From the perspective of a malicious third party, traffic analysis is the practice of determining who talks to whom, how often, and for how long. This information is often almost as useful as knowing the actual contents of the communication. For this reason, even if the conversation is encrypted, it is often the case that foiling traffic analysis (by hiding who it talking to whom) is still necesssary.
The analysis of network traffic flow for the purpose of deducing information that is useful to an adversary. Examples of such information are frequency of transmission, the identities of the conversing parties, sizes of packets, flow identifiers used, and the like.
Analysis of communication patterns as opposed to the content of these communications, e.g. when and to whom certain messages or types of messages are sent. The military has carried out this type of analysis for years; it is still unknown what the vulnerabilities of Internet communication to this type of analysis in the hands of hackers are. _____________________________________________________________________________
Analysis of traffic is done by analysing the log files.
collection and analysis of information, particularly through the analysis of message characteristics
In a communications system, the analysis of traffic rates, volumes, densities, capacities, and patterns specifically for system performance improvement. study of communications characteristics external to the text. The analysis of the communications-electronic environment for use in the design, development, and operation of new communications systems.
Within Sigint, a method of analysing and obtaining intelligence from messages without reference to their content; for example by studying the origin and destination of messages with a view to eliciting the relationship between sender and recipient, or groups thereof
Inference of information from observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available. Such characteristics include the identities and locations of the source(s) and destination(s), and the presence, amount, frequency, and duration of occurrence.
Analyses to determine the likely performance of the elevator system
Traffic analysis is the study of patterns in communication rather than the content of the communication. For example, studying when, where, and to whom particular messages are being sent, without actually studying the content of those messages. Traffic analysis can be revealing, primarily in determining relationships between individuals and hosts.
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic.