Flocon 2014 Jan. 14, 2014 to Jan. 16, 2014, Albuquerque,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Charleston Welcome, Chris Sanders N/A
Network Flows, Past, Present and Future, Carter Bullard The concept of network flow is now a critical part of todays IT infrastructure. Integrated ...
10 Years of FloCon, George Warnagiris N/A
Keynote: Passive DNS Collection and Analysis—The "dnstap" Approach, Paul A. Vixie DNS is a high volume low latency datagram protocol at the heart of the Internet ...
Setting up a Network Flow Sensor for $100, Ron Bandes , Dwight Beaver Some organizations like schools may have few funds for network security generally and Network Flow ...
Argus with Netmap : Monitoring Traffic at 10Gbits/s Line Rate Using Commodity Hardware, Harika Tandra Monitoring traffic at 10Gbits/s line-rate is a challenging problem. There are only few network monitoring ... IncludeThinkstScapes
Analyzing Large Flow Data Sets Using Modern Open-Source Data Search and Visualizaton Tools, Max Putas Although the command-line and API-driven tools and libraries found in CERT’s NetSA Security Suite are ...
Quilt: A System for Distributed Temporal Queries of Security Relevant Heterogeneous Data, George Jones , Tim Shimeall This talk describes a new system Quilt which supports security relevant querying across heterogeneous network ...
Network Security Monitoring with IPFIX and Bro, Randy Caldejon This presentation investigates and reports on the potential synergy between CERT's "Yet Another Flowmeter" (YAF) ...
Stucco: Situation and Threat Understanding by Correlating Contextual Observations, John Gerth We report early results from a DHS-funded research project that is working on augmenting and ...
VoIP in Flow, Nathan Dell This presentation will be about profiling Voice of Internet Protocol (VoIP) traffic in flow. I ...
Distributed Summary Statistics with Bro, Vlad Grigorescu When analyzing network traffic a number of questions have historically been too difficult to answer ...
Data Fusion at Scale, Markus de Shon The network flow data analysis community has long recognized that robust network defense requires fusion ...
Streaming Analysis: An Alternate Analysis Paradigm, John Mchugh , John Zachary , Andy Freeland , Dougles Creager , Redjack Llc Since the development of the SiLK tools early in this century NetFlow data has been ...
What Does "Big Data" Even Mean?, Joshua Goldfarb Enterprises today do a reasonably good job instrumenting their networks for data and log collection ...
Analysis of Some Time-Series Metrics for Network Monitoring, Soumyo Moitra In this presentation we present a method and metrics to enhance network Situational Awareness. Since ...
PCR - A Flow Metric for the Producer/Consumer Relationship, John Gerth ...Motivation The classic fields reporting packets and bytes in flow records have long been used ...
Analyzing Flow Using Encounter Complexes, Leigh Metcalf Collecting flow for any length of time can lead to an overwhelming number of records ...
Argus Instrumentation of the GLORIAD R&E Network for Improved Measurement Monitoring and Security, Greg Cole The Global Ring Network for Advanced Applications Development (GLORIAD: www.gloriad.org) is one of the world's ...
Semantic Flow Augmentation for the Automated Discovery of Organizational Relationships, Chris Strasburg Flow data has proven useful as a light-weight informative data source across a broad spectrum ...
NetFlow Epidemiology: Tracking Negative Trust, John Murphy A network of any size implements many missions critical to your organization's operations and represents ...
Investigating APT1, Angela Horneman , Deana Shick In February 2013 Mandiant uncovered Advanced Persistent Threat 1 (APT1)—one of China's alleged cyber espionage ...
VAST Challenge for Cyber Situation Awareness, Kirsten Whitley The topic is a three-year project (2011-2013) introducing cyber situation awareness (CSA) into the VAST ...
PM WIN-T TMD Fight the Network (FTN) / FAVA, Kevin Jacobs FTN is a project that was started in 2007 to support US Forces in both ...
LogStash: Yes Logging Can Be Awesome, James Turnbull Logging. Everyone does it. Many without even knowing why they do it. It is considered ...
Security Onion: Peel Back the Layers of Your Network in Minutes, Doug Burks Security Onion 12.04 made its conference debut at FloCon 2013. A year has passed since ...
Perspectives, Panel The closing panel will be comprised of netflow experts and FloCon veterans. The panel will ...