Network Intelligence

Network intelligence analyzes data that passes through computer networks, filtering Internet protocol information to collect data patterns and locate malicious activity. Network intelligence uses deep packet inspection (DPI) to analyze IP packets and decide what packets are safe, locating malware if it exists. DPI can also redirect packets of data if necessary. Similarly, packet filtering analyzes from whence IP addresses come and places necessarily limits on those packets. Network intelligence also uses elements of business intelligence to collect and study Internet protocol data and learn from network traffic patterns.

Network intelligence is an important aspect of Internet security. Corporations often use it to protect their sensitive data and gain insights regarding their websites‘ user traffic. Filtering IP packets and traffic can also help network providers become more aware of Denial-of-Service attacks, in which an attacker purposely orchestrates IP traffic to overwhelm a network.

Network intelligence problems and concerns

Because network intelligence analyzes IP packets and has the ability to block them, it can be a vehicle for censorship. One of the most outstanding examples of this is China, which has a nationwide firewall, known as the “Great Firewall of China,” which contains multiple layers that manage all traffic in and out of the country. The firewall uses IP address blocking as well as DNS cache poisoning to redirect IP requests if they are for blocked websites or even keywords.

Ordinarily, virtual private networks can help prevent some network intelligence for computer users who are concerned about their privacy. But in China, most VPNs are blocked, and citizens must use a government-approved one, which also limits their Internet traffic. However, China isn’t the only example of network intelligence gone wrong—it’s also a concern in less restrictive nations, including the United States.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...