2012
DOI: 10.1016/j.jnca.2012.07.010
|View full text |Cite
|
Sign up to set email alerts
|

Deep packet inspection tools and techniques in commodity platforms: Challenges and trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 47 publications
(31 citation statements)
references
References 48 publications
0
26
0
Order By: Relevance
“…ese features are frequently included in deep packet inspection techniques [49,50] but are often too slow to be included in standard firewalls. In order to provide a deep description of packets on the firewall layer and quickly evaluate them, the use of BPF language together with the BPF virtual machine subsystem included in the current versions of Linux kernel seems to be an elegant solution, especially as BPF had been used before to accomplish similar difficult network tasks with low computational effort [11].…”
Section: Os Firewalling Supportmentioning
confidence: 99%
“…ese features are frequently included in deep packet inspection techniques [49,50] but are often too slow to be included in standard firewalls. In order to provide a deep description of packets on the firewall layer and quickly evaluate them, the use of BPF language together with the BPF virtual machine subsystem included in the current versions of Linux kernel seems to be an elegant solution, especially as BPF had been used before to accomplish similar difficult network tasks with low computational effort [11].…”
Section: Os Firewalling Supportmentioning
confidence: 99%
“…The Packet Filter accesses KDF files and parse each captured data packet and drops any duplicated HTTP or non-HTTP packets. These HTTP packets needs to be analyzed using Deep Packet Inspection (DPI) Techniques [16]. The Packet Processor first retrieves the contents from the payload of the HTTP packet.…”
Section: System Architecturementioning
confidence: 99%
“…There are many methods for classifying network traffic. The most common methods are the classification by using known transport layer ports (port-based methodology) and Deep Packet Inspection (DPI) [14,26,27]. The port-based method analyzes the port numbers from the transport layer and is utilized to classify applications (e.g., Skype, BitTorrent, Edonkey) or application protocols (e.g., HTTP, FTP, DNS, SSH).…”
Section: Introductionmentioning
confidence: 99%