Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Network Flow

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
The flow of data in the form of packets from source to destination comprises the network flow. In general if the network flow abruptly increases then it is treated as alarming and automatic checking start to analyze all the communication within a network to check for possible intrusion from outsiders.
Published in Chapter:
Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging
Khaleel Ahmad (Maulana Azad National Urdu University, India), Gaurav Kumar (Swami Vivekananda Subharti University, India), Abdul Wahid (Maulana Azad National Urdu University, India), and Mudasir M. Kirmani (Sher-e-Kashmir University of Agricultural Science and Technology of Kashmir, India)
DOI: 10.4018/978-1-4666-6559-0.ch018
Abstract
Rapid connectivity and exchange of information across the globe with extension of computer networks during the past decade has led to security threats in network communication and has become a critical concern for network management. It is necessary to retain high security measures to ensure safe and trusted communication across the network. Diverse soft-computing-based methods have been devised in the past for the perfection of intrusion detection systems on host-based and host-independent systems. This chapter discusses the flow-based anomaly detector for intrusion in network by self-learning process with characteristics of bacterial forging approach. This approach handles the network-flow and attack on network traffic in an automated fashion. This approach works on host-independent systems and on stream of network rather than payload length where data behavior of flow in network is analyzed. This model provides a cataloging of attacks and resistance mechanism techniques to avoid intrusion.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Malware Detection in Network Flows With Self-Supervised Deep Learning
Network flow data typically refers to metadata (higher level digital records) which characterize connections made across a digital network, without recording the exact content of each network activity. Network flows typically contain the internet protocol addresses and port numbers utilized in each recorded network connection event, along with protocols, time stamps and connection durations, source and destination hosts, and network interfaces used. Network flows do not include the actual content of each network connection, thus making it a much more “lightweight” information monitoring tool when compared to a packet capture log which does include the connection content and related content attributes.
Full Text Chapter Download: US $37.50 Add to Cart
The Flow of Influence From Two-Step to Network Perspectives
It refers to the flow of influence between people through many steps and bi-directionally from the most influential to the most influenced.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR