Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such...
56 KB (6,018 words) - 18:53, 2 June 2024
words or other content level criteria. Deep Content Inspection is considered the evolution of Deep Packet Inspection with the ability to look at what the...
17 KB (2,104 words) - 21:57, 31 March 2024
Traffic classification (redirect from Packet classifier)
comparison of various network traffic classifiers, which depend on Deep Packet Inspection (PACE, OpenDPI, 4 different configurations of L7-filter, NDPI, Libprotoident...
10 KB (1,266 words) - 01:08, 23 February 2024
Internet censorship in Pakistan is government control of information sent and received using the Internet in Pakistan. There have been significant instances...
60 KB (5,387 words) - 05:22, 10 June 2024
Buffer overflow (section Deep packet inspection)
processes and libraries in the virtual address space. The use of deep packet inspection (DPI) can detect, at the network perimeter, very basic remote attempts...
46 KB (5,076 words) - 15:27, 27 March 2024
SSTP packet represents an SSTP control packet or an SSTP data packet. This bit is set if the SSTP packet is a control packet. Length (16 bits) – packet length...
7 KB (747 words) - 05:45, 28 September 2023
Cisco (category Deep packet inspection)
of several startups determined to find new ways to process IP and MPLS packets entirely in hardware and blur boundaries between routing and switching...
104 KB (9,289 words) - 23:15, 13 June 2024
of the censorship, for the first time noticed widespread use of deep packet inspection (DPI) across large mobile providers which resulted in domains related...
65 KB (5,931 words) - 05:26, 10 June 2024
deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS-encrypted traffic inspection...
4 KB (442 words) - 08:45, 19 January 2024
that such an order might require those providers to engage in "deep packet inspection," which involves analyzing all of the content being transmitted...
166 KB (15,041 words) - 16:04, 13 June 2024
government began using deep packet inspection to identify VPN protocols, the firm Golden Frog began scrambling OpenVPN packet metadata for its popular...
15 KB (1,548 words) - 14:28, 7 June 2024
released network firewalls in 2003 with so-called deep packet inspection capabilities. Deep packet inspection helped make real-time discrimination between...
186 KB (18,966 words) - 02:26, 14 June 2024
Networks E30 Ellacoya platform to perform traffic fingerprinting using deep packet inspection and Juniper Networks ERX switches to perform protocol shaping has...
29 KB (3,598 words) - 15:58, 24 April 2024
Firewall (computing) (redirect from Deep packet filtering)
next-generation firewall provides a wider range of inspection at the application layer, extending deep packet inspection functionality to include, but is not limited...
22 KB (2,280 words) - 07:37, 13 May 2024
network (for example: Frame Relay, Ethernet, ATM, etc.). The entire L2TP packet, including payload and L2TP header, is sent within a User Datagram Protocol...
15 KB (1,825 words) - 14:10, 15 June 2024
even if the network traffic is sniffed at the packet level (see network sniffer or deep packet inspection), an attacker would see only encrypted data,...
36 KB (3,699 words) - 09:42, 11 June 2024
packet payloads using Deep Packet Inspection (DPI) technologies. Packet switching also introduces some architectural compromises. Performing packet processing...
25 KB (3,089 words) - 00:04, 17 April 2024
and firewalls. Firewalls performing deep packet inspection are unable to detect SoftEther's VPN transport packets as a VPN tunnel because HTTPS is used...
16 KB (2,053 words) - 11:34, 1 March 2024
anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting. One technique is to...
7 KB (594 words) - 19:55, 26 April 2024
Check Point (category Deep packet inspection)
the initial idea for the company's core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1;...
27 KB (2,297 words) - 23:19, 4 June 2024
of its citizens. The technology reportedly allowed Iran to use deep packet inspection to read and change the content of emails, social media, and online...
144 KB (13,753 words) - 08:47, 12 June 2024
Procera Networks (category Deep packet inspection)
designs and sells Network Intelligence solutions[buzzword] based on deep packet inspection (DPI) technology. Procera sells solutions[buzzword] to telecom operators...
8 KB (730 words) - 13:08, 8 May 2024
Processing delay (category Packets (information technology))
algorithms and examining or modifying packet content. Deep packet inspection done by some networks examine packet content for security, legal, or other...
2 KB (220 words) - 11:01, 15 April 2023
dataflow by inspecting some packets sent. The networking equipment which uses NBAR does a deep packet inspection on some of the packets in a dataflow, to determine...
2 KB (210 words) - 13:54, 30 March 2021
spoofing, blocking access to IP addresses, analyzing and filtering URLs, packet inspection, and resetting connections. The government blocks website content...
169 KB (15,766 words) - 06:58, 13 June 2024
also able to use the underlying classification technology like deep packet inspection to redirect enterprise-related data charges for employees using...
14 KB (1,531 words) - 00:48, 4 May 2024
Barracuda Networks (category Deep packet inspection)
Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's...
31 KB (2,513 words) - 10:32, 3 June 2024
rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering (bogus IP filtering) to detect and remediate...
99 KB (11,479 words) - 12:24, 15 June 2024
Clavister (category Deep packet inspection)
Clavister is a Swedish company specialized in network security software, listed on NASDAQ First North. According to a report from 451 Research, the Edward...
5 KB (329 words) - 10:26, 16 April 2024
channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets. Many modern VPNs use various forms of UDP for this same functionality...
8 KB (847 words) - 01:32, 4 April 2024