Network operators, Internet service providers, network security teams as well as intelligence agencies often face a problem of extracting the data of interest from the network as they need to find them, capture them and perform detailed analysis on top of them.