%0 Conference Proceedings %T Mining NetFlow Records for Critical Network Activities %+ Faculty of Science, Technology and Communication [Luxembourg] (FSTC) %+ P&TLuxembourg %A Wang, Shaonan %A State, Radu %A Ourdane, Mohamed %A Engel, Thomas %< avec comité de lecture %( Lecture Notes in Computer Science %B 4th International Conference on Autonomous Infrastructure, Management and Security (AIMS) %C Zurich, Switzerland %Y Burkhard Stiller; Filip Turck %I Springer %3 Mechanisms for Autonomous Management of Networks and Services %V LNCS-6155 %P 135-146 %8 2010-06-23 %D 2010 %R 10.1007/978-3-642-13986-4_20 %Z Computer Science [cs]/Digital Libraries [cs.DL]Conference papers %X Current monitoring of IP flow records is challenged by the required analysis of large volume of flow records. Finding essential information is equivalent to searching for a needle in a haystack. This analysis can reach from simple counting of basic flow level statistics to complex data mining techniques. Some key target objectives are for instance the identification of malicious traffic as well as tracking the cause of observed flow related events. This paper investigates the usage of link analysis based methods for ranking IP flow records. We leverage the well known HITS algorithm in the context of flow level dependency graphs. We assume a simple dependency model that can be build in the context of large scale IP flow record data. We apply our approach on several datasets, ranging from ISP captured flow records up to forensic packet captures from a real world intrusion. %G English %2 https://inria.hal.science/hal-01056635/document %2 https://inria.hal.science/hal-01056635/file/61550135.pdf %L hal-01056635 %U https://inria.hal.science/hal-01056635 %~ IFIP-LNCS %~ IFIP %~ IFIP-LNCS-6155 %~ IFIP-AIMS %~ IFIP-2010