A survey of network flow applications

被引:179
作者
Li, Bingdong [1 ]
Springer, Jeff [1 ]
Bebis, George [2 ]
Gunes, Mehmet Hadi [2 ]
机构
[1] Univ Nevada, Dept Informat Technol, Reno, NV 89557 USA
[2] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
关键词
Machine learning; Net Flow; Network traffic analysis; Network security; sFlow; TRAFFIC CLASSIFICATION; NETFLOW; MACHINE; IDENTIFICATION; FRAMEWORK;
D O I
10.1016/j.jnca.2012.12.020
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research has been conducted since then and many applications have been developed. In this survey, we have reviewed an extensive number of studies with emphasis on network flow applications. First, we provide a brief introduction to sFlow, NetFlow and network traffic analysis. Then, we review the state of the art in the field by presenting the main perspectives and methodologies. Our analysis has revealed that network security has been an important research topic since the beginning. Advanced methodologies, such as machine learning, have been very promising. We provide a critique of the studies surveyed about datasets, perspectives, methodologies, challenges, future directions and ideas for potential integration with other Information Technology infrastructure and methods. Finally, we concluded this survey. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:567 / 581
页数:15
相关论文
共 158 条
  • [51] Gao Yan., 2006, Proc. IEEE International Conference on Distributed Computing Systems (ICDCS'06), P39, DOI DOI 10.1109/ICDCS.2006.6
  • [52] Behavior-based network security goes mainstream
    Geer, D
    [J]. COMPUTER, 2006, 39 (03) : 14 - 17
  • [53] Goodall JR, 2009, 2009 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P135
  • [54] An apparatus for P2P classification in Netflow traces
    Gossett, Andrew M.
    Papapanagiotou, Ioannis
    Devetsikiotis, Michael
    [J]. 2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1361 - 1366
  • [55] Gregr M., 2011, 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011), P650, DOI 10.1109/INM.2011.5990647
  • [56] Haddadi Hamed, 2008, 2008 Third International Conference on Communications and Networking in China (CHINACOM), P442, DOI 10.1109/CHINACOM.2008.4685060
  • [57] Haiting Zhu, 2011, 2011 Second International Conference on Networking and Distributed Computing, P45, DOI 10.1109/ICNDC.2011.17
  • [58] Han BJ, 2008, 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, P731
  • [59] Han S-h, 2002, P 13 IFIP IEEE INT W, P16
  • [60] Fast, memory efficient flow rate estimation using runs
    Hao, Fang
    Kodialam, Murali
    Lakshman, T. V.
    Mohanty, Shantidev
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (06) : 1467 - 1477