J 2014

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX

HOFSTEDE, Rick; Pavel ČELEDA; Brian TRAMMELL; Idilio DRAGO; Ramin SADRE et al.

Základní údaje

Originální název

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX

Autoři

HOFSTEDE, Rick; Pavel ČELEDA; Brian TRAMMELL; Idilio DRAGO; Ramin SADRE; Anna SPEROTTO a Aiko PRAS

Vydání

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, PISCATAWAY, IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2014, 1553-877X

Další údaje

Jazyk

angličtina

Typ výsledku

Článek v odborném periodiku

Obor

Informatika

Stát vydavatele

Spojené státy

Utajení

není předmětem státního či obchodního tajemství

Odkazy

Označené pro přenos do RIV

Ano

Kód RIV

RIV/00216224:14610/14:00073220

Organizace

Ústav výpočetní techniky – Masarykova univerzita – Repozitář

Klíčová slova anglicky

Flow export; network monitoring; Internet measurements; NetFlow; IPFIX

Návaznosti

VG20132015103, projekt VaV.
Změněno: 1. 9. 2020 20:03, RNDr. Daniel Jakubík

Anotace

V originále

Flow monitoring has become a prevalent method for monitoring traffic in high-speed networks. By focusing on the analysis of flows, rather than individual packets, it is often said to be more scalable than traditional packet-based traffic analysis. Flow monitoring embraces the complete chain of packet observation, flow export using protocols such as NetFlow and IPFIX, data collection, and data analysis. In contrast to what is often assumed, all stages of flow monitoring are closely intertwined. Each of these stages therefore has to be thoroughly understood, before being able to perform sound flow measurements. Otherwise, flow data artifacts and data loss can be the consequence, potentially without being observed. This paper is the first of its kind to provide an integrated tutorial on all stages of a flow monitoring setup. As shown throughout this paper, flow monitoring has evolved from the early 1990s into a powerful tool, and additional functionality will certainly be added in the future. We show, for example, how the previously opposing approaches of deep packet inspection and flow monitoring have been united into novel monitoring approaches.

Přiložené soubory