%% You should probably cite draft-ietf-i2nsf-nsf-monitoring-data-model instead of this I-D. @techreport{hong-i2nsf-nsf-monitoring-data-model-04, number = {draft-hong-i2nsf-nsf-monitoring-data-model-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-hong-i2nsf-nsf-monitoring-data-model/04/}, author = {Dongjin Hong and Jaehoon Paul Jeong and Jinyong Tim Kim and Susan Hares and Liang Xia and Henk Birkholz}, title = {{YANG Data Model for Monitoring I2NSF Network Security Functions}}, pagetotal = 48, year = 2018, month = jul, day = 2, abstract = {This document proposes a YANG data model for monitoring Network Security Functions (NSFs) in the Interface to Network Security Functions (I2NSF) system. If the monitoring of NSFs is performed in a comrehensive way, it is possible to detect the indication of malicious activity, anomalous behavior or the potential sign of denial of service attacks in a timely manner. This monitoring functionality is based on the monitoring information that is generated by NSFs. Thus, this document describes not only a data tree to specify an information model for monitoring NSFs, but also the corresponding YANG data model for monitoring NSFs.}, }