On the Impact of Flow Monitoring Configuration

Flow monitoring has become an essential source of information for intrusion detection systems and various forms of network data analytics. However, the attention of researchers is focused primarily on the utilisation of the flow data, and the process of flow data creation is often neglected. This lack of consideration negatively affects the results of data analytics. Either the results are suboptimal due to the low quality of the flow data, or a description of the configuration of the flow monitoring system is missing, which leads to irreproducible results. The goal of this paper is to demonstrate how the configuration of the flow monitoring system affects the resulting data. The most basic flow monitoring configuration variables are the flow expiration timeouts. We analyse their effect on the number of created flow records to show their importance. Moreover, we demonstrate that the choice of the flow expiration timeouts can have a severe impact on the network data analytics. The use-case of Slowloris attack detection is used as an example to illustrate this fact.

[1]  Taghi M. Khoshgoftaar,et al.  Impact of class distribution on the detection of slow HTTP DoS attacks using Big Data , 2019, Journal of Big Data.

[2]  Jürgen Quittek,et al.  Architecture for IP Flow Information Export , 2009, RFC.

[3]  Ítalo S. Cunha,et al.  Uncovering Artifacts of Flow Measurement Tools , 2009, PAM.

[4]  Benoit Claise,et al.  Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , 2008, RFC.

[5]  Aiko Pras,et al.  Measurement Artifacts in NetFlow Data , 2013, PAM.

[6]  Leandro Vieira,et al.  Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach , 2019, 2019 14th Iberian Conference on Information Systems and Technologies (CISTI).

[7]  Leandro Vieira,et al.  CoAP Flow Signatures for the Internet of Things , 2019, 2019 14th Iberian Conference on Information Systems and Technologies (CISTI).

[8]  Benoit Claise,et al.  Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information , 2013, RFC.

[9]  Jürgen Quittek,et al.  Information Model for IP Flow Information Export , 2008, RFC.

[10]  Pere Barlet-Ros,et al.  Empirical analysis of traffic to establish a profiled flow termination timeout , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[11]  Taghi M. Khoshgoftaar,et al.  Utilizing Netflow Data to Detect Slow Read Attacks , 2018, 2018 IEEE International Conference on Information Reuse and Integration (IRI).

[12]  George C. Polyzos,et al.  A Parameterizable Methodology for Internet Traffic Flow Profiling , 1995, IEEE J. Sel. Areas Commun..