Table of Contents

1. Foundation of Network Flow Analysis
2. Fixed and Dynamic Length Flow Protocols
3. Network Topologies
4. Implementing Flow Export on Layer 2 Devices
5. Implementing Flow Export on Layer 3 Devices
6. Implementing Flow Export on Servers
7. Implementing Flow Export on Virtualization Platforms
8. Ingesting Data into Clickhouse and Elasticsearch
9. Flow Data Analysis: Exploring Data for Fun and Profit
10. Understanding the Flow Matrix
11. Firewall Rules Optimization Use Case
12. Simple Network Anomaly Detection System Based on Flow Data Analysis