[AusNOG] Netflow analysis for end-user security

Phillip Grasso phillip.grasso at gmail.com
Mon Jul 5 17:32:20 EST 2010


which version of netflow? how deep do you want to collect flows, e.g.
limited to v5 flows.
<snipe>
be careful as Conroy may try accuse you for the biggest breach in privacy
ever without a given a glimmer of understanding the technology or your
intent.
</snipe>


On Mon, Jul 5, 2010 at 5:04 PM, Steve Skeevens <steve.skeevens at gmail.com>wrote:

> Hi guys,
>
> Wondering how many of you analyse your end-users' flows for general
> anomalies, known malware/botnet signatures or other stuff for the purpose of
> detecting infected/owned boxes?   No need to get too specific.  In some
> regions it seems to be pretty common, from what I've seen/heard it's not so
> much done here.
>
> Regards,
> Steve
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20100705/271325fd/attachment.html>


More information about the AusNOG mailing list