Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Network Traffic

Handbook of Research on Cyber Crime and Information Privacy
It refers to the amount of data moving across a network at a given point of time.
Published in Chapter:
A Black-Box Framework for Malicious Traffic Detection in ICT Environments
Carlos Alberto M. S. Teles (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil), Carlos Roberto Gonçalves Viana Filho (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil), and Felipe da Rocha Henriques (Federal Center for Technological Education of Rio de Janeiro (CEFET-RJ), Brazil)
Copyright: © 2021 |Pages: 20
DOI: 10.4018/978-1-7998-5728-0.ch001
Abstract
Information security is gradually becoming an area that plays an important role in our daily lives as information and communications technology assets grow with increasingly connected environments. Increasingly we have information from society having their data leaked due to information security flaws in both hardware and software of ICT assets. To identify failures of ICT assets, through the detection of malicious traffic, this chapter proposes a black-box-based framework that aims to detect malicious traffic. The black-box method allows monitor the network without accessing the software or hardware details. In the proposed framework, information security and network resource usage are used together in order to provide a reliable detection of malicious traffic. Firstly, the authors collected network traffic information, generating a dataset from open source networking tools. The proposed detection scheme can identify risks and threats like malware, suspect traffic, and others. The scheme was validated verifying the correlation between network security alerts and network resource usage.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Intelligent Automation Using Machine and Deep Learning in Cybersecurity of Industrial IoT: CCTV Security and DDoS Attack Detection
It is the amount of data, mostly encapsulated in network packets, transferring across a network at a point of time. Network monitoring and measurements enable network traffic control.
Full Text Chapter Download: US $37.50 Add to Cart
On Efficient Cache Management of Cloud Radio Access Networks for 5G Mobile Networks
With cache miss, there is a need to travel across the data center network from the cache to the cloud storage in order to perform necessary writes. As a result, there is a certain amount of traffic is generated on the network as a result of the cache miss.
Full Text Chapter Download: US $37.50 Add to Cart
Optimising P2P Networks by Adaptive Overlay Construction
Full Text Chapter Download: US $37.50 Add to Cart
Big Data in Real Time to Detect Anomalies
It is the amount of data moving across a computer network at any given time. Network traffic, also called data traffic, is broken down into data packets and sent over a network before being reassembled by the receiving device or computer.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR