Network Intelligence

Network intelligence analyzes data that passes through computer networks, filtering Internet protocol information to collect data patterns and locate malicious activity. Network intelligence uses deep packet inspection (DPI) to analyze IP packets and decide what packets are safe, locating malware if it exists. DPI can also redirect packets of data if necessary. Similarly, packet filtering analyzes from whence IP addresses come and places necessarily limits on those packets. Network intelligence also uses elements of business intelligence to collect and study Internet protocol data and learn from network traffic patterns.

Network intelligence is an important aspect of Internet security. Corporations often use it to protect their sensitive data and gain insights regarding their websites‘ user traffic. Filtering IP packets and traffic can also help network providers become more aware of Denial-of-Service attacks, in which an attacker purposely orchestrates IP traffic to overwhelm a network.

Network intelligence problems and concerns

Because network intelligence analyzes IP packets and has the ability to block them, it can be a vehicle for censorship. One of the most outstanding examples of this is China, which has a nationwide firewall, known as the “Great Firewall of China,” which contains multiple layers that manage all traffic in and out of the country. The firewall uses IP address blocking as well as DNS cache poisoning to redirect IP requests if they are for blocked websites or even keywords.

Ordinarily, virtual private networks can help prevent some network intelligence for computer users who are concerned about their privacy. But in China, most VPNs are blocked, and citizens must use a government-approved one, which also limits their Internet traffic. However, China isn’t the only example of network intelligence gone wrong—it’s also a concern in less restrictive nations, including the United States.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Software Environment

A software environment is a collection of programs, libraries, and utilities that allow users to perform specific tasks. Software environments are often used by...


ClickUp is a cloud-based work and project management platform that enables teams to manage tasks, collaborate in real-time, gain insights via reporting, and more....

Chunk (Data Chunk)

A chunk, also called a data chunk, by RFC2960 SCTP (Stream Control Transmission Protocol) standards, is the term used to describe a unit of...

Blog Search Engine

A blog search engine is specifically focused on finding content in the blogosphere. Blog search engines only index and provide search results from blogs...

Agile Project Management

Agile project management enables business teams to approach their projects and tasks with...

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes...

Rich Communication Services (RCS)

Rich communication services (RCS) is a mobile messaging approach in which session initiation...