ALERT

[FREE DEMO] Deploy Your Enterprise Cloud in Minutes

Traffic-Flow Security

Definition - What does Traffic-Flow Security mean?

Traffic-flow security is the use of various measures or methods to hide the presence of messages across a communicational medium, or to otherwise cloak messaging to prevent the observation of traffic levels across an IT infrastructure.

The idea behind traffic-flow security is that even in highly protected systems, it might still be possible for outsiders to ascertain the amount of traffic over a system at any given time. The use of traffic-flow security tools makes it impossible for external observers to see whether traffic is changing in real time, or when any individual message goes from one location to another.

Techopedia explains Traffic-Flow Security

There are several methods for traffic-flow security. One involves the use of dummy traffic in addition to the encryption of actual messages, and sender and receiver addresses. This can make it look like a system is experiencing a consistently high level of traffic in order to obscure the actual volume of traffic in the network. Another option is to send a continuous encrypted signal even when a network is not being used.

The principle behind traffic-flow security shows how businesses and other parties may guard even seemingly basic data such as the date and time that someone accesses a platform, or when they send a message. In some situations, this data is not regarded as necessarily private; in other cases, it may be necessary to hide traffic on a platform where knowledge of access times and traffic levels could be used inappropriately by an outside observer.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.