


If analysts limit their examination to network flow data after a web application attack, the lack of content in that data means that they would not be able to determine that the event was an SQL injection. Content-based attacks, such as SQL injections strike through the data ( dynamic database inquiries that include user supplied output) and allow attackers to execute malicious SQL statements on a web application's database server. For example, a rolling block can reduce spam traffic by as much as 75 percent by rapidly blocking out the source IP address, even for short periods of time.Ĭombining Network Flow with Other Data SourcesĪlthough network flow is a powerful data source, it is not the only source of data that analysts and security staff should use to analyze network traffic. Network flow can also be used to identify a likely source of a spam email within a five-minute window of its arrival on a network and implement remediation. On the other hand, network defenders and analysts must have enough context to identify key websites for users and make sure that they are not blocked. If such abnormal flows occur in patterns outside of normal workday patterns, then suspicions would be raised further. If traffic from server to client involves more modest byte volumes and higher numbers of packets over a longer timeframe, then it can be questioned as to whether it is normal web traffic.
#Network analysis definition in computer full
Most web traffic from server to client is quick, with high byte volume and relatively modest numbers of packets (since the server is sending relatively full packets to the client). For example, when examining web traffic, network flow data would contain the source and destination IP addresses involved, the amount of data sent, the number of packets, and the time duration of the communication.
#Network analysis definition in computer Pc
The report further states that in the same time frame smartphone traffic will exceed PC traffic.

By the close of 2016, "Annual global IP traffic will pass the zettabyte ( 1000 exabytes ) threshold and will reach 2.3 ZBs per year by 2020" according to Cisco's Visual Networking Index.
