A Survey on Deep Packet Inspection

被引:0
|
作者
El-Maghraby, Reham Taher [1 ]
Abd Elazim, Nada Mostafa [1 ]
Bahaa-Eldin, Ayaman M. [2 ]
机构
[1] Arab Acad Sci & Technol, Coll Engn, Dept Comp Engn, Cairo, Egypt
[2] Misr Int Univ, Cairo, Egypt
关键词
Deep Packet Inspection; Intrusion Dtection System; Matching Algorithms; DPI Challenges;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deep Packet Inspection (DPI) considered as one of the most important parts in content-aware network applications such as copyright enforcement, Intrusion detection system (IDS) and other applications will be discussed later. DPI rely on comparing to parts payload and signature (IP header). IT compares them with known signatures to decide if the packet is harmful (similar to any of attacks database signatures) and delete it or pass it through the network flow. it deals with the content below the 4th layer of the IP packet that includes source and destination ports, source and destination addresses and type of protocol. It classifies type of the application depending on its port number. For signature comparison, many algorithms arc applied such as regular expressions (most popular) and others discussed later. Nowadays many applications rely on DPI for inspecting packets in network stream. This survey gives a brief idea about challenges in DPI and some of the design objectives. Then explaining in short words different matching algorithms with their limitations. At the end, some of the most popular techniques using DPI.
引用
收藏
页码:188 / 197
页数:10
相关论文
共 50 条
  • [1] Deep Packet Inspection as a Service
    Bremler-Barr, Anat
    Harchol, Yotam
    Hay, David
    Koral, Yaron
    [J]. PROCEEDINGS OF THE 2014 CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT'14), 2014, : 271 - 282
  • [2] Elastic Deep Packet Inspection
    Watson, Bruce W.
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 2014, : 241 - 253
  • [3] QCF for deep packet inspection
    Al-hisnawi, Mohammad
    Ahmadi, Mahmood
    [J]. IET NETWORKS, 2018, 7 (05) : 346 - 352
  • [4] Plumb the depths of deep packet inspection
    NETRONOME
    [J]. Electron. Des, 2009, 16 (47-50):
  • [5] Deep Packet Inspection in Firewall Clusters
    Hamilton, Robert
    Gray, Wayne
    Sibanda, Clifford
    Kandasamy, Subbiah
    Kirner, Raimund
    Tsokanos, Athanasios
    [J]. 2020 28TH TELECOMMUNICATIONS FORUM (TELFOR), 2020, : 121 - 124
  • [6] Parallelizing Deep Packet Inspection on GPU
    Ramesh, Meera
    Jeon, Hyeran
    [J]. 2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018), 2018, : 248 - 253
  • [7] A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms
    Xu, Chengcheng
    Chen, Shuhui
    Su, Jinshu
    Yiu, S. M.
    Hui, Lucas C. K.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (04): : 2991 - 3029
  • [8] Monitoring and Indentification Packet in Wireless With Deep Packet Inspection Method
    Oklilas, Ahmad Fali
    Tasmi
    [J]. IAES INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS, 2017, 190
  • [9] Slimming Down Deep Packet Inspection Systems
    Fernandes, Stenio
    Antonello, Rafael
    Lacerda, Thiago
    Santos, Alysson
    Sadok, Djamel
    Westholm, Tord
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 61 - +
  • [10] Deep Packet Inspection: Algorithms, Hardware, and Applications
    Lin, Ying-Dar
    Lin, Po-Ching
    Prasanna, Viktor K.
    Chao, H. Jonathan
    Lockwood, John W.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (10) : 1781 - 1783