{"id":13381,"date":"2014-04-15T14:17:06","date_gmt":"2014-04-15T14:17:06","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/internet-traffic-monitoring\/"},"modified":"2014-04-15T14:17:06","modified_gmt":"2014-04-15T14:17:06","slug":"internet-traffic-monitoring","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/29990\/internet-traffic-monitoring","title":{"rendered":"Internet Traffic Monitoring"},"content":{"rendered":"
Internet traffic monitoring is the process of monitoring all incoming and outgoing data from the Internet to a device, network and environment for the purpose of administration and\/or detecting any abnormalities or threats. \n<\/p>\n
Internet traffic monitoring is primarily done to evaluate any suspicious or malicious incoming or outgoing packet or activity. It is generally part of a firewall and intrusion detection and prevention system.<\/p>\n
Internet traffic monitoring can be done manually by reviewing the packets at granular level for any activity that is unusual to the user, network or organization. Similarly, using automated tools such as firewalls, inappropriate messages and packets are automatically filtered out. These packets can be deleted, blocked or granted only limited access to the network, Internet or device. \n<\/p>\n
It is also use a means to review the Internet activities of employees or individuals.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Internet Traffic Monitoring Mean? Internet traffic monitoring is the process of monitoring all incoming and outgoing data from the Internet to a device, network and environment for the purpose of administration and\/or detecting any abnormalities or threats. Techopedia Explains Internet Traffic Monitoring Internet traffic monitoring is primarily done to evaluate any suspicious or […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,245,219],"class_list":["post-13381","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-internet","definitioncat-networks"],"acf":[],"yoast_head":"\n