This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n13http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n17http://localhost/temp/predkladatel/
n4http://purl.org/net/nknouf/ns/bibtex#
n20http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n16http://linked.opendata.cz/resource/domain/vavai/projekt/
n15http://linked.opendata.cz/ontology/domain/vavai/
n5https://schema.org/
n21http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14610%2F14%3A00073221%21RIV15-MV0-14610___/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n19http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n8http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n22http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n11http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n9http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14610%2F14%3A00073221%21RIV15-MV0-14610___
rdf:type
skos:Concept n15:Vysledek
dcterms:description
Deep packet inspection (DPI) and IP flow monitoring are frequently used network monitoring approaches. Although the DPI provides application visibility, detailed examination of every packet is computationally intensive. The IP flow monitoring achieves high performance by processing only packet headers, but provides less details about the traffic itself. Application-aware flow monitoring is proposed as an attempt to combine DPI accuracy and IP flow monitoring performance. However, the impacts, benefits and disadvantages of application flow monitoring have not been studied in detail yet. The work proposed in this paper attempts to rectify this lack of research. We also propose a next generation flow measurement for application monitoring. The flows will represent events within the application protocol, e.g., web page download, instead of packet stream. Deep packet inspection (DPI) and IP flow monitoring are frequently used network monitoring approaches. Although the DPI provides application visibility, detailed examination of every packet is computationally intensive. The IP flow monitoring achieves high performance by processing only packet headers, but provides less details about the traffic itself. Application-aware flow monitoring is proposed as an attempt to combine DPI accuracy and IP flow monitoring performance. However, the impacts, benefits and disadvantages of application flow monitoring have not been studied in detail yet. The work proposed in this paper attempts to rectify this lack of research. We also propose a next generation flow measurement for application monitoring. The flows will represent events within the application protocol, e.g., web page download, instead of packet stream.
dcterms:title
Next Generation Application-Aware Flow Monitoring Next Generation Application-Aware Flow Monitoring
skos:prefLabel
Next Generation Application-Aware Flow Monitoring Next Generation Application-Aware Flow Monitoring
skos:notation
RIV/00216224:14610/14:00073221!RIV15-MV0-14610___
n3:aktivita
n10:P
n3:aktivity
P(VG20132015103)
n3:dodaniDat
n9:2015
n3:domaciTvurceVysledku
n20:4855477 n20:6606288
n3:druhVysledku
n14:D
n3:duvernostUdaju
n22:S
n3:entitaPredkladatele
n21:predkladatel
n3:idSjednocenehoVysledku
32569
n3:idVysledku
RIV/00216224:14610/14:00073221
n3:jazykVysledku
n11:eng
n3:klicovaSlova
flow; network measurement; application monitoring; IPFIX
n3:klicoveSlovo
n8:flow n8:IPFIX n8:application%20monitoring n8:network%20measurement
n3:kontrolniKodProRIV
[3EEF84AF125C]
n3:mistoKonaniAkce
Brno, Czech Republic
n3:mistoVydani
Heidelberg
n3:nazevZdroje
Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508
n3:obor
n6:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:projekt
n16:VG20132015103
n3:rokUplatneniVysledku
n9:2014
n3:tvurceVysledku
Čeleda, Pavel Velan, Petr
n3:typAkce
n13:WRD
n3:wos
000347615900020
n3:zahajeniAkce
2014-01-01+01:00
s:issn
0302-9743
s:numberOfPages
6
n19:doi
10.1007/978-3-662-43862-6_20
n4:hasPublisher
Springer-Verlag. (Berlin; Heidelberg)
n5:isbn
9783662438619
n17:organizacniJednotka
14610