%% You should probably cite draft-ietf-i2nsf-nsf-monitoring-data-model instead of this I-D. @techreport{hong-i2nsf-nsf-monitoring-data-model-02, number = {draft-hong-i2nsf-nsf-monitoring-data-model-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-hong-i2nsf-nsf-monitoring-data-model/02/}, author = {Dongjin Hong and Jaehoon Paul Jeong and Jinyong Tim Kim and Susan Hares and Liang Xia and Henk Birkholz}, title = {{YANG Data Model for Monitoring I2NSF Network Security Functions}}, pagetotal = 45, year = , month = , day = , abstract = {This document proposes a YANG data model for monitoring Network Security Functions (NSFs) in the Interface to Network Security Functions (I2NSF) system. If the monitoring of NSFs is performed in a comrehensive way, it is possible to detect the indication of malicious activity, anomalous behavior or the potential sign of denial of service attacks in a timely manner. This monitoring functionality is based on the monitoring information that is generated by NSFs. Thus, this document describes not only a data tree to specify an information model for monitoring NSFs, but also the corresponding YANG data model for monitoring NSFs.}, }