The entire paper addresses the subject of understanding as well as detecting the anomalies within the IP systems. The gateway to analyze successfully the loopholes within IP system is through careful scrutiny of traffic glows. Nevertheless, there is little research on the topic as it is consider to be the most crucial task to examine the types of data traffic. Moreover, the researchers have made use of three different techniques which would be discussed afterwards for pinpointing the errors and investigating its vulnerabilities. Also, Netflow is the software which was used for analyzing the traffic (Cisco, 2013).