The examples and perspective in this article may not represent a worldwide view of the subject. You may improve this article, discuss the issue on the talk page, or create a new article, as appropriate.(February 2018) (Learn how and when to remove this message)
Part of a series about
Net neutrality
Topics and issues
Bandwidth throttling
Data cap
Deep packet inspection
End-to-end principle
Internet Protocol (IP)
Net bias
Net neutrality law
Search neutrality
Tiered Internet
By country or region
Brazil
Canada
Chile
European Union
India
Netherlands
Philippines
Singapore
United States (FCC)
v
t
e
Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network usage, troubleshooting network performance, ensuring that data is in the correct format, checking for malicious code, eavesdropping, and internet censorship,[1] among other purposes.[2] There are multiple headers for IP packets; network equipment only needs to use the first of these (the IP header) for normal operation, but use of the second header (such as TCP or UDP) is normally considered to be shallow packet inspection (usually called stateful packet inspection) despite this definition.[3]
There are multiple ways to acquire packets for deep packet inspection. Using port mirroring (sometimes called Span Port) is a very common way, as well as physically inserting a network tap which duplicates and sends the data stream to an analyzer tool for inspection.
Deep Packet Inspection (and filtering) enables advanced network management, user service, and security functions as well as internet data mining, eavesdropping, and internet censorship. Although DPI has been used for Internet management for many years, some advocates of net neutrality fear that the technique may be used anticompetitively or to reduce the openness of the Internet.[4]
DPI is used in a wide range of applications, at the so-called "enterprise" level (corporations and larger institutions), in telecommunications service providers, and in governments.[5]
^Dharmapurikarg, Sarang; Krishnamurthy, Praveen; Sproull, Todd; Lockwood, John. "Deep packet inspection using parallel bloom filters". 11th Symposium on High Performance Interconnects.
^Thomas Porter (2005-01-11). "The Perils of Deep Packet Inspection". SecurityFocus.com. Retrieved 2008-03-02.
^Hal Abelson; Ken Ledeen; Chris Lewis (2009). "Just Deliver the Packets, in: "Essays on Deep Packet Inspection", Ottawa". Office of the Privacy Commissioner of Canada. Retrieved 2010-01-08.
^Ralf Bendrath (2009-03-16). "Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection, Paper presented at the International Studies Annual Convention, New York City, 15–18 February 2009" (PDF). International Studies Association. Retrieved 2010-01-08.
and 26 Related for: Deep packet inspection information
Deeppacketinspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such...
words or other content level criteria. Deep Content Inspection is considered the evolution of DeepPacketInspection with the ability to look at what the...
comparison of various network traffic classifiers, which depend on DeepPacketInspection (PACE, OpenDPI, 4 different configurations of L7-filter, NDPI, Libprotoident...
released network firewalls in 2003 with so-called deeppacketinspection capabilities. Deeppacketinspection helped make real-time discrimination between...
Internet censorship in Pakistan is government control of information sent and received using the Internet in Pakistan. There have been significant instances...
processes and libraries in the virtual address space. The use of deeppacketinspection (DPI) can detect, at the network perimeter, very basic remote attempts...
SSTP packet represents an SSTP control packet or an SSTP data packet. This bit is set if the SSTP packet is a control packet. Length (16 bits) – packet length...
network (for example: Frame Relay, Ethernet, ATM, etc.). The entire L2TP packet, including payload and L2TP header, is sent within a User Datagram Protocol...
of the censorship, for the first time noticed widespread use of deeppacketinspection (DPI) across large mobile providers which resulted in domains related...
even if the network traffic is sniffed at the packet level (see network sniffer or deeppacketinspection), an attacker would see only encrypted data,...
of several startups determined to find new ways to process IP and MPLS packets entirely in hardware and blur boundaries between routing and switching...
Networks E30 Ellacoya platform to perform traffic fingerprinting using deeppacketinspection and Juniper Networks ERX switches to perform protocol shaping has...
government began using deeppacketinspection to identify VPN protocols, the firm Golden Frog began scrambling OpenVPN packet metadata for its popular...
and firewalls. Firewalls performing deeppacketinspection are unable to detect SoftEther's VPN transport packets as a VPN tunnel because HTTPS is used...
the initial idea for the company's core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1;...
of its citizens. The technology reportedly allowed Iran to use deeppacketinspection to read and change the content of emails, social media, and online...
anti-DDoS technology like connection tracking, IP reputation lists, deeppacketinspection, blacklisting/whitelisting, or rate limiting. One technique is to...
algorithms and examining or modifying packet content. Deeppacketinspection done by some networks examine packet content for security, legal, or other...
(IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers...
spoofing, blocking access to IP addresses, analyzing and filtering URLs, packetinspection, and resetting connections. The government blocks website content...
still delivering the same content. Sandvine uses stateful deeppacketinspection and packet spoofing to allow the networking device to determine the details...
application has to deal with packet reordering, loss of datagram and data larger than the size of a datagram network packet. Because DTLS uses UDP or SCTP...
than packet forwarding. Examples of middleboxes include firewalls, network address translators (NATs), load balancers, and deeppacketinspection (DPI)...
mapping to avoid translation of the packet content by application layer gateways (ALGs) that perform deeppacketinspection in an attempt to perform alternate...