Elisa Boschi (Hitachi)
Hitachi
Publications by Elisa Boschi (Hitachi)
-
Privacy, Data Protection Law, and Flow Data Anonymization: Requirements, Issues, and Challenges
January 07, 2008 • Presentation
Elisa Boschi (Hitachi)Ralph Gramigna (KPMG)
In this presentation, the authors discuss the role of flow data anonymization to support data protection.
read -
From NetFlow to IPFIX: The Evolution of IP Flow Information Export
October 15, 2007 • Presentation
Brian TrammellElisa Boschi (Hitachi)
In this presentation, the authors In this presentation, the authors describe the IPFIX protocol; the IETF IPFIX working group, and available implementations of the protocol.
read -
IPFIX/PSAMP: What Future Standards Can Offer to Network Security (Presentation)
October 10, 2006 • Presentation
Tanja Zseby (Fraunhofer Fokus)Elisa Boschi (Hitachi)Thomas Hirsch (Fraunhofer Fokus)
In this presentation, the authors describe exporting packet information with IPFIX.
read -
IPFIX/PSAMP: What Future Standards Can Offer to Network Security (White Paper)
October 10, 2006 • White Paper
Tanja Zseby (Fraunhofer Fokus)Elisa Boschi (Hitachi)Thomas Hirsch (Fraunhofer Fokus)
In this paper, the authors show how IPFIX and PSAMP can be used to support network security.
read -
Bidirectional Flow Measurement, IPFIX, and Security Analysis
October 10, 2006 • Presentation
Elisa Boschi (Hitachi)Brian Trammell
In this presentation, the authors describe the importance of bi-flow information and explain how IPFIX can be used most effectively.
read -
IP Flow Information eXport (IPFIX)
September 20, 2005 • Presentation
Elisa Boschi (Hitachi)
In this presentation, Elisa Boschi describes IPFIX, a protocol for transferring IP flow data from IPFIX exporters to collectors.
read -
IP Flow Information Export (IPFIX): Applicability and Future Suggestions for Network Security
September 20, 2005 • White Paper
Elisa Boschi (Hitachi)Tanja Zseby (Fraunhofer Fokus)Mark Lutz (Fraunhofer Fokus)
In this paper, the authors present the IPFIX protocol and discuss its applicability with a special focus on network security.
read