Global Information Lookup Global Information

Deep packet inspection information


Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network usage, troubleshooting network performance, ensuring that data is in the correct format, checking for malicious code, eavesdropping, and internet censorship,[1] among other purposes.[2] There are multiple headers for IP packets; network equipment only needs to use the first of these (the IP header) for normal operation, but use of the second header (such as TCP or UDP) is normally considered to be shallow packet inspection (usually called stateful packet inspection) despite this definition.[3]

There are multiple ways to acquire packets for deep packet inspection. Using port mirroring (sometimes called Span Port) is a very common way, as well as physically inserting a network tap which duplicates and sends the data stream to an analyzer tool for inspection.

Deep Packet Inspection (and filtering) enables advanced network management, user service, and security functions as well as internet data mining, eavesdropping, and internet censorship. Although DPI has been used for Internet management for many years, some advocates of net neutrality fear that the technique may be used anticompetitively or to reduce the openness of the Internet.[4]

DPI is used in a wide range of applications, at the so-called "enterprise" level (corporations and larger institutions), in telecommunications service providers, and in governments.[5]

  1. ^ Duncan Geere, https://www.wired.co.uk/article/how-deep-packet-inspection-works
  2. ^ Dharmapurikarg, Sarang; Krishnamurthy, Praveen; Sproull, Todd; Lockwood, John. "Deep packet inspection using parallel bloom filters". 11th Symposium on High Performance Interconnects.
  3. ^ Thomas Porter (2005-01-11). "The Perils of Deep Packet Inspection". SecurityFocus.com. Retrieved 2008-03-02.
  4. ^ Hal Abelson; Ken Ledeen; Chris Lewis (2009). "Just Deliver the Packets, in: "Essays on Deep Packet Inspection", Ottawa". Office of the Privacy Commissioner of Canada. Retrieved 2010-01-08.
  5. ^ Ralf Bendrath (2009-03-16). "Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection, Paper presented at the International Studies Annual Convention, New York City, 15–18 February 2009" (PDF). International Studies Association. Retrieved 2010-01-08.

and 26 Related for: Deep packet inspection information

Request time (Page generated in 0.8459 seconds.)

Deep packet inspection

Last Update:

Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such...

Word Count : 6024

Deep content inspection

Last Update:

words or other content level criteria. Deep Content Inspection is considered the evolution of Deep Packet Inspection with the ability to look at what the...

Word Count : 2104

Traffic classification

Last Update:

comparison of various network traffic classifiers, which depend on Deep Packet Inspection (PACE, OpenDPI, 4 different configurations of L7-filter, NDPI, Libprotoident...

Word Count : 1266

Net neutrality

Last Update:

released network firewalls in 2003 with so-called deep packet inspection capabilities. Deep packet inspection helped make real-time discrimination between...

Word Count : 18971

Internet censorship in Pakistan

Last Update:

Internet censorship in Pakistan is government control of information sent and received using the Internet in Pakistan. There have been significant instances...

Word Count : 4904

Buffer overflow

Last Update:

processes and libraries in the virtual address space. The use of deep packet inspection (DPI) can detect, at the network perimeter, very basic remote attempts...

Word Count : 5076

Secure Socket Tunneling Protocol

Last Update:

SSTP packet represents an SSTP control packet or an SSTP data packet. This bit is set if the SSTP packet is a control packet. Length (16 bits) – packet length...

Word Count : 747

Layer 2 Tunneling Protocol

Last Update:

network (for example: Frame Relay, Ethernet, ATM, etc.). The entire L2TP packet, including payload and L2TP header, is sent within a User Datagram Protocol...

Word Count : 1826

Internet censorship in Russia

Last Update:

of the censorship, for the first time noticed widespread use of deep packet inspection (DPI) across large mobile providers which resulted in domains related...

Word Count : 5931

Virtual private network

Last Update:

even if the network traffic is sniffed at the packet level (see network sniffer or deep packet inspection), an attacker would see only encrypted data,...

Word Count : 3697

Cisco

Last Update:

of several startups determined to find new ways to process IP and MPLS packets entirely in hardware and blur boundaries between routing and switching...

Word Count : 9228

Plusnet

Last Update:

Networks E30 Ellacoya platform to perform traffic fingerprinting using deep packet inspection and Juniper Networks ERX switches to perform protocol shaping has...

Word Count : 3598

Stop Online Piracy Act

Last Update:

that such an order might require those providers to engage in "deep packet inspection," which involves analyzing all of the content being transmitted...

Word Count : 15041

VPN blocking

Last Update:

government began using deep packet inspection to identify VPN protocols, the firm Golden Frog began scrambling OpenVPN packet metadata for its popular...

Word Count : 1548

SoftEther VPN

Last Update:

and firewalls. Firewalls performing deep packet inspection are unable to detect SoftEther's VPN transport packets as a VPN tunnel because HTTPS is used...

Word Count : 2053

Packet processing

Last Update:

packet payloads using Deep Packet Inspection (DPI) technologies. Packet switching also introduces some architectural compromises. Performing packet processing...

Word Count : 3089

Check Point

Last Update:

the initial idea for the company's core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1;...

Word Count : 2281

Nokia

Last Update:

of its citizens. The technology reportedly allowed Iran to use deep packet inspection to read and change the content of emails, social media, and online...

Word Count : 13755

DDoS mitigation

Last Update:

anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting. One technique is to...

Word Count : 594

Processing delay

Last Update:

algorithms and examining or modifying packet content. Deep packet inspection done by some networks examine packet content for security, legal, or other...

Word Count : 220

IPsec

Last Update:

(IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers...

Word Count : 5081

Internet censorship in China

Last Update:

spoofing, blocking access to IP addresses, analyzing and filtering URLs, packet inspection, and resetting connections. The government blocks website content...

Word Count : 15705

Sandvine

Last Update:

still delivering the same content. Sandvine uses stateful deep packet inspection and packet spoofing to allow the networking device to determine the details...

Word Count : 1663

Datagram Transport Layer Security

Last Update:

application has to deal with packet reordering, loss of datagram and data larger than the size of a datagram network packet. Because DTLS uses UDP or SCTP...

Word Count : 1146

Middlebox

Last Update:

than packet forwarding. Examples of middleboxes include firewalls, network address translators (NATs), load balancers, and deep packet inspection (DPI)...

Word Count : 1310

STUN

Last Update:

mapping to avoid translation of the packet content by application layer gateways (ALGs) that perform deep packet inspection in an attempt to perform alternate...

Word Count : 1059

PDF Search Engine © AllGlobal.net