SlideShare une entreprise Scribd logo
1  sur  14
Deep Packet inspection:
Technology and products
Daniel Vinyar
daniel@jet.msk.su
Network Solution Center

11.02.2014
DPI technology & products
•
•
•
•
•

DPI technology evolution
DPI current products market
DPI as a product
DPI ecosystem & cases
Technology trends

© 2011 Инфосистемы Джет

2
DPI technology evolution

tcp statement
control fw,
simple
NAT/PAT

1992-1997

© 2011 Инфосистемы Джет

Server load
balancing, app
lication
proxy, ADC

1996-2001

SBC, Channel
Optimization,
Security
products

DPI product

2000-2006

2006-xxxx

3
DPI current products market
• Traffic identification core- Qosmos, VineYard Networks, Agata Solutions,
Ipoque, windriver
• Hardware components - Tilera, Napatech, Cavium, Radisys
• Standalone solution - Allot Communications, Cisco, Huawei, Ipoque,
Procera Networks, Sandvine, F5
• Embedded solution - Alu, Cisco, Ericsson, Huawei, NSN
Russian developers:
• Natsys-lab http://natsys-lab.com
• VAS Experts http://pcef.ru
• MFIsoft http://mfisoft.ru
• RuChip http://ruchip.com/

© 2011 Инфосистемы Джет

4
DPI as a product
•
•
•
•
•
•
•
•
•
•

Network integration – in-line transparent
Flow identification – by IP header 5-tuples
Per flow protocol/application identification
Asymmetric flow control
Flow per Protocol/Application classification
Subscriber identification
Flow per subscriber classification
External control plain integration
Flow per external criteria classification
Flow property extraction

© 2011 Инфосистемы Джет

5
DPI as a product
Statistics/accounting
• Long term statistics
• Accounting for billing
• API for BI/Billing
Technical parameters
Billing parameters
Marketing parameters

© 2011 Инфосистемы Джет

6
DPI as a product
Traffic Management:
• Shaping & priority – queue management
• Filtering – accept/drop/reject/redirect
• Traffic steering – divert, ADC
• Packet header manipulation – 802.1q, IP, MAC
• HTTP header manipulation/enreachment

© 2011 Инфосистемы Джет

7
DPI platform features & parameters
Performance:
• By bandwidth, pps, cps, concurrent flow/subscribers
• By traffic identification
• By external software interfaces
Traffic identification quality (accuracy):
• Number of identified protocols & applications
• Share of unidentified traffic
• Share of identification mistakes
• Protocol property extraction
Traffic management quality:
• Flow description & classification features
• Queue & priority management
• Filters and filtering actions
• Traffic steering features
© 2011 Инфосистемы Джет

8
DPI ecosystem

© 2011 Инфосистемы Джет

9
Traffic management points

External
National

BB router
Border
router

Transport Intercity/
International backbone

BB router

Mobile
Broadband 3G

External
International
Border
router

BB router

City
Backbone

Mobile IP
Backbone
GGSN

BB router

BRAS

BRAS

FTTB Access
segment

FTTB Access
segment
BRAS

BRAS

Remote town
FTTB Access
segment

FTTB Access
segment

© 2011 Инфосистемы Джет

10
Most popular use cases
•

•
•
•
•
•
•
•

Tiered services:
• Differentiated charging
• Service prioritization
• Parental Control
Data CAPS:
• Fair usage
• Quotas
Bandwidth on demand
Shared plans
• Single account multiple devices
• Single account multiple users
RAT type based bandwidth
Location based services
Device type specific
• Different application per device
• Tethering control
Congestion control/network offload

© 2011 Инфосистемы Джет

11
Tendencies and trends
•

New application/protocol development

•

Software defined networking/Network function Virtualization

© 2011 Инфосистемы Джет

12
Thank you

© 2011 Инфосистемы Джет

13
DPI technology evolution
Mid 90 - Syn flood vs. tcp statement control fw, simple NAT/PAT
Second part 90 - Server load balancing, application proxy
• ADC – Alteon, Radware, F5, Brocade, Cisco (HTTP, DNS, SSL)
First half of first decade – different application area:
• SBC - Acme Packet, Audiocodes, Cisco, Genband (SIP, SIGTRAN,
RTP/SRTP)
• Security products – Arbor, BlueCoat, SonicWall (tcp session behaviour,
HTTP URL classification/Filtering)
• Channel optimization - Riverbed (Corp application caching, de-duplication,
compression)
Second half of first decade – DPI as a product
• Mass protocols/application identification
• Per flow manipulation – Statistics/Shaping/filtering
• External control plane for subscriber identification
• Flow classification
© 2011 Инфосистемы Джет

14

Contenu connexe

Tendances

Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switchingseanraz
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Ashley Wheeler
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)PeterNiblett
 
Workshop Wireshark
Workshop Wireshark Workshop Wireshark
Workshop Wireshark Fabio Rosa
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switchingSumita Das
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
Chapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7thChapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Wan technologies
Wan technologiesWan technologies
Wan technologiesOnline
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Segment Routing for Dummies
Segment Routing for DummiesSegment Routing for Dummies
Segment Routing for DummiesGary Jan
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...ThousandEyes
 

Tendances (20)

Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
CISCO CCIE SPAN RSPAN ERSPAN
CISCO CCIE SPAN RSPAN ERSPANCISCO CCIE SPAN RSPAN ERSPAN
CISCO CCIE SPAN RSPAN ERSPAN
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
 
20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
 
Workshop Wireshark
Workshop Wireshark Workshop Wireshark
Workshop Wireshark
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
SPAN, RSPAN and ERSPAN
SPAN, RSPAN and ERSPANSPAN, RSPAN and ERSPAN
SPAN, RSPAN and ERSPAN
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Chapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7thChapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7th
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Segment Routing for Dummies
Segment Routing for DummiesSegment Routing for Dummies
Segment Routing for Dummies
 
5G Network Slicing
5G Network Slicing5G Network Slicing
5G Network Slicing
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
5G Network Overview
 5G Network Overview 5G Network Overview
5G Network Overview
 

En vedette

CapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionCapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionChris Harrington
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baseliningTony Fortunato
 
2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcastTony Fortunato
 
Debugging with Fiddler
Debugging with FiddlerDebugging with Fiddler
Debugging with FiddlerIdo Flatow
 
Wireshark
WiresharkWireshark
Wiresharkbtohara
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overviewlaurenjthomson
 
Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...
Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...
Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...Computaris
 
Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3gueste47133
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksRohan Fernandes
 
Traffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload GatewayTraffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload GatewayContinuous Computing
 
Network Monitoring Trends 2014
Network Monitoring Trends 2014Network Monitoring Trends 2014
Network Monitoring Trends 2014NetFort
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)military
 

En vedette (19)

CapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionCapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet Inspection
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
 
2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast
 
Debugging with Fiddler
Debugging with FiddlerDebugging with Fiddler
Debugging with Fiddler
 
Wireshark
WiresharkWireshark
Wireshark
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
SCE 2
SCE 2SCE 2
SCE 2
 
SCE 3
SCE 3SCE 3
SCE 3
 
Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overview
 
SCE 1
SCE 1SCE 1
SCE 1
 
Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...
Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...
Sandvine Webinar – Making Cents of Internet Phenomena Through Network Busines...
 
Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Traffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload GatewayTraffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload Gateway
 
Network Monitoring Trends 2014
Network Monitoring Trends 2014Network Monitoring Trends 2014
Network Monitoring Trends 2014
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 

Similaire à Deep Packet inspection tech & products overview

NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutionsNUVX
 
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Governments ENabled with IPv6
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11nswathi b
 
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PROIDEA
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationPaul Richards
 
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PROIDEA
 
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelMobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelUntil ROI
 
Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.ManageEngine, Zoho Corporation
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider NetworksOVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider NetworksNAIM Networks, Inc.
 
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoTDigipolis Antwerpen
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for youCisco Canada
 
ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529
ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529
ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529Stanley Tseng
 
Current trends in open source and automotive
Current trends in open source and automotiveCurrent trends in open source and automotive
Current trends in open source and automotiveRyo Jin
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 
Mobile computing
Mobile computingMobile computing
Mobile computingamellia27
 

Similaire à Deep Packet inspection tech & products overview (20)

NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11n
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples
 
Firetide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for TransportationFiretide Wireless Mesh Nodes for Transportation
Firetide Wireless Mesh Nodes for Transportation
 
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
 
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelMobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
 
Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.Webinar: How to troubleshoot bandwidth hogs and take action.
Webinar: How to troubleshoot bandwidth hogs and take action.
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider NetworksOVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Wap & WML
Wap & WMLWap & WML
Wap & WML
 
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoT
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529
ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529
ITRI ICL LTE SmallCell & Multi-RAT G/W 技術介紹 20140529
 
Current trends in open source and automotive
Current trends in open source and automotiveCurrent trends in open source and automotive
Current trends in open source and automotive
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Deep Packet inspection tech & products overview

  • 1. Deep Packet inspection: Technology and products Daniel Vinyar daniel@jet.msk.su Network Solution Center 11.02.2014
  • 2. DPI technology & products • • • • • DPI technology evolution DPI current products market DPI as a product DPI ecosystem & cases Technology trends © 2011 Инфосистемы Джет 2
  • 3. DPI technology evolution tcp statement control fw, simple NAT/PAT 1992-1997 © 2011 Инфосистемы Джет Server load balancing, app lication proxy, ADC 1996-2001 SBC, Channel Optimization, Security products DPI product 2000-2006 2006-xxxx 3
  • 4. DPI current products market • Traffic identification core- Qosmos, VineYard Networks, Agata Solutions, Ipoque, windriver • Hardware components - Tilera, Napatech, Cavium, Radisys • Standalone solution - Allot Communications, Cisco, Huawei, Ipoque, Procera Networks, Sandvine, F5 • Embedded solution - Alu, Cisco, Ericsson, Huawei, NSN Russian developers: • Natsys-lab http://natsys-lab.com • VAS Experts http://pcef.ru • MFIsoft http://mfisoft.ru • RuChip http://ruchip.com/ © 2011 Инфосистемы Джет 4
  • 5. DPI as a product • • • • • • • • • • Network integration – in-line transparent Flow identification – by IP header 5-tuples Per flow protocol/application identification Asymmetric flow control Flow per Protocol/Application classification Subscriber identification Flow per subscriber classification External control plain integration Flow per external criteria classification Flow property extraction © 2011 Инфосистемы Джет 5
  • 6. DPI as a product Statistics/accounting • Long term statistics • Accounting for billing • API for BI/Billing Technical parameters Billing parameters Marketing parameters © 2011 Инфосистемы Джет 6
  • 7. DPI as a product Traffic Management: • Shaping & priority – queue management • Filtering – accept/drop/reject/redirect • Traffic steering – divert, ADC • Packet header manipulation – 802.1q, IP, MAC • HTTP header manipulation/enreachment © 2011 Инфосистемы Джет 7
  • 8. DPI platform features & parameters Performance: • By bandwidth, pps, cps, concurrent flow/subscribers • By traffic identification • By external software interfaces Traffic identification quality (accuracy): • Number of identified protocols & applications • Share of unidentified traffic • Share of identification mistakes • Protocol property extraction Traffic management quality: • Flow description & classification features • Queue & priority management • Filters and filtering actions • Traffic steering features © 2011 Инфосистемы Джет 8
  • 9. DPI ecosystem © 2011 Инфосистемы Джет 9
  • 10. Traffic management points External National BB router Border router Transport Intercity/ International backbone BB router Mobile Broadband 3G External International Border router BB router City Backbone Mobile IP Backbone GGSN BB router BRAS BRAS FTTB Access segment FTTB Access segment BRAS BRAS Remote town FTTB Access segment FTTB Access segment © 2011 Инфосистемы Джет 10
  • 11. Most popular use cases • • • • • • • • Tiered services: • Differentiated charging • Service prioritization • Parental Control Data CAPS: • Fair usage • Quotas Bandwidth on demand Shared plans • Single account multiple devices • Single account multiple users RAT type based bandwidth Location based services Device type specific • Different application per device • Tethering control Congestion control/network offload © 2011 Инфосистемы Джет 11
  • 12. Tendencies and trends • New application/protocol development • Software defined networking/Network function Virtualization © 2011 Инфосистемы Джет 12
  • 13. Thank you © 2011 Инфосистемы Джет 13
  • 14. DPI technology evolution Mid 90 - Syn flood vs. tcp statement control fw, simple NAT/PAT Second part 90 - Server load balancing, application proxy • ADC – Alteon, Radware, F5, Brocade, Cisco (HTTP, DNS, SSL) First half of first decade – different application area: • SBC - Acme Packet, Audiocodes, Cisco, Genband (SIP, SIGTRAN, RTP/SRTP) • Security products – Arbor, BlueCoat, SonicWall (tcp session behaviour, HTTP URL classification/Filtering) • Channel optimization - Riverbed (Corp application caching, de-duplication, compression) Second half of first decade – DPI as a product • Mass protocols/application identification • Per flow manipulation – Statistics/Shaping/filtering • External control plane for subscriber identification • Flow classification © 2011 Инфосистемы Джет 14