Network intelligence
   HOME

TheInfoList



OR:

Network intelligence (NI) is a technology that builds on the concepts and capabilities of
Deep Packet Inspection Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is oft ...
(DPI),
Packet Capture A packet analyzer, also known as packet sniffer, protocol analyzer, or network analyzer, is a computer program or computer hardware such as a packet capture appliance, that can intercept and log traffic that passes over a computer network or ...
and
Business Intelligence Business intelligence (BI) comprises the strategies and technologies used by enterprises for the data analysis and management of business information. Common functions of business intelligence technologies include reporting, online analytical p ...
(BI). It examines, in real time, IP data packets that cross
communications networks A telecommunications network is a group of nodes interconnected by telecommunications links that are used to exchange messages between the nodes. The links may use a variety of technologies based on the methodologies of circuit switching, messag ...
by identifying the
protocols Protocol may refer to: Sociology and politics * Protocol (politics), a formal agreement between nation states * Protocol (diplomacy), the etiquette of diplomacy and affairs of state * Etiquette, a code of personal behavior Science and technology ...
used and extracting packet content and metadata for rapid analysis of data relationships and communications patterns. Also, sometimes referred to as Network Acceleration or piracy. NI is used as a middleware to capture and feed information to network operator applications for
bandwidth management Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link,https://www.internetsociety.org/wp-content/uploads/2017/08/BWro ...
,
traffic shaping Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired ''traffic profile''. Traffic shaping is used to optimize or guarantee performance, impro ...
, policy management, charging and billing (including usage-based and content billing),
service assurance Service assurance, in telecommunications, is the application of policies and processes by a Communications Service Provider (CSP) to ensure that services offered over networks meet a pre-defined service quality level for an optimal subscriber experi ...
, revenue assurance, market research mega panel analytics,
lawful interception Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries require ...
and cyber security. It is currently being incorporated into a wide range of applications by vendors who provide technology solutions to Communications Service Providers (CSPs), governments and large enterprises. NI extends network controls, business capabilities, security functions and data mining for new products and services needed since the emergence of
Web 2.0 Web 2.0 (also known as participative (or participatory) web and social web) refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability (i.e., compatibility with other products, systems, and ...
and wireless 3G and 4G technologies.


Background

The evolution and growth of
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
and
wireless Wireless communication (or just wireless, when the context allows) is the transfer of information between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most ...
technologies offer possibilities for new types of products and services, as well as opportunities for hackers and criminal organizations to exploit weaknesses and perpetrate
cyber crime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing ...
. Network optimization and
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
solutions therefore need to address the exponential increases in IP traffic, methods of access, types of activity and volume of content generated. Traditional DPI tools from established vendors have historically addressed specific network infrastructure applications such as
bandwidth management Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link,https://www.internetsociety.org/wp-content/uploads/2017/08/BWro ...
, performance optimization and
quality of service Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network, or a cloud computing service, particularly the performance seen by the users of the network. To quantitat ...
(QoS). DPI focuses on recognizing different types of IP traffic as part of a CSP's infrastructure. NI provides more granular analysis. It enables vendors to create an information layer with metadata from IP traffic to feed multiple applications for more detailed and expansive visibility into network-based activity. NI technology goes beyond traditional DPI, since it not only recognizes protocols but also extracts a wide range of valuable metadata. NI's value-add to solutions traditionally based on DPI has attracted the attention of industry analysts who specialize in DPI market research. For example
Heavy Reading
now includes NI companies on its Deep Packet Inspection Semi-Annual Market Tracker.


Business Intelligence for data networks

In much the same way that BI technology synthesizes business application data from a variety of sources for business visibility and better decision-making, NI technology correlates network traffic data from a variety of data communication vehicles for network visibility, enabling better cyber security and IP services. With ongoing changes in communications networks and how information can be exchanged, people are no longer linked exclusively to physical subscriber lines. The same person can communicate in multiple ways –
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
, Webmail,
VoIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
,
instant messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
,
online chat Online chat may refer to any kind of communication over the Internet that offers a real-time transmission of text messages from sender to receiver. Chat messages are generally short in order to enable other participants to respond quickly. Ther ...
, blogs,
social networks A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for a ...
– and from different access points via desktops, laptops and mobile devices. NI provides the means to quickly identify, examine and correlate interactions involving Internet users, applications, and protocols whether or not the protocols are tunneled or follow the
OSI model The Open Systems Interconnection model (OSI model) is a conceptual model that 'provides a common basis for the coordination of SOstandards development for the purpose of systems interconnection'. In the OSI reference model, the communications ...
. The technology enables a global understanding of network traffic for applications that need to correlate information such as who contacts whom, when, where and how, or who accesses what database, when, and the information viewed. When combined with traditional BI tools that examine service quality and customer care, NI creates a powerful nexus of subscriber and network data.


Use in telecommunications

Telcos, Internet Service Providers (ISPs) and Mobile Network Operators (MNOs) are under increasing competitive pressures to move to
smart pipe Smart pipe, related to a mobile network operator (MNO or ''operator''), refers to an operator’s network which leverages existing or unique service abilities, and the operator’s customer relationships, to provide value beyond that of data connect ...
business models. The cost savings and revenue opportunities driving smart pipe strategies also apply to Network Equipment Providers, Software Vendors and Systems Integrators that serve the industry. Because NI captures detailed information from the hundreds of IP applications that cross mobile networks, it provides the required visibility and analysis of user demand to create and deliver differentiating services, as well as manage usage once deployed. NI as enabling technology for smart pipe applications Customer metrics are especially important for telecom companies to understand consumer behaviors and create personalized IP services. NI enables faster and more sophisticated
Audience Measurement Audience measurement measures how many people are in an audience, usually in relation to radio listenership and television viewership, but also in relation to newspaper and magazine readership and, increasingly, web traffic on websites. Sometim ...
, User Behavior Analysis,
Customer Segmentation In marketing, market segmentation is the process of dividing a broad consumer or business market, normally consisting of existing and potential customers, into sub-groups of consumers (known as ''segments'') based on some type of shared charact ...
, and Personalized Services. Real-time network metrics are equally important for companies to deliver and manage services. NI classifies protocols and applications from layers 2 through 7, generates metadata for communication sessions, and correlates activity between all layers, applicable for bandwidth & resource optimization, QoS, Content-Based Billing,
quality of experience Quality of experience (QoE) is a measure of the delight or annoyance of a customer's experiences with a service (e.g., web browsing, phone call, TV broadcast).Qualinet White Paper on Definitions of Quality of Experience (2012). European Network on Q ...
, VoIP Fraud Monitoring and regulatory compliance.


Use in cloud computing

The economics and deployment speed of
cloud computing Cloud computing is the on-demand availability of computer system resources, especially data storage ( cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over mu ...
is fueling rapid adoption by companies and government agencies. Among concerns, however, are risks of
information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
,
e-discovery Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often refe ...
, regulatory compliance and auditing. NI mitigates the risks by providing Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) vendors with real-time
situational awareness Situational awareness or situation awareness (SA) is the perception of environmental elements and events with respect to time or space, the comprehension of their meaning, and the projection of their future status. An alternative definition is tha ...
of network activity, and critical transparency to allay fears of potential customers. A vendor can demonstrate hardened network security to prevent Data Leakage or
Data Theft Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers, desktop computers and a growing list of hand-held devices capable of storing digital information, s ...
and an irrefutable audit trail of all network transaction – communication and content – related to a customer's account, assuming compliance to regulation and standards.


Use in government

NI extracts and correlates information such as who contacts whom, when where and how, providing
situational awareness Situational awareness or situation awareness (SA) is the perception of environmental elements and events with respect to time or space, the comprehension of their meaning, and the projection of their future status. An alternative definition is tha ...
for
Lawful Interception Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries require ...
and
Cyber Security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
. Real-time data capture, extraction and analysis allow security specialists to take preventive measures and protect network assets in real time as a complement post-mortem analysis after an attack.


Use in business

Because NI combines real-time
network monitoring Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble. Network monitori ...
with IP metadata extraction, it enhances the effectiveness of applications for
Database Security Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated ...
, Database Auditing and Network Protection. The network visibility afforded by NI can also be used to build enhancements and next-generation solutions for
Network Performance Management Capacity management's goal is to ensure that information technology resources are sufficient to meet upcoming business requirements cost-effectively. One common interpretation of capacity management is described in the ITIL framework. ITIL vers ...
,
WAN Optimization WAN optimization is a collection of techniques for improving data transfer across wide area networks (WANs). In 2008, the WAN optimization market was estimated to be $1 billion, and was to grow to $4.4 billion by 2014 according to Gartner, a tech ...
,
Customer Experience Management Customer experience (CX) is a totality of cognitive, affective, sensory, and behavioral consumer responses during all stages of the consumption process including pre-purchase, consumption, and post-purchase stages. Pine and Gilmore described ...
,
Content Filtering An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software dete ...
, and internal billing of networked applications.


References

{{reflist, refs= {{cite web , author = Jessica Schieve , title = Light Reading report: Network Acceleration - Managing Data Growth , url = http://www.fiercetelecom.com/offer/windriver_intel?source=ebook_tab , date = 2011-02-23 , publisher = Light Reading , accessdate = 2011-03-15 , url-status = dead , archiveurl = https://web.archive.org/web/20110511192950/http://www.fiercetelecom.com/offer/windriver_intel?source=ebook_tab , archivedate = 2011-05-11 {{cite web , author=Brian Partridge , title=Network Intelligence is Key to Profiting from Anywhere Demand , url=http://www.yankeegroup.com/ResearchDocument.do?id=53513 , date=2010-05-17 , publisher=Yankee Group Anchor Report , accessdate=2010-06-15 {{cite web , author=Thibaut Bechetoille , title=The Everyday Relationship Between You and ‘Your’ Information: What’s Out There on the Internet , url=http://ipcommunications.tmcnet.com/topics/ip-communications/articles/52992-everyday-relationship-between-and-information-whats-out-there.htm , date=2009-03-25 , publisher=TMCnet , accessdate=2010-06-15 {{cite web , author=Simon Sherrington , title=Deep Packet Inspection Semi-Annual Market Tracker , url=http://www.heavyreading.com , publisher=Heavy Reading , accessdate=2010-06-15 {{cite web , author=Aditya Kishore , title=Market Research: New Opportunity for Service Providers? , url=http://www.lightreading.com/document.asp?doc_id=159415 , date=2008-07-21 , publisher=Light Reading , accessdate=2009-07-27 {{cite news , author=Shireen Dee , title=Qosmos Network Intelligence Helps Development of Smart Pipe Solutions , url=http://caas.tmcnet.com/topics/caas-saas/articles/49997-qosmos-network-intelligence-helps-development-smart-pipe-solutions.htm , date=2009-02-03 , publisher=TMCnet , accessdate=2009-07-27 {{cite web , title=MessageLabs Intelligence: 2008 Annual Security Report , url=http://www.messagelabs.com/mlireport/MLIReport_Annual_2008_FINAL.pdf , year=2009 , publisher=MessageLabs , accessdate=2009-07-27 {{cite web , title=Big Data and Bigger Breaches With Alex Pentland of Monument Capital Group , url=http://www.huffingtonpost.com/shane-paul-neil/big-data-bigger-breaches-_b_6109928.html , year=2015 , accessdate=2015-01-14 {{cite web , title=2008 Internet Security Trends , url=http://www.ironport.com/securitytrends/ , year=2008 , publisher=IronPort , accessdate=2009-07-27 {{cite web , author=Jordan Golson , title=A Brave New World: 700M New Net Users Seen By 2013 , url=http://gigaom.com/2009/07/21/a-brave-new-world-700m-new-net-users-seen-by-2013/#more-59899 , date=2009-07-21 , publisher=GigaOM , accessdate=2009-07-27 {{cite web , author=Stacey Higginbotham , title=Will P2P Soon Be the Scourge of Mobile Networks? , url=http://gigaom.com/2009/07/21/will-p2p-soon-be-the-scourge-of-mobile-networks/#more-59491 , date=2009-07-21 , publisher=GigaOM , accessdate=2009-07-27 {{cite web , title=IDC Finds Cloud Computing Entering Period of Accelerating Adoption and Poised to Capture IT Spending Growth Over the Next Five Years , url=http://idc.com/getdoc.jsp?containerId=prUS21480708 , date=2008-10-20 , publisher=IDC , accessdate=2009-07-28 , archive-url=https://web.archive.org/web/20091123195427/http://www.idc.com/getdoc.jsp?containerId=prUS21480708 , archive-date=2009-11-23 , url-status=dead {{cite web , author=Tom Sullivan , title=More Cash for Cloud Computing in 2009 , url=https://www.pcworld.com/article/162157/more_cash_for_cloud_computing_in_2009.html , date=2008-03-29 , publisher=PC World , accessdate=2009-07-28 {{cite web , author=Henry Sienkiewicz , title=DISA’s Cloud Computing Initiatives , url=http://www.govinfosecurity.com/podcasts.php?podcastID=229 , date=2008-04-30 , publisher=Government Information Security Podcasts , accessdate=2009-07-28 {{cite web , author=Ephraim Schwartz , title=The dangers of cloud computing , url=http://www.infoworld.com/d/cloud-computing/dangers-cloud-computing-839 , date=2008-07-07 , publisher=Info World , accessdate=2009-07-28 {{cite web , author = Jon Brodkin , title = Gartner: Seven cloud-computing security risks , url = http://www.networkworld.com/news/2008/070208-cloud.html , date = 2008-07-02 , publisher = Info World , accessdate = 2009-07-28 , url-status = dead , archiveurl = https://web.archive.org/web/20090318162846/http://www.networkworld.com/news/2008/070208-cloud.html , archivedate = 2009-03-18 Packets (information technology) Deep packet inspection Network analyzers Networking hardware Business intelligence