Network Security Performance Analysis Based on Netflow

  • Conference paper
  • First Online:
Innovative Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 675))

  • 81 Accesses

Abstract

With the continuous development of network technology, the size and complexity of network data are increasing, network security has become a topic of constant concern, so the network environment for real-time detection and control, to ensure that the network security performance continues to improve to become an urgent problem to be solved. Therefore, new methods must be used to improve the performance of network security. Netflow, as a new technology, provides a new path for the improvement of network security performance. Therefore, on the basis of Netflow technology, this paper proposes a network security test method for Netflow network data analysis. It is to take source IP as the main research object, from the perspective of a network attack, to study the manifestation of Netflow network data in network security issues. By analyzing the abnormal behavior of IP access, the corresponding network security problem is simulated through practice. And its feature vector analysis and detection, and then use the algorithm of invalid links, network behavior scanning, network DOS attack, such as abnormal access behavior related IP analysis. So you can get an accurate network security problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Pak, W., and Y.J. Choi. 2017. High performance and high scalable packet classification algorithm for network security systems 14(1): 37–49.

    Google Scholar 

  2. Min, Nie, ** Tao, and Yang Guang. 2018. Security performance analysis and the parameters simulation of quantum virtual private network based on IPSec protocol 15 (23): 49–56.

    Google Scholar 

  3. **dal, Poonam, and Brahmjit Singh. 2017. Security-performance tradeoffs in a class of wireless network scenarios. Journal of Network and Systems Management 25 (1): 83–121.

    Article  Google Scholar 

  4. Hou, Jianlei, Shangmei Zhao, and Haijun Yang. 2017. Security analysts’ earnings forecasting performance based on information transmission network. Physica A Statistical Mechanics Its Applications 509 (32): 611–619.

    Google Scholar 

  5. Ubarhande, S.D., D.D. Doye, and P.S. Nalwade. 2017. A time stamp-based algorithm to improve security and performance of mobile ad hoc network. Wireless Networks 39 (43): 716–729.

    Google Scholar 

  6. Ming, **aobo, and **hua Guo. 2017. Research on influence of cloud environment on traditional network security. IOP Conference Series: Earth and Environmental Science 113 (33): 128–134.

    Google Scholar 

  7. Nirmal Raja, K., and M. Maraline Beno. 2017. Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against Sybil attack. Journal of Medical Systems 41 (7): 657–668.

    Google Scholar 

  8. Dridi, L., and M.F. Zhani. 2017. A holistic approach to mitigating DoS attacks in SDN networks. International Journal of Network Management 28 (2): 996–998.

    Google Scholar 

  9. Jyothi, Vinayaka, Sateesh K. Addepalli, and Ramesh Karri. 2017. DPFEE: A high performance scalable pre-processor for network security systems. IEEE Transactions on Multi-Scale Computing Systems 35 (22): 178–194.

    Google Scholar 

  10. Mohanraj, Vanitha, R. Sakthivel, and Anand Paul. 2017. High performance GCM architecture for the security of high speed network. International Journal of Parallel Programming 12 (33): 556–574.

    Google Scholar 

  11. Alzahrani, M.E. 2017. Auditing Albaha University network security using in-house developed penetration tool. Journal of Physics Conference Series 35 (33): 978.

    Google Scholar 

  12. Asija, Divya, K.M. Soni, and S.K. Sinha. 2017. Multi-objective optimization and network security enhancement for congestion management in wholesale electricity market. International Journal of System Assurance Engineering Management 8 (2): 1775–1782.

    Google Scholar 

  13. **dal, Poonam, and Brahmjit Singh. 2017. Quantitative analysis of the security performance in wireless LANs. Journal of King Saud University—Computer and Information Sciences 39 (23): 779.

    Google Scholar 

  14. Chen, **ngshu, Xuemei Zeng, and Wenxian Wang. 2017. Big data analytics for network security and intelligence. Advanced Engineering Sciences 39 (43): 112–129.

    Google Scholar 

  15. Zhi-Guo, H.U., C.Q. Tian, and D.U. Liang. 2017. Current research and future perspective on IP network performance measurement. Journal of Software 37 (42): 332–342.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jie Xu , **Ling Ye or Wei Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, J., Ye, J., Xu, W. (2020). Network Security Performance Analysis Based on Netflow. In: Yang, CT., Pei, Y., Chang, JW. (eds) Innovative Computing. Lecture Notes in Electrical Engineering, vol 675. Springer, Singapore. https://doi.org/10.1007/978-981-15-5959-4_105

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5959-4_105

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5958-7

  • Online ISBN: 978-981-15-5959-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation