Noction is delighted to announce the release of a comprehensive NFA update, packed with...
Noction Blog
The latest BGP network optimization and IP flow analysis trends.
Geo-blocking at the BGP Level
Geo-blocking at the BGP level is an approach that allows network operators to restrict or control internet traffic by...
Multi-Protocol Label Switching – Transport Profile (MPLS-TP) and Configuration
MPLS-TP, short for Multi-Protocol Label Switching - Transport Profile, is a packet transport technology developed...
SUBSCRIBE TO OUR NEWSLETTER
Tier 1 Carriers Performance Report: October, 2019
The report offers specific insights into the performance of major Internet Carriers...
So, what exactly is NFA?
When you’re managing a network, there’s so much to think about — from monitoring bandwidth, discovering traffic...
Usage-based billing with NetFlow and sFlow
Usage-based billing enables customers to pay only for data that they have used. ...
Tier 1 Carriers Performance Report: September, 2019
The report offers specific insights into the performance of major Internet Carriers...
Insider Threat Detection with NetFlow
When it comes to major security concerns, one of the most serious ones are the data breaches and security exploits...
Multicast Traffic Monitoring and NetFlow
With the increasing popularity of multicast media applications, the monitoring of multicast traffic becomes more and...
One Way Delay Measurements and NetFlow
Role of RTT and OWD for TCP RTT stands for Round Trip Time and it is a length of time that a packet takes from point A...
DDoS Mitigation and BGP Flowspec
In traditional methods for DDoS mitigation, such as RTBH (remotely triggered blackhole), a BGP route is injected,...
Tier 1 Carriers Performance Report: July, 2019
The report offers specific insights into the performance of major Internet Carriers...
Tier 1 Carriers Performance Report: June, 2019
The report offers specific insights into the performance of major Internet Carriers...
Questions to ask a NetFlow Vendor Before you Buy
Network visibility is crucial because we cannot manage and secure what we cannot see. NetFlow plays a critical role in...
NetFlow and BGP
Border Gateway Protocol (BGP) is a core routing protocol used by most of the Internet Service Providers (ISPs). BGP’s...
Network Traffic Analysis and Alerting based on NetFlow
This article gives some insights on how to set up a network traffic analysis and alerting system based on NetFlow....
SD-WAN and NetFlow
Software-Defined Networking (SDN) in a Wide Area Network (WAN) - SD-WAN is a technology that simplifies management of...
The 768k or Another Internet Doomsday? Here’s how to deal with the TCAM overflow at the 768k boundary.
On August 8th, 2014 some ISPs experienced a phenomenon called the “512k Day”. The global BGP routing table, which...
Identifying, monitoring and securing BYOD traffic with NetFlow
Bring Your Own Device (BYOD) is a practice that allows users to bring their personal devices such as tablets or...
Tier 1 Carriers Performance Report: March, 2019
The report offers specific insights into the performance of major Internet Carriers...
Finding MAC addresses using Flexible NetFlow
So far, we have discussed NetFlow configuration for network devices from various vendors such as Cisco, Juniper,...
Web Applications compromise detection using Flow Data
Our previous article discusses flow-based SSH compromise detection. A force attack against SSH hosts consists of scan,...
SSH Compromise Detection Using Flow Data
Secure Shell (SSH) provides a secure channel over an unsecured network in a client-server model. SSH is typically used...
Tier 1 Carriers Performance Report: February, 2019
The report offers specific insights into the performance of major Internet Carriers...