
    • Study on the TOPN abnormal detection based on the netflow data set
    • H. Zhang Study on the TOPN abnormal detection based on the netflow data set Computer and Information Science 2 3 2009 103 108
    • (2009) Computer and Information Science , vol.2 , Issue.3 , pp. 103-108
    • Zhang, H.1
  • 157
    • 80052318907 scopus 로고    scopus 로고
    • A design of NetFlow traffic statistic and analysis system for process of the transition of commercialization of IPV6
    • June
    • Zhang J, Meng S. A design of NetFlow traffic statistic and analysis system for process of the transition of commercialization of IPV6. In: 2011 International conference on computer science and service system (CSSS), June 2011. p. 963-5.
    • (2011) 2011 International Conference on Computer Science and Service System (CSSS) , pp. 963-965
    • Zhang, J.1    Meng, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.