network forensics

Defending the Network: Flow vs. Wire Data