{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T04:14:03Z","timestamp":1761279243041,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030161835"},{"type":"electronic","value":"9783030161842"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16184-2_40","type":"book-chapter","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T13:04:26Z","timestamp":1553864666000},"page":"420-430","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Flow Monitoring System for IoT Networks"],"prefix":"10.1007","author":[{"given":"Leonel","family":"Santos","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[]},{"given":"Ramiro","family":"Gon\u00e7alves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Velan, P.: Improving network flow definition: formalization and applicability. In: NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium, Taipei, pp. 1\u20135 (2018)","key":"40_CR1","DOI":"10.1109\/NOMS.2018.8406203"},{"doi-asserted-by":"crossref","unstructured":"Claise, B., Trammell, B., Aitken, P.: Specification of the IP flow information export (IPFIX) protocol for the exchange of flow information. In: RFC 7011 (Internet Standard), pp. 1\u201376, September 2013","key":"40_CR2","DOI":"10.17487\/rfc7015"},{"doi-asserted-by":"crossref","unstructured":"Santos, L., Rabadao, C., Gon\u00e7alves, R.: Intrusion detection systems in Internet of Things: a literature review. In: 13th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1\u20137 (2018)","key":"40_CR3","DOI":"10.23919\/CISTI.2018.8399291"},{"issue":"4","key":"40_CR4","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"40_CR5","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutorials 12(3), 343\u2013356 (2010). Third Quarter","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"40_CR6","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/COMST.2014.2321898","volume":"16","author":"Rick Hofstede","year":"2014","unstructured":"Hofstede, R., \u010celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A.: Flow monitoring explained: from packet capture to data analysis with NetFlow and IPFIX. Commun. Surv. Tutorials IEEE PP(99), 2037\u20132064 (2014)","journal-title":"IEEE Communications Surveys & Tutorials"},{"unstructured":"Jacobson, V., Leres, C., McCanne, S.: libpcap, Lawrence Berkeley Laboratory, Berkeley, CA. Initial public release June (1994)","key":"40_CR7"},{"issue":"2","key":"40_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2185376.2185382","volume":"42","author":"S Alcock","year":"2012","unstructured":"Alcock, S., Lorier, P., Nelson, R.: Libtrace: a packet capture and analysis library. SIGCOMM Comput. Commun. Rev. 42(2), 42\u201348 (2012)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Braun, L., Didebulidze, A., Kammenhuber, N., Carle, G.: Comparing and improving current packet capturing solutions based on commodity hardware. In: Proceedings of 10th ACM SIGCOMM IMC, pp. 206\u2013217 (2010)","key":"40_CR9","DOI":"10.1145\/1879141.1879168"},{"unstructured":"Zseby, T., Molina, M., Duffield, N., Niccolini, S., Raspall, F.: rfc5475 @ Tools.Ietf.Org, March 2009. https:\/\/tools.ietf.org\/html\/rfc5475","key":"40_CR10"},{"unstructured":"IEs @ www.iana.org (2007). https:\/\/www.iana.org\/assignments\/ipfix\/ipfix.xhtml. Accessed 04 Nov 2018","key":"40_CR11"},{"doi-asserted-by":"crossref","unstructured":"Trammell, B., Boschi, E.: Bidirectional flow export using IP Flow Information Export (IPFIX), RFC 5103 (Standards Track) Internet Engineering Task Force, January 2008","key":"40_CR12","DOI":"10.17487\/rfc5103"},{"doi-asserted-by":"crossref","unstructured":"Sadasivan, G., Brownlee, N., Claise, B., Quittek, J.: Architecture for IP Flow Information Export, RFC 5470 (Informational) Internet Engineering Task Force, March 2009","key":"40_CR13","DOI":"10.17487\/rfc5470"},{"unstructured":"Inacio, C.M., Trammell, B.: YAF: yet another flowmeter. In: Proceedings of 24th International Conference on LISA, pp. 1\u201316 (2010)","key":"40_CR14"},{"unstructured":"Deri, L.: nProbe: an open source NetFlow probe for gigabit networks. In: Proceedings of TNC, pp. 1\u20134 (2003)","key":"40_CR15"},{"unstructured":"QoF. https:\/\/www.ict-mplane.eu\/public\/qof. Accessed 11 Nov 2018","key":"40_CR16"},{"unstructured":"Lampert, R.T., Sommer, C., Munz, G., Dressler, F.: Vermont - a versatile monitoring toolkit for IPFIX and PSAMP. In: Proceedings of IEEE\/IST Workshop MonAM, pp. 1\u20134 (2006)","key":"40_CR17"},{"key":"40_CR18","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-30633-4_21","volume-title":"Dependable Networks and Services","author":"Petr Velan","year":"2012","unstructured":"Velan, P., Krej\u010d\u00ed, R.: Flow information storage assessment using IPFIXcol. In: Proceedings of 6th International Conference AIMS, vol. 7279, pp. 155\u2013158 (2012)"},{"unstructured":"Gates, C., Collins, M., Duggan, M., Kompanek, A., Thomas, M.: More NetFlow tools for performance and security. In: Proceedings 18th International Conference on LISA, pp. 121\u2013132 (2004)","key":"40_CR19"},{"doi-asserted-by":"crossref","unstructured":"Zseby, T., Boschi, E., Brownlee, N., Claise, B.: IP Flow Information Export (IPFIX) applicability. RFC 5472 (Informational) Internet Engineering Task Force, March 2009","key":"40_CR20","DOI":"10.17487\/rfc5472"},{"issue":"2","key":"40_CR21","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.jnca.2012.12.020","volume":"36","author":"B Li","year":"2013","unstructured":"Li, B., Springer, J., Bebis, G., Gunes, M.H.: A survey of network flow applications. J. Netw. Comput. Appl. 36(2), 567\u2013581 (2013)","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"Haag, P.: Watch your flows with NfSen and NFDUMP. In: Proceedings of 50th RIPE Meeting, pp. 1\u201332 (2005)","key":"40_CR22"},{"key":"40_CR23","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-48100-1_21","volume-title":"Active Technologies for Network and Service Management","author":"Luca Deri","year":"1999","unstructured":"Deri, L., Suin, S.: Ntop: beyond ping and traceroute. In: Proceedings of 10th IFIP\/IEEE International Workshop DSOM, vol. 1700, pp. 271\u2013283 (1999)"},{"doi-asserted-by":"crossref","unstructured":"Velan, P., Medkov\u00e1, J., Jirs\u00edk, T., \u010celeda, P.: Network traffic characterisation using flow-based statistics. In: Network Operations and Management Symposium (NOMS), 2016 IEEE\/IFIP, pp. 907\u2013912. IEEE (2016)","key":"40_CR24","DOI":"10.1109\/NOMS.2016.7502924"},{"issue":"7","key":"40_CR25","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2017.1600972","volume":"55","author":"T Jirsik","year":"2017","unstructured":"Jirsik, T., Cermak, M., Tovarnak, D., Celeda, P.: Toward stream-based IP flow analysis. IEEE Commun. Mag. 55(7), 70\u201376 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"40_CR26","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2017.05.009","volume":"70","author":"MF Umer","year":"2017","unstructured":"Umer, M.F., Sher, M., Bi, Y.: Flow-based intrusion detection: techniques and challenges. Comput. Secur. 70, 238\u2013254 (2017)","journal-title":"Comput. Secur."},{"unstructured":"Mosquitto. https:\/\/projects.eclipse.org\/projects\/technology.mosquitto. Accessed 11 Nov 2018","key":"40_CR27"},{"unstructured":"LibCoAP. https:\/\/libcoap.net\/. Accessed 11 Nov 2018","key":"40_CR28"},{"doi-asserted-by":"crossref","unstructured":"Tanganelli, G., Vallati, C., Mingozzi, E.: CoAPthon: easy development of CoAP-based IoT applications with Python. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 63\u201368. IEEE (2015)","key":"40_CR29","DOI":"10.1109\/WF-IoT.2015.7389028"},{"unstructured":"Elasticstack. https:\/\/www.elastic.co\/elk-stack. Accessed 11 Nov 2018","key":"40_CR30"},{"unstructured":"ElastiFlow Project. https:\/\/github.com\/robcowart\/elastiflow. Accessed 11 Nov 2018","key":"40_CR31"}],"container-title":["Advances in Intelligent Systems and Computing","New Knowledge in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16184-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T04:12:30Z","timestamp":1761279150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-16184-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030161835","9783030161842"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16184-2_40","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST'19","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Galicia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}