• Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such...
    56 KB (6,024 words) - 09:19, 11 May 2024
  • words or other content level criteria. Deep Content Inspection is considered the evolution of Deep Packet Inspection with the ability to look at what the...
    17 KB (2,104 words) - 21:57, 31 March 2024
  • comparison of various network traffic classifiers, which depend on Deep Packet Inspection (PACE, OpenDPI, 4 different configurations of L7-filter, NDPI, Libprotoident...
    10 KB (1,266 words) - 01:08, 23 February 2024
  • Thumbnail for Internet censorship in Pakistan
    Internet censorship in Pakistan is government control of information sent and received using the Internet in Pakistan. There have been significant instances...
    61 KB (5,424 words) - 22:49, 15 May 2024
  • Thumbnail for Buffer overflow
    processes and libraries in the virtual address space. The use of deep packet inspection (DPI) can detect, at the network perimeter, very basic remote attempts...
    46 KB (5,076 words) - 15:27, 27 March 2024
  • Thumbnail for Internet censorship in Russia
    of the censorship, for the first time noticed widespread use of deep packet inspection (DPI) across large mobile providers which resulted in domains related...
    65 KB (5,931 words) - 02:44, 4 January 2024
  • even if the network traffic is sniffed at the packet level (see network sniffer or deep packet inspection), an attacker would see only encrypted data,...
    36 KB (3,697 words) - 00:45, 28 April 2024
  • SSTP packet represents an SSTP control packet or an SSTP data packet. This bit is set if the SSTP packet is a control packet. Length (16 bits) – packet length...
    7 KB (747 words) - 05:45, 28 September 2023
  • deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS-encrypted traffic inspection...
    4 KB (442 words) - 08:45, 19 January 2024
  • next-generation firewall provides a wider range of inspection at the application layer, extending deep packet inspection functionality to include, but is not limited...
    22 KB (2,280 words) - 07:37, 13 May 2024
  • Networks E30 Ellacoya platform to perform traffic fingerprinting using deep packet inspection and Juniper Networks ERX switches to perform protocol shaping has...
    29 KB (3,598 words) - 15:58, 24 April 2024
  • Thumbnail for Net neutrality
    released network firewalls in 2003 with so-called deep packet inspection capabilities. Deep packet inspection helped make real-time discrimination between...
    186 KB (18,971 words) - 12:28, 9 May 2024
  • Thumbnail for Stop Online Piracy Act
    that such an order might require those providers to engage in "deep packet inspection," which involves analyzing all of the content being transmitted...
    166 KB (15,041 words) - 08:15, 30 April 2024
  • network (for example: Frame Relay, Ethernet, ATM, etc.). The entire L2TP packet, including payload and L2TP header, is sent within a User Datagram Protocol...
    15 KB (1,826 words) - 01:32, 4 April 2024
  • Thumbnail for VPN blocking
    government began using deep packet inspection to identify VPN protocols, the firm Golden Frog began scrambling OpenVPN packet metadata for its popular...
    15 KB (1,548 words) - 20:21, 31 March 2024
  • Thumbnail for Cisco
    Cisco (category Deep packet inspection)
    of several startups determined to find new ways to process IP and MPLS packets entirely in hardware and blur boundaries between routing and switching...
    103 KB (9,228 words) - 19:36, 3 May 2024
  • Thumbnail for SoftEther VPN
    and firewalls. Firewalls performing deep packet inspection are unable to detect SoftEther's VPN transport packets as a VPN tunnel because HTTPS is used...
    16 KB (2,053 words) - 11:34, 1 March 2024
  • Procera Networks (category Deep packet inspection)
    designs and sells Network Intelligence solutions[buzzword] based on deep packet inspection (DPI) technology. Procera sells solutions[buzzword] to telecom operators...
    8 KB (730 words) - 13:08, 8 May 2024
  • packet payloads using Deep Packet Inspection (DPI) technologies. Packet switching also introduces some architectural compromises. Performing packet processing...
    25 KB (3,089 words) - 00:04, 17 April 2024
  • Thumbnail for Check Point
    Check Point (category Deep packet inspection)
    the initial idea for the company's core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1;...
    26 KB (2,281 words) - 11:20, 16 May 2024
  • anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting. One technique is to...
    7 KB (594 words) - 19:55, 26 April 2024
  • dataflow by inspecting some packets sent. The networking equipment which uses NBAR does a deep packet inspection on some of the packets in a dataflow, to determine...
    2 KB (210 words) - 13:54, 30 March 2021
  • Thumbnail for Nokia
    of its citizens. The technology reportedly allowed Iran to use deep packet inspection to read and change the content of emails, social media, and online...
    144 KB (13,755 words) - 12:19, 16 May 2024
  • multiple platforms and federations. Technically, the service provides deep packet inspection proxying (in a similar manner to EZproxy) and SAML-based federation...
    4 KB (316 words) - 16:11, 14 October 2023
  • than packet forwarding. Examples of middleboxes include firewalls, network address translators (NATs), load balancers, and deep packet inspection (DPI)...
    13 KB (1,310 words) - 14:20, 19 April 2024
  • needed] One technique that may be used to collect user data could be Deep Packet Inspection. According to Office for Security and Counter-Terrorism Charles...
    26 KB (2,876 words) - 17:48, 30 December 2023
  • Thumbnail for Denial-of-service attack
    rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering (bogus IP filtering) to detect and remediate...
    99 KB (11,461 words) - 15:05, 17 May 2024
  • (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers...
    48 KB (5,081 words) - 13:09, 11 May 2024
  • Clavister (category Deep packet inspection)
    Clavister is a Swedish company specialized in network security software, listed on NASDAQ First North. According to a report from 451 Research, the Edward...
    5 KB (329 words) - 10:26, 16 April 2024
  • Processing delay (category Packets (information technology))
    algorithms and examining or modifying packet content. Deep packet inspection done by some networks examine packet content for security, legal, or other...
    2 KB (220 words) - 11:01, 15 April 2023