Data on Retention

  • Ward van Wanrooij
  • Aiko Pras
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3775)


Proposed EU regulations on data retention could require every provider to keep accounting logs of its customers’ Internet usage. Although the technical consequences of these requirements have been investigated by consultancy companies, this paper investigates what this accounting data could be, how it can be obtained and how much data storage is needed. This research shows that every gigabyte of network traffic results in approximately 400 kilobyte of accounting data when using our refinements to existing methods for storing accounting data – less by a factor twenty than previously assumed.


Internet Protocol Data Retention Accounting Data Port Number IPv4 Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Presidency of Council of the European Union: Draft Framework Decision on the retention of data processed and stored in connection with the provision of publicly available electronic communications services or data on public communications networks for the purpose of prevention, investigation, detection and prosecution of crime and criminal offences including terrorism, Brussels, Belgium (November 2004),
  2. 2.
    Persson, M., Trommelen, J.: Ten aanval, Volkskrant 12 April 2005, PCM Uitgevers, Amsterdam, The Netherlands (April 2005)Google Scholar
  3. 3.
    Stratix: Onderzoek Bewaren Verkeersgegevens door Telecommunicatieaanbieders, Schiphol, The Netherlands (August 2003),
  4. 4.
    KPMG Information Risk Management: Onderzoek naar de opslag van historische verkeersgegevens van telecommunicatieaanbieders, Amstelveen, The Netherlands (November 2004),
  5. 5.
    Micheel, J., Braun, H.-W., Graham, I.: Storage and Bandwidth Requirements for Passive Internet Header Traces, Workshop on Network-Related Data Management, in conjunction with ACM SIGMOD/PODS 2001, Santa Barbara, California, USA (May 2001),
  6. 6.
    Cisco: NetFlow Services Solutions Guide, San Jose, USA (October 2001),
  7. 7.
    Working party on co-operation on criminal matters: Non paper data retention, Leiden, The Netherlands (September 2004),
  8. 8.
    IETF Secretariat: IP Flow Information Export (ipfix) Charter (May 2005),
  9. 9.
    Kretchmar, J.: Open Source Network Administration, Prentice Hall PTR, Upper Sadle River, New Jersey, USA (September 2003) Section 5.1Google Scholar
  10. 10.
    Miller, D.: Software NetFlow probe (May 2005),
  11. 11.
    Seward, J.: bzip2 (May 2005),
  12. 12.
    Endace Measurement Systems: Network Monitoring Cards (May 2005),
  13. 13.
    Van de Meent, R.: M2C Measurement Data Repository, Enschede, The Netherlands (December 2003),
  14. 14.
    Balachandran, A.: Wireless LAN Traces from ACM SIGCOMM 2001, San Diego, California, USA (August. 2001),
  15. 15.
    WAND Research Group: NLANR MOAT NZIX-II trace archive (May 2005),
  16. 16.
    WIDE MAWI Working Group: MAWI Working Group Traffic Archive (May 2005),
  17. 17.
    AMS-IX B.V.: AMS-IX Homepage (May 2005),

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Ward van Wanrooij
    • 1
  • Aiko Pras
    • 1
  1. 1.University of TwenteEnschedeThe Netherlands

Personalised recommendations