It’s called traffic analysis to the process of inferring information from the characteristics of communication traffic without analyzing the information callers are exchanged. For information we can rely for example on the origin and destination of communications, its size, frequency, timing, communication patterns, etc.
Traffic analysis is closely related to packet analysis and are often used together. In the packet analysis information in the packets flowing through the network is studied and from that tries to infer information.
Traffic analysis infers information from observable characteristics of data flowing through the network. For example, it may be interesting packet size or timing of messages. Such techniques can be used by attackers to deduce such key sizes during interactive sessions or to deduce the origin and destination of a communication. It can also be used by network administrators to discover potentially malicious activities. Therefore computer security deals with the study of traffic analysis techniques and countermeasures to protect us from this kind of techniques.
The origin of the traffic analysis is the analysis of traffic information that has traditionally been done for military applications. This type of information systems traditionally inferred from the analysis of the communication signals. Today traffic analysis is very useful for inferring information from the traffic there in communications networks.
Zettatek has one of the analysis tools more effective market traffic, traffic analysis used for large volumes (Big data analytics), with applications for industry standards and banking applications for military use. It allows real-time analysis of large volumes of information and to perform semantic searches within the contents. Allowing to make alerts related to content and to discover potentially malicious activities. And of course traffic containing malicious code such as viruses, worms, backdoors, etc.