... significant capabilities attainable for network security analysis via Time Travel, i.e., the ability to quicklyaccess past network traffic for network analysis and security foren-sics. This approach ... JAHANIAN,F.Resource-aware Multi-format Network Security Data Storage. In Proc. SIGCOMM LSAD workshop (2006).[8] CRANOR,C.,JOHNSON,T.,AND SPATSCHECK,O.Gigascope: A Stream Database for Network Applications. ... Experiences with High-Volume Network Intrusion Detection. In Proc. 11th ACM Conf. onComp. and Comm. Security (2004).[11] DUNLAP,G.W.,KING,S.T.,CINAR,S.,BASRAI,M.A.,AND CHEN, P. M. ReVirt: Enabling...