4.7 Article

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX

期刊

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
卷 16, 期 4, 页码 2037-2064

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2014.2321898

关键词

Flow export; network monitoring; Internet measurements; NetFlow; IPFIX

资金

  1. European Commission [ICT-318488]

向作者/读者索取更多资源

Flow monitoring has become a prevalent method for monitoring traffic in high-speed networks. By focusing on the analysis of flows, rather than individual packets, it is often said to be more scalable than traditional packet-based traffic analysis. Flow monitoring embraces the complete chain of packet observation, flow export using protocols such as NetFlow and IPFIX, data collection, and data analysis. In contrast to what is often assumed, all stages of flow monitoring are closely intertwined. Each of these stages therefore has to be thoroughly understood, before being able to perform sound flow measurements. Otherwise, flow data artifacts and data loss can be the consequence, potentially without being observed. This paper is the first of its kind to provide an integrated tutorial on all stages of a flow monitoring setup. As shown throughout this paper, flow monitoring has evolved from the early 1990s into a powerful tool, and additional functionality will certainly be added in the future. We show, for example, how the previously opposing approaches of deep packet inspection and flow monitoring have been united into novel monitoring approaches.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

A first look at HTTP/3 adoption and performance

Gianluca Perna, Martino Trevisan, Danilo Giordano, Idilio Drago

Summary: The third version of HTTP, HTTP/3, is in the final standardization phase and promises better security, flexibility, and performance benefits. Leading Internet companies such as Google, Facebook, and Cloudflare have already adopted HTTP/3 and it has shown significant performance advantages in high-latency or mobile networks.

COMPUTER COMMUNICATIONS (2022)

Article Multidisciplinary Sciences

Encrypted Web traffic dataset: Event logs and packet traces

Stanislav Spacek, Petr Velan, Pavel Celeda, Daniel Tovarnak

Summary: The dataset captures monitoring data from eight servers hosting more than 800 sites across a large campus network, suitable for training machine learning techniques for anomaly detection and identifying relationships between network traffic and events on web servers.

DATA IN BRIEF (2022)

Article Education & Educational Research

Student assessment in cybersecurity training automated by pattern mining and clustering

Valdemar Svabensky, Jan Vykopal, Pavel Celeda, Kristian Tkacik, Daniel Popovic

Summary: Hands-on cybersecurity training allows students and professionals to practice tools and improve their technical skills. Analyzing cybersecurity training data using data mining and machine learning techniques provides insights into students' typical behavior, mistakes, solution strategies, and difficult training stages.

EDUCATION AND INFORMATION TECHNOLOGIES (2022)

Article Education & Educational Research

Applications of educational data mining and learning analytics on data from cybersecurity training

Valdemar Svabensky, Jan Vykopal, Pavel Celeda, Lydia Kraus

Summary: This paper provides an in-depth insight into the recently growing research on collecting and analyzing data from hands-on training in security contexts. It surveys publications in this area and categorizes them according to the collected data, analysis methods, and application contexts, providing researchers, developers, and educators with an original perspective and practical recommendations.

EDUCATION AND INFORMATION TECHNOLOGIES (2022)

Article Multidisciplinary Sciences

On network backbone extraction for modeling online collective behavior

Carlos Henrique Gomes Ferreira, Fabricio Murai, Ana P. C. Silva, Martino Trevisan, Luca Vassio, Idilio Drago, Marco Mellia, Jussara M. Almeida

Summary: Collective user behavior in social media applications has a significant impact on the spread of opinions and information. Current studies mainly analyze these behaviors using network models and user interactions. However, only a small part of the user interactions contribute to the actual investigation, and a large number of irrelevant interactions may blur the underlying structures and user communities driving the target phenomenon. To solve this problem, researchers have proposed several network backbone extraction techniques. However, there is currently a lack of clear methods for comparing and selecting the most suitable extraction method.

PLOS ONE (2022)

Article Computer Science, Information Systems

Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy?

Martino Trevisan, Francesca Soro, Marco Mellia, Idilio Drago, Ricardo Morla

Summary: Privacy protection is a priority on the Internet, and various methods have been used to limit personal information leakage. However, domain names are still visible to observers in the network. Efforts have been made to encrypt domain names, but this article shows that simple features and machine learning models can still recover encrypted domain names with high precision and recall. The effectiveness of padding-based mitigation is also evaluated, and it is found that all three attacks can still be successful despite padding. Therefore, more robust techniques are needed to protect end users' privacy.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Computer Science, Information Systems

Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms

Razvan Beurana, Jan Vykopal, Daniela Belajova, Pavel Celeda, Yasuo Tan, Yoichi Shinoda

Summary: Cybersecurity training is vital for equipping the IT workforce with the necessary knowledge and skills to combat the increasing cybersecurity threats. This paper introduces a capability assessment methodology for cybersecurity training platforms, focusing on content representation, environment management, and training facilitation. The assessment tool is used to evaluate two open-source platforms, CyTrONE and ICYPO, and provides valuable insights for deploying or developing cybersecurity training platforms.

COMPUTERS & SECURITY (2023)

Article Computer Science, Information Systems

i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis

Luca Gioacchini, Luca Vassio, Marco Mellia, Idilio Drago, Zied Ben Houidi, Dario Rossi

Summary: Darknets are probes that listen to traffic reaching IP addresses that host no services. This traffic results from the actions of internet scanners, botnets, and misconfigured hosts. i-DarkVec is a methodology that uses Natural Language Processing techniques to learn meaningful representations of darknet traffic. The embeddings learned with i-DarkVec enable various machine learning tasks, such as identifying clusters of senders engaged in similar activities and solving the classification problem of associating unknown sources with coordinated actors. i-DarkVec leverages a scalable and robust incremental embedding learning approach, making it applicable to dynamic and large-scale scenarios.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

Passive operating system fingerprinting revisited: Evaluation and current challenges

Martin Lastovicka, Martin Husak, Petr Velan, Tomas Jirsik, Pavel Celeda

Summary: Fingerprinting a host's operating system is a common yet risky task in network management. Existing approaches using TCP/IP header parameters or machine learning analysis of hosts' behavior are becoming obsolete due to the evolution of network traffic. This paper discusses the evolution of passive OS fingerprinting methods over the past twenty years, highlighting the challenges faced and the importance of behavioral analysis and machine learning in complementing the host differences in network stack settings. The evolution of OS fingerprinting was driven by factors such as network traffic encryption and privacy-preserving concepts in application protocols.

COMPUTER NETWORKS (2023)

Article Computer Science, Interdisciplinary Applications

Smart Environment for Adaptive Learning of Cybersecurity Skills

Jan Vykopal, Pavel Seda, Valdemar Svabensky, Pavel Celeda

Summary: This study designs a unique and novel smart environment for adaptive cybersecurity skills training, which assigns a suitable learning path based on student data. The results show that students were assigned tasks with appropriate difficulty, enabling successful completion of the training. Students reported enjoyment and satisfaction with the training format.

IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Measuring the Performance of iCloud Private Relay

Martino Trevisan, Idilio Drago, Paul Schmitt, Francesco Bronzino

Summary: Recent developments in Internet protocols and services, such as Apple's iCloud Private Relay, aim to enhance security and privacy for users' traffic. However, our performance study shows that iCloud Private Relay can decrease speed test performance (up to 10x decrease) and negatively affect page load time and download/upload throughput in different scenarios. Despite this, the overlay routing introduced by the service may improve performance in some cases. Further investigations are needed to understand the implications of large-scale deployment of similar multi-hop privacy-enhancing architectures.

PASSIVE AND ACTIVE MEASUREMENT, PAM 2023 (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Towards NLP-based Processing of Honeypot Logs

Matteo Boffa, Giulia Milan, Luca Vassio, Idilio Drago, Marco Mellia, Zied Ben Houidi

Summary: This study evaluates the application of Natural Language Processing (NLP) in honeypot attack activities and successfully uses clustering algorithms to identify attackers' goals. This is of great importance for automatically identifying attack patterns in honeypots and supporting security activities.

7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring

Thomas Favale, Danilo Giordano, Idilio Drago, Marco Mellia

Summary: This paper revisits the visibility problem of honeypots from a horizontal perspective and deploys a flexible honeypot system to collect and analyze data from multiple services. The study reveals that some attackers focus on a few services while others target multiple services simultaneously. Furthermore, it provides an analysis of brute-force attacks against multiple services.

7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic

Stanislav Spacek, Petr Velan, Pavel Celeda, Daniel Tovarnak

Summary: This paper proposes a new approach to encrypted web traffic monitoring by designing a method for correlating host-based and network monitoring data, analyzing correlation results, and identifying configurations that negatively affect correlation. The method is tested and evaluated on a dataset collected from a campus network.

PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022 (2022)

Proceedings Paper Computer Science, Artificial Intelligence

AI-based Sound-Squatting Attack Made Possible

Rodolfo Valentim, Idilio Drago, Federico Cerutti, Marco Mellia

Summary: Domain squatting is an attacking technique that tricks users by exploiting the similarity between domain names, and sound-squatting is a specific type that targets the similarity in pronunciation. With the increasing popularity of intelligent speakers and voice-based navigation, there is a need for better methods to protect users from sound-squatting attacks. In this study, an AI-based approach is proposed to automatically generate sound-squatting candidates using text translation capabilities. The generated candidates are evaluated and classified according to their threat level, demonstrating the usefulness of automatic sound-squatting generation in proactively preventing abuse.

7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022) (2022)

暂无数据