Towards real-time intrusion detection for NetFlow and IPFIX


As an outcome of a seminar on the ‘Ethics in Data Sharing’, we sketch a model of best practice for sharing data in research. We illustrate this model with two current and timely real-life cases from the context of computer and network security.

2nd Cyber-security Research Ethics Dialog & Strategy (CREDS II), co-located with the 35th IEEE Symposium on Security and Privacy (IEEE S&P)