Traffic Analysis

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence or counter-intelligence, and is a concern in computer security.

Traffic analysis tasks may be supported by dedicated computer software programs, including commercially available programs such as those offered by i2, Visual Analytics, Memex, Orion Scientific, Pacific Northwest National Labs, Genesis EW's GenCOM Suite, SynerScope and others. Advanced traffic analysis techniques may include various forms of social network analysis.

Read more about Traffic AnalysisIn Military Intelligence, Examples, In Computer Security, Countermeasures

Other articles related to "traffic analysis, analysis, traffic":

Trip Generation
... It predicts the number of trips originating in or destined for a particular traffic analysis zone ... Typically, trip generation analysis focuses on residences, and residential trip generation is thought of as a function of the social and economic attributes of ... At the level of the traffic analysis zone, residential land uses "produce" or generate trips ...
Webalizer - Overview
... Website traffic analysis is produced by grouping and aggregating various data items captured by the web server in the form of log files while the website visitor is browsing the website ... Some of the most commonly used website traffic analysis terms are listed below URL A Uniform Resource Locator (URL) uniquely identifies the resource ... Those web traffic analysis tools that use IP addresses to identify visitors use the words hosts, domain names and IP addresses interchangeably ...
Traffic Analysis - Countermeasures
... It is difficult to defeat traffic analysis without both encrypting messages and masking the channel ... When no actual messages are being sent, the channel can be masked by sending dummy traffic, similar to the encrypted traffic, thereby keeping bandwidth usage constant ... encryptors, becomes common practice, ISPs will have to change their traffic assumptions ...
Comint - Disciplines Shared Across The Branches - Traffic Analysis
... Traffic analysis is the discipline of drawing patterns from information flow among a set of senders and receivers, whether those senders and receivers are designated by location determined through direction ... Message content, other than the sender and receiver, is not necessary to do traffic analysis, although more information can be helpful ... Traffic analysis need not focus on human communications ...

Famous quotes containing the words analysis and/or traffic:

    Analysis as an instrument of enlightenment and civilization is good, in so far as it shatters absurd convictions, acts as a solvent upon natural prejudices, and undermines authority; good, in other words, in that it sets free, refines, humanizes, makes slaves ripe for freedom. But it is bad, very bad, in so far as it stands in the way of action, cannot shape the vital forces, maims life at its roots. Analysis can be a very unappetizing affair, as much so as death.
    Thomas Mann (1875–1955)

    Cry;—and upon thy so sore loss
    Shall shine the traffic of Jacob’s ladder
    Pitched betwixt Heaven and Charing Cross.
    Francis Thompson (1859–1907)