Flocon 2014 Jan. 14, 2014 to Jan. 16, 2014, Albuquerque,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Charleston Welcome, | Chris Sanders | N/A | |
Network Flows, Past, Present and Future, | Carter Bullard | The concept of network flow is now a critical part of todays IT infrastructure. Integrated ... | |
10 Years of FloCon, | George Warnagiris | N/A | |
Keynote: Passive DNS Collection and Analysis—The "dnstap" Approach, | Paul A. Vixie | DNS is a high volume low latency datagram protocol at the heart of the Internet ... | |
Setting up a Network Flow Sensor for $100, | Ron Bandes , Dwight Beaver | Some organizations like schools may have few funds for network security generally and Network Flow ... | |
Argus with Netmap : Monitoring Traffic at 10Gbits/s Line Rate Using Commodity Hardware, | Harika Tandra | Monitoring traffic at 10Gbits/s line-rate is a challenging problem. There are only few network monitoring ... | IncludeThinkstScapes |
Analyzing Large Flow Data Sets Using Modern Open-Source Data Search and Visualizaton Tools, | Max Putas | Although the command-line and API-driven tools and libraries found in CERT’s NetSA Security Suite are ... | |
Quilt: A System for Distributed Temporal Queries of Security Relevant Heterogeneous Data, | George Jones , Tim Shimeall | This talk describes a new system Quilt which supports security relevant querying across heterogeneous network ... | |
Network Security Monitoring with IPFIX and Bro, | Randy Caldejon | This presentation investigates and reports on the potential synergy between CERT's "Yet Another Flowmeter" (YAF) ... | |
Stucco: Situation and Threat Understanding by Correlating Contextual Observations, | John Gerth | We report early results from a DHS-funded research project that is working on augmenting and ... | |
VoIP in Flow, | Nathan Dell | This presentation will be about profiling Voice of Internet Protocol (VoIP) traffic in flow. I ... | |
Distributed Summary Statistics with Bro, | Vlad Grigorescu | When analyzing network traffic a number of questions have historically been too difficult to answer ... | |
Data Fusion at Scale, | Markus de Shon | The network flow data analysis community has long recognized that robust network defense requires fusion ... | |
Streaming Analysis: An Alternate Analysis Paradigm, | John Mchugh , John Zachary , Andy Freeland , Dougles Creager , Redjack Llc | Since the development of the SiLK tools early in this century NetFlow data has been ... | |
What Does "Big Data" Even Mean?, | Joshua Goldfarb | Enterprises today do a reasonably good job instrumenting their networks for data and log collection ... | |
Analysis of Some Time-Series Metrics for Network Monitoring, | Soumyo Moitra | In this presentation we present a method and metrics to enhance network Situational Awareness. Since ... | |
PCR - A Flow Metric for the Producer/Consumer Relationship, | John Gerth | ...Motivation The classic fields reporting packets and bytes in flow records have long been used ... | |
Analyzing Flow Using Encounter Complexes, | Leigh Metcalf | Collecting flow for any length of time can lead to an overwhelming number of records ... | |
Argus Instrumentation of the GLORIAD R&E Network for Improved Measurement Monitoring and Security, | Greg Cole | The Global Ring Network for Advanced Applications Development (GLORIAD: www.gloriad.org) is one of the world's ... | |
Semantic Flow Augmentation for the Automated Discovery of Organizational Relationships, | Chris Strasburg | Flow data has proven useful as a light-weight informative data source across a broad spectrum ... | |
NetFlow Epidemiology: Tracking Negative Trust, | John Murphy | A network of any size implements many missions critical to your organization's operations and represents ... | |
Investigating APT1, | Angela Horneman , Deana Shick | In February 2013 Mandiant uncovered Advanced Persistent Threat 1 (APT1)—one of China's alleged cyber espionage ... | |
VAST Challenge for Cyber Situation Awareness, | Kirsten Whitley | The topic is a three-year project (2011-2013) introducing cyber situation awareness (CSA) into the VAST ... | |
PM WIN-T TMD Fight the Network (FTN) / FAVA, | Kevin Jacobs | FTN is a project that was started in 2007 to support US Forces in both ... | |
LogStash: Yes Logging Can Be Awesome, | James Turnbull | Logging. Everyone does it. Many without even knowing why they do it. It is considered ... | |
Security Onion: Peel Back the Layers of Your Network in Minutes, | Doug Burks | Security Onion 12.04 made its conference debut at FloCon 2013. A year has passed since ... | |
Perspectives, | Panel | The closing panel will be comprised of netflow experts and FloCon veterans. The panel will ... |