Large datasets of existent network streams procured from the mutual network are indispensable resource for the exploration group. An application encompasses network modeling and simulation, recognition of privacy assaults, and formalization of research results. Unfortunately, network flows transfer extremely delicate data, and this demoralizes the emergence of those information sets. Indeed, existing techniques for network flow sanitization are vulnerable to different kinds of assaults, and results suggested for micro data anonymity cannot be directly applied to network traces. In this paper, they provide an extremely secure transfer of delicate data through network flows by obfuscating the IP address.