Traffic Analysis
Gleaning information from traffic patterns even if the contents are not decipherable
A threat often overlooked or ignored in civilian applications
Difficult to do at upper layers
a traditional function of bulk link encryption
Previous slide
Next slide
Back to first slide
View graphic version