Blog

Blog

The report offers specific insights into the performance of major Internet Carriers for the month of March, 2019.

Flexible Netflow

So far, we have discussed NetFlow configuration for network devices from various vendors such as Cisco, Juniper, Huawei, VyOS. We have collected layer 3...

Compromise detection

Our previous article discusses flow-based SSH compromise detection. A force attack against SSH hosts consists of scan, brute-force and compromise phases that can be...

SSH

Secure Shell (SSH) provides a secure channel over an unsecured network in a client-server model. SSH is typically used to log into a remote...

Tier 1 Carriers Performance Report February 2019

The report offers specific insights into the performance of major Internet Carriers for the month of February, 2019.

The Internet we know nowadays cannot properly operate without using the Domain Name System (DNS). DNS syncs up domain names with IP addresses so...

SNMP Netflow

Simple Network Management Protocol (SNMP) is a well-known standardized application layer protocol, originally developed for network management but mostly used for network monitoring. SNMP...

The report offers specific insights into the performance of major Internet Carriers for the month of January, 2019.

Flow Deduplication

Duplication of NetFlow occurs when the NetFlow records about the same flow are exported multiple times to a NetFlow collector. In turn, the volume...

NetFlow Samplicator

In our previous article we have discussed the alternative way to get flow statistics using a NetFlow generator. One of the fundamental features of...


FREE
DEMO

REQUEST
QUOTE

FREE
TRIAL