Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Predictive Traffic Analysis

Design Innovation and Network Architecture for the Future Internet
A technique that consists in developing traffic patterns deduced from the observation of the traffic that goes through a network or a network component. The library of normal traffic baseline can be elaborated and maintained by means of Machine Learning techniques. Such traffic patterns are used by agents that monitor the traffic (or a part thereof, according to traffic selection criteria such as the Source Address (SA)/Destination Address (DA) pair, the protocol number, etc.) that goes through a network device or is forwarded along a network segment, so that they can compare what they observe against the normal traffic baseline. By means of AI algorithms, they can detect potentially suspicious traffic that doesn’t match with any of the said traffic patterns or update the library of traffic patterns.
Published in Chapter:
From Protected Networks to Protective and Collaborative Networking: An Approach to a Globally Anticipative Attack Mitigation Framework for the Future Internet
Mohamed Boucadair (Orange S.A., France) and Christian Jacquenet (Orange S.A., France)
Copyright: © 2021 |Pages: 23
DOI: 10.4018/978-1-7998-7646-5.ch012
Abstract
Security has always been a major concern of network operators. Despite a pretty rich security toolbox that never ceased to improve over the years (filters, traffic wells, encryption techniques, and intrusion detection systems to name a few), attacks keep on increasing from both a numerical and amplitude standpoints. Such protean attacks demand an adapted security toolkit that should include techniques capable of not only detecting these attacks but also anticipating them even before they reach their target. Strengthening future networking infrastructures so that they become protective, instead of being “just” protected must thus become one of the key strategic objectives of network operators and service providers who ambition to rely upon robust, dynamic, security policy enforcement schemes to develop their business while retaining their existing customers. This chapter discusses the various security challenges that may be further exacerbated by future networking infrastructures. It also presents some of the techniques that are very likely to become cornerstones of protective networking.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR