Skip to main content
NTA (Network Traffic Analysis) and NBA (Network Behavior Analysis)

Network Traffic Analysis and Network Behavior Analysis


NTA (Network Traffic Analysis) and NBA (Network Behavior Analysis)

NTA and NBA are fairly similar terms that describe technologies that use advanced analytics, machine learning, and rule-based techniques to detect suspicious activity on enterprise networks.  

NTA tools analyze raw traffic and/or flow records (for example, NetFlow), build models that reflect normal behavior of devices and users who generate traffic over that network, and trigger alerts when network traffic deviates from the normal baseline. NetFlow-type data only indicates which devices are communicating over the network and the volume of their conversations. This data is generally considered to be lower fidelity compared to the raw traffic (the actual content of the conversations themselves). Unfortunately, the raw traffic is increasingly being encrypted, even within the enterprise network. Therefore, network analytics often requires the systems to decrypt ubiquitous SSL/TLS protocols to conduct analysis without the security of the underlying data being compromised. Network analysis tools can be used to monitor both north-south traffic on an enterprise network as well as east-west traffic (sometimes called lateral communications) between systems in a data center. 

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

March 21, 2019

Machine Learning: Key Adoption Cybersecurity Considerations

Learn how billions of dollars are being invested in ML for data analysis to improve decision-making or customer satisfaction.

See Details

July 21, 2015

Network Security Solutions

Learn how we help protect your environment while maintaining connectivity.

See Details

September 21, 2018

The Necessity of Enemy Perspectives: The Enemy Gets a Vote

The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many ar...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.