Implementing and analyzing flow data across network topologies for threat detection (English Edition)