Nous utilisons des cookies pour vous fournir un meilleur service et analyser le trafic. Pour en savoir plus sur les cookies, veuillez consulter notre Déclaration relative aux cookies. En continuant à naviguer sur notre site web, vous acceptez notre utilisation des cookies.

D'accord
Gérer

Paramètres des cookies

Nous utilisons des cookies pour vous fournir un meilleur service et analyser le trafic. Pour en savoir plus sur les cookies, veuillez consulter notre Déclaration sur les cookies.

Essentiel

Notre site web repose sur ces cookies pour assurer son bon fonctionnement.

Fonctionnalité

Ces cookies sont utilisés pour conserver vos préférences, telles que la sélection de la langue.

Statistiques

Les cookies nous permettent d'obtenir des informations sur nos visiteurs et d'améliorer leur navigation.

Publicité

Cookies utilisés pour suivre les conversions des plateformes publicitaires.

La rédaction est traduite en français.

Le cadeau Premium X‑VPN a lieu maintenant sur notre Subreddit!

Le cadeau Premium X‑VPN a lieu maintenant sur notre Subreddit!
Entrez maintenant

Deep Packet Inspection

What Is Deep Packet Inspection?

Deep Packet Inspection, DPI, also known as Complete Packet Inspection or Packet Sniffing, is an extremely advanced packet filtering method that effectively inspects packet contents.

Ordinary packet filtering methods only examine the info in the header of the packet transmitted through the inspection point, such as IP address, port number, etc. DPI, on the other hand, examines and evaluates a wider range of metadata and headers in a packet to search for and clean up non-compliant protocols, viruses, spam, and malicious intrusions, and decides whether the packet passes through or needs to be routed to the next destination based on the relevant criteria.

Overall, DPI has a wide range of applications to enhance network management, user services, and security functions, and can also be used for Internet data mining, eavesdropping, or Internet censorship.

Techniques of Deep Packet Inspection

DPI relies on the following three main techniques to filter packets.

Pattern or Signature Matching

This method enables DPI to scrutinize packet contents and match them against a database of known threats to detect potential dangers. If the DPI consistently updates its database, it can effectively halt malicious traffic. The primary limitation of this approach, however, is that it is only effective against familiar threats and falls short in identifying novel attacks.

Protocol Anomaly

Protocol Anomaly compensates for the shortcomings of the previous technique by employing a "default deny" policy. Under this policy, only data that meets the requirements of the protocol can pass through.

Intrusion Prevention System

IPS technology is utilized to intercept and block malicious packets instantaneously, actively filtering network traffic according to predefined rules. However, the risk of false positives exists, and a cautious policy could help mitigate this issue.

limitations of Deep Packet Inspection

1. DPI may create new vulnerabilities while discovering existing ones. While it is effective in preventing malicious attacks, sometimes DPI can be exploited by these attacks.

2. The use of DPI adds complexity and challenges to operating firewalls and security applications. Also, DPI requires continuous updating and revising of its database, which undoubtedly adds to the administrative burden.

3. DPI reduces the speed and performance of computers because it puts an additional burden on the CPU.

DNS