Abstract
With the continuous development of network technology, the size and complexity of network data are increasing, network security has become a topic of constant concern, so the network environment for real-time detection and control, to ensure that the network security performance continues to improve to become an urgent problem to be solved. Therefore, new methods must be used to improve the performance of network security. Netflow, as a new technology, provides a new path for the improvement of network security performance. Therefore, on the basis of Netflow technology, this paper proposes a network security test method for Netflow network data analysis. It is to take source IP as the main research object, from the perspective of a network attack, to study the manifestation of Netflow network data in network security issues. By analyzing the abnormal behavior of IP access, the corresponding network security problem is simulated through practice. And its feature vector analysis and detection, and then use the algorithm of invalid links, network behavior scanning, network DOS attack, such as abnormal access behavior related IP analysis. So you can get an accurate network security problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pak, W., and Y.J. Choi. 2017. High performance and high scalable packet classification algorithm for network security systems 14(1): 37–49.
Min, Nie, ** Tao, and Yang Guang. 2018. Security performance analysis and the parameters simulation of quantum virtual private network based on IPSec protocol 15 (23): 49–56.
**dal, Poonam, and Brahmjit Singh. 2017. Security-performance tradeoffs in a class of wireless network scenarios. Journal of Network and Systems Management 25 (1): 83–121.
Hou, Jianlei, Shangmei Zhao, and Haijun Yang. 2017. Security analysts’ earnings forecasting performance based on information transmission network. Physica A Statistical Mechanics Its Applications 509 (32): 611–619.
Ubarhande, S.D., D.D. Doye, and P.S. Nalwade. 2017. A time stamp-based algorithm to improve security and performance of mobile ad hoc network. Wireless Networks 39 (43): 716–729.
Ming, **aobo, and **hua Guo. 2017. Research on influence of cloud environment on traditional network security. IOP Conference Series: Earth and Environmental Science 113 (33): 128–134.
Nirmal Raja, K., and M. Maraline Beno. 2017. Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against Sybil attack. Journal of Medical Systems 41 (7): 657–668.
Dridi, L., and M.F. Zhani. 2017. A holistic approach to mitigating DoS attacks in SDN networks. International Journal of Network Management 28 (2): 996–998.
Jyothi, Vinayaka, Sateesh K. Addepalli, and Ramesh Karri. 2017. DPFEE: A high performance scalable pre-processor for network security systems. IEEE Transactions on Multi-Scale Computing Systems 35 (22): 178–194.
Mohanraj, Vanitha, R. Sakthivel, and Anand Paul. 2017. High performance GCM architecture for the security of high speed network. International Journal of Parallel Programming 12 (33): 556–574.
Alzahrani, M.E. 2017. Auditing Albaha University network security using in-house developed penetration tool. Journal of Physics Conference Series 35 (33): 978.
Asija, Divya, K.M. Soni, and S.K. Sinha. 2017. Multi-objective optimization and network security enhancement for congestion management in wholesale electricity market. International Journal of System Assurance Engineering Management 8 (2): 1775–1782.
**dal, Poonam, and Brahmjit Singh. 2017. Quantitative analysis of the security performance in wireless LANs. Journal of King Saud University—Computer and Information Sciences 39 (23): 779.
Chen, **ngshu, Xuemei Zeng, and Wenxian Wang. 2017. Big data analytics for network security and intelligence. Advanced Engineering Sciences 39 (43): 112–129.
Zhi-Guo, H.U., C.Q. Tian, and D.U. Liang. 2017. Current research and future perspective on IP network performance measurement. Journal of Software 37 (42): 332–342.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xu, J., Ye, J., Xu, W. (2020). Network Security Performance Analysis Based on Netflow. In: Yang, CT., Pei, Y., Chang, JW. (eds) Innovative Computing. Lecture Notes in Electrical Engineering, vol 675. Springer, Singapore. https://doi.org/10.1007/978-981-15-5959-4_105
Download citation
DOI: https://doi.org/10.1007/978-981-15-5959-4_105
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5958-7
Online ISBN: 978-981-15-5959-4
eBook Packages: Computer ScienceComputer Science (R0)