filler graphic
FloCon 2013
January 7–10  |  Albuquerque, New Mexico

Proceedings — FloCon 2013

FloCon 2013 took place in Albuquerque, New Mexico, on January 7-10, 2013. This page lists the keynote presentation, training sessions, presentations, and posters that were presented at the conference. We have also compiled these assets into one FloCon 2013 proceedings file. We will update this file as presentations become available, and we will announce updates here and in the FloCon rss feed.

Keynote Presentation

Steven M. Bellovin, Federal Trade Commission/Columbia University

Thinking Security


Ron Bandes

Introduction to SiLK & Advanced SiLK Training

Carter Bullard

Network Flow Metadata Processing with Argus

Doug Burks

Network Monitoring with Security Onion


Ron McLeod & Ashraf Abusharekh

Mongoose Flow Collection Tools

Igor Balabine & Sasha Velednitsky

Taming Big Flow Data

Alexander Barsamian, Vince Berk, and John Murphy

Identifying Network Users Using Flow-Based Behavioral Fingerprinting

Adnan Baykal

Fire Talk About MS-ISAC Efforts

Carter Bullard

Near Real-Time Multi-Source Flow Data Correlation

Michael Collins

Identifying Network Traffic Activity Via Flow Sizes

Tom Cross

Detecting Insider Threats with Netflow

Markus De Shon

Flow Analysis Using MapReduce: Strengths and Limitations

Bruce Griffin

Scalable Stacked Index Speeds Access to Multi TByte Netflow Data

Seth Hall

Bro for Real-Time Large Scale Understanding

John Jerrim

Detecting Malware P2P Traffic Using Network Flow and DNS Analysis

Hari Kosaraju

Enhancing Network Situational Awareness Using DPI Enhanced IPFIX

Yeonhee Lee & Youngseok Lee

Scalable NetFlow Analysis with Hadoop

Bingdong Li

A Distributed Network Security Analysis System Based on Hadoop-Related Technologies

Joe Loiacono

FlowViewer—Advancing Network Traffic Situational Awareness

John McHugh

Considerations for Scan Detection Using Flow Data

Soumyo Moitra

Situational Awareness Metrics from Flow and Other Data Sources

John Munro & Jason Trost

Clairvoyant Squirrel: A Scalable Domain Name Classification System

Kevin Noble

Statistical Analysis of Flow Data Using Python and Redis

Tim Ray

Visualization: Where Are We Going?

Char Sample & George Jones

Anomaly Detection

Geoffrey Serrao

Automated Malware Traffic Analysis for IPS Analysts with Scapy and dpkt in Python

Timothy Shimeall

The Limitations of Analysis at Scale

William Turkett

Analysis of Communication Patterns in Network Flows to Discover Application Intent

James Ulrich

CyberV@R: A Model to Compute Dollar Value at Risk of Loss to Cyber Attack

Tony Waller

Smart Sensors for Flow Collection at 10G, 40G, 100G, and Beyond ...

George Warnagiris

Network Flow 2012: Year in Review


Brian Allen & Robert Annand

Behavioral Whitelists of Beaconing Activity

George Jones & Tim Shimeall

Behavioral Whitelists of High-Volume Web Traffic to Specific Domains

Leigh B. Metcalf & Jonathan Spring

Name Servers Should Not Move