SlideShare une entreprise Scribd logo
1  sur  22
Shine a Light on the
Darkening of the Internet
How to maintain visibility in the age of encryption
Cam Cullen,
VP Marketing
Mimic bird
3
Encrypted Traffic Dominates Networks Worldwide
Service Upstream %
SSL v3 16.12%
WebDAV 7.83%
Netflix 5.65%
HTTP 5.52%
HTTP media stream 5.41%
Raw MPEG-TS 4.85%
BitTorrent transfer 4.85%
uTP 4.65%
BitTorrent KRPC 3.70%
Google 3.40%
YouTube 2.04%
RTP 1.73%
HTTP download 1.44%
Facebook 1.44%
BitTorrent encrypted transfer 1.39%
Procera Networks Data - December 2016
Service Downstream %
Netflix 19.27%
HTTP media stream 16.39%
SSL v3 9.63%
YouTube 8.96%
HTTP 4.47%
Raw MPEG-TS 4.08%
HTTP download 3.42%
Facebook 3.19%
QUIC 1.86%
Xbox Live update 1.49%
Instagram 1.46%
Playstation.net download 1.16%
uTP 1.09%
BitTorrent transfer 1.05%
HTTP2 over TLS 1.00%
Regional Popularity
December 2016
Service DS% US%
Netflix 22.51% 9.04%
HTTP media stream 17.64% 6.84%
SSL v3 8.66%18.98%
Raw MPEG-TS 7.79% 8.48%
YouTube 5.35% 2.05%
Service DS% US%
HTTP media stream 21.54% 2.77%
SSL v3 8.06% 8.17%
YouTube 7.23% .86%
HTTP 5.17% 3.9%
BitTorrent KPRC 5.13%25.68%
Service DS% US%
HTTP media stream 13.06% 2.72%
Netflix 11.90% 1.81%
SSL v3 8.78%14.88%
Facebook 7.75% 1.80%
YouTube 7.04% 2.22%
Worldwide Application Growth (By Volume)
2016 Growth in Key Services – Heavy on Encrypted Applications
Service Upstream
Netflix 30.93%
YouTube 61.01%
SSL v3 47.45%
HTTP 63.65%
Facebook 88.57%
Amazon Prime 257.64%
Instagram 119.20%
uTP 58.37%
Twitch 82.60%
Twitter 93.26%
Service Downstream
Netflix 93.55%
YouTube 67.61%
SSL v3 140.25%
HTTP 80.71%
Facebook 76.72%
Amazon Prime 217.23%
Instagram 145.64%
uTP 69.09%
Twitch 175.47%
Twitter 136.21%
What do we mean by encryption
Three categories
Obfuscation Proxies Encryption
PROXIES ENCRYPTION
VPN
Encryption Scenarios Going Forward
10
HTTP HTTPS
(TLS 1.1/1.2)
Full URL
Hostname
User Agent
Content Type
File Size
Other HTTP/HTML
Full URL
Hostname (direct)
User Agent
Content Type
File Size
Other HTTP/HTML
1 TLS 1.3
SNI Clear
TLS 1.3
SNI Encrypted
DNS
Encrypted
2 3 4
1 Happening 2015 and 2016
Will happen in 2017
May happen as part of TLS1.3 in 12-18 months
May happen in 24-36 months
2
3
4
Full URL
Hostname (direct)
User Agent
Content Type
File Size
Other HTTP/HTML
Full URL
Hostname (inferred)
User Agent
Content Type
File Size
Other HTTP/HTML
Full URL
Hostname (inferred)
User Agent
Content Type
File Size
Other HTTP/HTML
HTTP
23%
non-
HTTP
77%
How Is
Procera
Helping
Operators?
Weekly Signature Updates
Industry-leading Agility and Speed to Keep Pace with the Internet Age
2775 signatures
Average of
16 updates or
additions per
week over the
past year
Multiple Application Detection Techniques
•Expression matches: Patterns on payload
•Analyzers: Virtual Services
•Control/Data protocols: Port tainted
•TLS detection: SNI tracking
•Heuristics mechanisms: Flow behavioral
analysis
— Randomness
— Metrics
— VoIP flag
Sample of DRDL techniques for Application Identification
Sophisticated Tools to Accelerate Development
Highly Automated Signatures Lab Solves Major Challenges
Assessing Regional
Dependencies
Automated Update
Tracking
The Device Matters
bundle
Rapidly Adaptable
Heuristics Engine
(RAHE)
Real-Time
Endpoint
Classification
(REC)
Enhanced Device
detection
Continuous Improvement: Enhanced Capabilities in 2017
Traffic
Management
Policy &
Charging
IT Analytics Regulatory
Compliance
Security
Verticals
Use Cases
• NOC Dashboard
• QoE Measurement
• Capacity Planning
• Worst Node Reporting
• Speedtest Reporting
• CDN Reporting
• Device Reporting
• …...
• VOIP Blocking
• P2P Blocking
• Blocking Child Porn
• Site Blacklisting
• Website Access Logs
• Lawful Intercept
• DMCA Notice Analysis
• …..
• Resolution-based TM
• Peering Circuit Mgmt
• Heavy User Tiering
• DSCP Marking
• Optimizing Circuits
• Tethering Detection
• Line Sharing Detection
• …...
• Zero Rating
• CDR Generation
• Tiered Bandwidth Plans
• Top Up Portals
• Shared Plans
• Tiered Quota Plans
• Subscriber Engagement
• …...
• Malware Detection
• Spam Server Detection
• SSL Attacks
• Profiling Malicious Traffic
• DDOS Dashboard
• DDOS Forensics
• Volumetric Att. Detection
• …...
• Revenue Assurance
• Big Data Enablement
• ScoreCard
• OTT Trend Monitoring
• …...
Solution Areas
• Regulatory Analytics
• OTT Traffic Blocking
• Compliance Logging
• URL Filtering
• ….
• Fair Usage
• Congestion Mgmt
• Video Traffic Mgmt
• Carrier Grade NAT
• ….
• PCC w/GX/Gy
• Zero Rating
• Quota Management
• Parental Control
• ….
• DDOS Analytics
• DDOS Mitigation
• IoT Security
Maintaining Visibility Across Multiple Use Cases
Ensuring up-to-date visibility despite encryption
Impact of Encryption on Use Cases
And leveraging virtualization
SecurityIT Analytics Traffic
Management
Policy &
Charging
to
Regulatory
Compliance
to
eVolution eVolution
eVolution
•Customer Shifted from a
traditional probe to
Procera due to reduced
visibility
• Supporting Tens of Millions
of Mobile subscribers
• Over 20 virtual systems
running >40Gbps of capacity
streaming IPFix to HP Big
Data system
•Executives get weekly
reports leveraging
Procera’s Unique
Network, Subscriber,
and Service Intelligence
Virtualization: LTE Analytics Use Cases
Executive Decisioning with Carrier-Scale Big Data Deployment
PSM
LTE
Packet Core
Core Router
IPFix
IPFix
eVolution
Provisioning
LiveView
HP Data
Warehouse
Sample Use Cases
OTT
Trending
Revenue
Assurance
IoT
Analytics
Network Forensics
Service
Planning
Performance
Monitoring
Encryption: In-Line Policy Enforcement Use Cases
High Profile Application Aware Services and Regulatory Compliance
Real-time
Visibility
Real-time forensics
with topology
awareness
Traffic Mgmt
Sophisticated
queuing to enhance
subscriber QoE and
manage P2P shaping
Regulatory
Compliance
OTT VOIP Blocking
and VPN detection
Analytics
Subscriber,
application, location
and device reporting
and forecasting
Customer Care
Customer Care
Insights for real-time
problem resolution
Intelligent
Charging
Differentiated billing
based on subscriber
intelligence using Gy
Tiered Services
Service plans
enhancing customer
value using Gx
Peering
BGP Peering
analytics and
management
WiFi Services
PCEF for the WiFi
Network using Gx
and Gy
URL
Categorization
URL categorization
based on a set of
predefined rules
OTT Partnerships
Zero-rating and/or
revenue sharing
partnerships with
OTT players
IPFix Data Feed
For use with
sixthsense media
services
40G
per
system
80G
per
system
Internet
.
.
.
x9
.
.
. x4
Big Data: Analytics Use Cases
Data Scientists + Procera Data = $$$M in Additional Revenue Generated in 2016
PRE PL 8960
PSM Cluster
for Enrichment
6 Collection Sites
StreamMediation
.
.
.
.
PIC
COLLECTOR
IPFIX
CDR
Data
Analytics
Visualisation
Campaign
Management
Billing
IN
CRM
Network
TV Log
Sample Use Cases
Revenue
Assurance
Campaign
Demographics
Network Forensics
Service
Planning
QoE
Monitoring
Trend
Monitoring
Thank you
Download the whitepaper at:
https://www.proceranetworks.com/lp-
procera-spotlights-encryption

Contenu connexe

Tendances

Are You Ready For More Visitors Cognizant Gomez Jan20
Are You Ready For More Visitors   Cognizant  Gomez Jan20Are You Ready For More Visitors   Cognizant  Gomez Jan20
Are You Ready For More Visitors Cognizant Gomez Jan20Compuware APM
 
The Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and TakeawaysThe Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and TakeawaysThousandEyes
 
Security Proposal
Security ProposalSecurity Proposal
Security Proposalchris20854
 
Better Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes ConnectBetter Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes ConnectThousandEyes
 
Diagnosing Internet Outages
Diagnosing Internet OutagesDiagnosing Internet Outages
Diagnosing Internet OutagesThousandEyes
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
ISP Connectivity Webinar: No Longer a Black Box
ISP Connectivity Webinar: No Longer a Black BoxISP Connectivity Webinar: No Longer a Black Box
ISP Connectivity Webinar: No Longer a Black BoxThousandEyes
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002ccherel
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat ServicesChessBall
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
 
SevOne - IP SLA
SevOne - IP SLASevOne - IP SLA
SevOne - IP SLASevOne
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Endpoint Agent Part 1: End User Experience
Endpoint Agent Part 1: End User ExperienceEndpoint Agent Part 1: End User Experience
Endpoint Agent Part 1: End User ExperienceThousandEyes
 
Reverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent TestsReverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent TestsThousandEyes
 
Cloudflare Argo - Overview
Cloudflare Argo - OverviewCloudflare Argo - Overview
Cloudflare Argo - OverviewVu Long Tran
 
Lessons from an AWS outage and how to detect root cause of cloud service disr...
Lessons from an AWS outage and how to detect root cause of cloud service disr...Lessons from an AWS outage and how to detect root cause of cloud service disr...
Lessons from an AWS outage and how to detect root cause of cloud service disr...ThousandEyes
 
When to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-programWhen to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-programSangfor Technologies USA
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Jim Kaplan CIA CFE
 

Tendances (20)

Are You Ready For More Visitors Cognizant Gomez Jan20
Are You Ready For More Visitors   Cognizant  Gomez Jan20Are You Ready For More Visitors   Cognizant  Gomez Jan20
Are You Ready For More Visitors Cognizant Gomez Jan20
 
The Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and TakeawaysThe Top Outages of 2021: Analysis and Takeaways
The Top Outages of 2021: Analysis and Takeaways
 
Security Proposal
Security ProposalSecurity Proposal
Security Proposal
 
Better Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes ConnectBetter Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes Connect
 
Diagnosing Internet Outages
Diagnosing Internet OutagesDiagnosing Internet Outages
Diagnosing Internet Outages
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
ISP Connectivity Webinar: No Longer a Black Box
ISP Connectivity Webinar: No Longer a Black BoxISP Connectivity Webinar: No Longer a Black Box
ISP Connectivity Webinar: No Longer a Black Box
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
 
Facebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityFacebook Outage Analysis: Using External Visibility to Fortify Availability
Facebook Outage Analysis: Using External Visibility to Fortify Availability
 
Sangfor wan-optimization-brochure-2015
Sangfor wan-optimization-brochure-2015Sangfor wan-optimization-brochure-2015
Sangfor wan-optimization-brochure-2015
 
SevOne - IP SLA
SevOne - IP SLASevOne - IP SLA
SevOne - IP SLA
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Endpoint Agent Part 1: End User Experience
Endpoint Agent Part 1: End User ExperienceEndpoint Agent Part 1: End User Experience
Endpoint Agent Part 1: End User Experience
 
Reverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent TestsReverse Path Visibility with Agent-to-Agent Tests
Reverse Path Visibility with Agent-to-Agent Tests
 
Cloudflare Argo - Overview
Cloudflare Argo - OverviewCloudflare Argo - Overview
Cloudflare Argo - Overview
 
Lessons from an AWS outage and how to detect root cause of cloud service disr...
Lessons from an AWS outage and how to detect root cause of cloud service disr...Lessons from an AWS outage and how to detect root cause of cloud service disr...
Lessons from an AWS outage and how to detect root cause of cloud service disr...
 
When to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-programWhen to-sell-wan-optimization-sangfor-technologies-partner-program
When to-sell-wan-optimization-sangfor-technologies-partner-program
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
 

Similaire à Shine a Light on the Darkening of the Internet

Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksHarry Gunns
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochureRajDodiya4
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...Cisco Canada
 
ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...
ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...
ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...European Collaboration Summit
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityElasticsearch
 
Cisco Connect 2018 Thailand - Cisco automation
Cisco Connect 2018 Thailand - Cisco automation Cisco Connect 2018 Thailand - Cisco automation
Cisco Connect 2018 Thailand - Cisco automation NetworkCollaborators
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamInformaticaMarketplace
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshootingManageEngine, Zoho Corporation
 
Streaming Data and Stream Processing with Apache Kafka
Streaming Data and Stream Processing with Apache KafkaStreaming Data and Stream Processing with Apache Kafka
Streaming Data and Stream Processing with Apache Kafkaconfluent
 
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...ManageEngine, Zoho Corporation
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicAmazon Web Services
 
Splunk App for Stream
Splunk App for StreamSplunk App for Stream
Splunk App for StreamSplunk
 
Getting Started with ThousandEyes
Getting Started with ThousandEyesGetting Started with ThousandEyes
Getting Started with ThousandEyesThousandEyes
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
Microsoft challenges of a multi tenant kafka service
Microsoft challenges of a multi tenant kafka serviceMicrosoft challenges of a multi tenant kafka service
Microsoft challenges of a multi tenant kafka serviceNitin Kumar
 
Challenges of a multi tenant kafka service
Challenges of a multi tenant kafka serviceChallenges of a multi tenant kafka service
Challenges of a multi tenant kafka serviceThomas Alex
 

Similaire à Shine a Light on the Darkening of the Internet (20)

Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
 
ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...
ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...
ECS19 - Paul Collinge - Transforming enterprise network connectivity in a clo...
 
Combining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified ObservabilityCombining Logs, Metrics, and Traces for Unified Observability
Combining Logs, Metrics, and Traces for Unified Observability
 
Cisco Connect 2018 Thailand - Cisco automation
Cisco Connect 2018 Thailand - Cisco automation Cisco Connect 2018 Thailand - Cisco automation
Cisco Connect 2018 Thailand - Cisco automation
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshooting
 
Streaming Data and Stream Processing with Apache Kafka
Streaming Data and Stream Processing with Apache KafkaStreaming Data and Stream Processing with Apache Kafka
Streaming Data and Stream Processing with Apache Kafka
 
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Splunk App for Stream
Splunk App for StreamSplunk App for Stream
Splunk App for Stream
 
Getting Started with ThousandEyes
Getting Started with ThousandEyesGetting Started with ThousandEyes
Getting Started with ThousandEyes
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
Microsoft challenges of a multi tenant kafka service
Microsoft challenges of a multi tenant kafka serviceMicrosoft challenges of a multi tenant kafka service
Microsoft challenges of a multi tenant kafka service
 
Challenges of a multi tenant kafka service
Challenges of a multi tenant kafka serviceChallenges of a multi tenant kafka service
Challenges of a multi tenant kafka service
 

Dernier

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024SOFTTECHHUB
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理F
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...gragchanchal546
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxi191686
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...kumargunjan9515
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 

Dernier (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
Sensual Call Girls in Tarn Taran Sahib { 9332606886 } VVIP NISHA Call Girls N...
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 

Shine a Light on the Darkening of the Internet

  • 1. Shine a Light on the Darkening of the Internet How to maintain visibility in the age of encryption Cam Cullen, VP Marketing
  • 2.
  • 4.
  • 5.
  • 6. Encrypted Traffic Dominates Networks Worldwide Service Upstream % SSL v3 16.12% WebDAV 7.83% Netflix 5.65% HTTP 5.52% HTTP media stream 5.41% Raw MPEG-TS 4.85% BitTorrent transfer 4.85% uTP 4.65% BitTorrent KRPC 3.70% Google 3.40% YouTube 2.04% RTP 1.73% HTTP download 1.44% Facebook 1.44% BitTorrent encrypted transfer 1.39% Procera Networks Data - December 2016 Service Downstream % Netflix 19.27% HTTP media stream 16.39% SSL v3 9.63% YouTube 8.96% HTTP 4.47% Raw MPEG-TS 4.08% HTTP download 3.42% Facebook 3.19% QUIC 1.86% Xbox Live update 1.49% Instagram 1.46% Playstation.net download 1.16% uTP 1.09% BitTorrent transfer 1.05% HTTP2 over TLS 1.00%
  • 7. Regional Popularity December 2016 Service DS% US% Netflix 22.51% 9.04% HTTP media stream 17.64% 6.84% SSL v3 8.66%18.98% Raw MPEG-TS 7.79% 8.48% YouTube 5.35% 2.05% Service DS% US% HTTP media stream 21.54% 2.77% SSL v3 8.06% 8.17% YouTube 7.23% .86% HTTP 5.17% 3.9% BitTorrent KPRC 5.13%25.68% Service DS% US% HTTP media stream 13.06% 2.72% Netflix 11.90% 1.81% SSL v3 8.78%14.88% Facebook 7.75% 1.80% YouTube 7.04% 2.22%
  • 8. Worldwide Application Growth (By Volume) 2016 Growth in Key Services – Heavy on Encrypted Applications Service Upstream Netflix 30.93% YouTube 61.01% SSL v3 47.45% HTTP 63.65% Facebook 88.57% Amazon Prime 257.64% Instagram 119.20% uTP 58.37% Twitch 82.60% Twitter 93.26% Service Downstream Netflix 93.55% YouTube 67.61% SSL v3 140.25% HTTP 80.71% Facebook 76.72% Amazon Prime 217.23% Instagram 145.64% uTP 69.09% Twitch 175.47% Twitter 136.21%
  • 9. What do we mean by encryption Three categories Obfuscation Proxies Encryption PROXIES ENCRYPTION VPN
  • 10. Encryption Scenarios Going Forward 10 HTTP HTTPS (TLS 1.1/1.2) Full URL Hostname User Agent Content Type File Size Other HTTP/HTML Full URL Hostname (direct) User Agent Content Type File Size Other HTTP/HTML 1 TLS 1.3 SNI Clear TLS 1.3 SNI Encrypted DNS Encrypted 2 3 4 1 Happening 2015 and 2016 Will happen in 2017 May happen as part of TLS1.3 in 12-18 months May happen in 24-36 months 2 3 4 Full URL Hostname (direct) User Agent Content Type File Size Other HTTP/HTML Full URL Hostname (inferred) User Agent Content Type File Size Other HTTP/HTML Full URL Hostname (inferred) User Agent Content Type File Size Other HTTP/HTML HTTP 23% non- HTTP 77%
  • 12. Weekly Signature Updates Industry-leading Agility and Speed to Keep Pace with the Internet Age 2775 signatures Average of 16 updates or additions per week over the past year
  • 13. Multiple Application Detection Techniques •Expression matches: Patterns on payload •Analyzers: Virtual Services •Control/Data protocols: Port tainted •TLS detection: SNI tracking •Heuristics mechanisms: Flow behavioral analysis — Randomness — Metrics — VoIP flag Sample of DRDL techniques for Application Identification
  • 14. Sophisticated Tools to Accelerate Development Highly Automated Signatures Lab Solves Major Challenges Assessing Regional Dependencies Automated Update Tracking The Device Matters
  • 15. bundle Rapidly Adaptable Heuristics Engine (RAHE) Real-Time Endpoint Classification (REC) Enhanced Device detection Continuous Improvement: Enhanced Capabilities in 2017
  • 16. Traffic Management Policy & Charging IT Analytics Regulatory Compliance Security Verticals Use Cases • NOC Dashboard • QoE Measurement • Capacity Planning • Worst Node Reporting • Speedtest Reporting • CDN Reporting • Device Reporting • …... • VOIP Blocking • P2P Blocking • Blocking Child Porn • Site Blacklisting • Website Access Logs • Lawful Intercept • DMCA Notice Analysis • ….. • Resolution-based TM • Peering Circuit Mgmt • Heavy User Tiering • DSCP Marking • Optimizing Circuits • Tethering Detection • Line Sharing Detection • …... • Zero Rating • CDR Generation • Tiered Bandwidth Plans • Top Up Portals • Shared Plans • Tiered Quota Plans • Subscriber Engagement • …... • Malware Detection • Spam Server Detection • SSL Attacks • Profiling Malicious Traffic • DDOS Dashboard • DDOS Forensics • Volumetric Att. Detection • …... • Revenue Assurance • Big Data Enablement • ScoreCard • OTT Trend Monitoring • …... Solution Areas • Regulatory Analytics • OTT Traffic Blocking • Compliance Logging • URL Filtering • …. • Fair Usage • Congestion Mgmt • Video Traffic Mgmt • Carrier Grade NAT • …. • PCC w/GX/Gy • Zero Rating • Quota Management • Parental Control • …. • DDOS Analytics • DDOS Mitigation • IoT Security Maintaining Visibility Across Multiple Use Cases Ensuring up-to-date visibility despite encryption
  • 17. Impact of Encryption on Use Cases And leveraging virtualization SecurityIT Analytics Traffic Management Policy & Charging to Regulatory Compliance to eVolution eVolution eVolution
  • 18. •Customer Shifted from a traditional probe to Procera due to reduced visibility • Supporting Tens of Millions of Mobile subscribers • Over 20 virtual systems running >40Gbps of capacity streaming IPFix to HP Big Data system •Executives get weekly reports leveraging Procera’s Unique Network, Subscriber, and Service Intelligence Virtualization: LTE Analytics Use Cases Executive Decisioning with Carrier-Scale Big Data Deployment PSM LTE Packet Core Core Router IPFix IPFix eVolution Provisioning LiveView HP Data Warehouse Sample Use Cases OTT Trending Revenue Assurance IoT Analytics Network Forensics Service Planning Performance Monitoring
  • 19. Encryption: In-Line Policy Enforcement Use Cases High Profile Application Aware Services and Regulatory Compliance Real-time Visibility Real-time forensics with topology awareness Traffic Mgmt Sophisticated queuing to enhance subscriber QoE and manage P2P shaping Regulatory Compliance OTT VOIP Blocking and VPN detection Analytics Subscriber, application, location and device reporting and forecasting Customer Care Customer Care Insights for real-time problem resolution Intelligent Charging Differentiated billing based on subscriber intelligence using Gy Tiered Services Service plans enhancing customer value using Gx Peering BGP Peering analytics and management WiFi Services PCEF for the WiFi Network using Gx and Gy URL Categorization URL categorization based on a set of predefined rules OTT Partnerships Zero-rating and/or revenue sharing partnerships with OTT players IPFix Data Feed For use with sixthsense media services 40G per system 80G per system Internet . . . x9 . . . x4
  • 20. Big Data: Analytics Use Cases Data Scientists + Procera Data = $$$M in Additional Revenue Generated in 2016 PRE PL 8960 PSM Cluster for Enrichment 6 Collection Sites StreamMediation . . . . PIC COLLECTOR IPFIX CDR Data Analytics Visualisation Campaign Management Billing IN CRM Network TV Log Sample Use Cases Revenue Assurance Campaign Demographics Network Forensics Service Planning QoE Monitoring Trend Monitoring
  • 21.
  • 22. Thank you Download the whitepaper at: https://www.proceranetworks.com/lp- procera-spotlights-encryption

Notes de l'éditeur

  1. This is a statement we have listened many times for the last year. Is it true? Are we going dark? Is it the end of DPI? What it does mean: More privacy for the end user. Good for all of us, as Internet users. What it doesn´t mean: Encryption does not make services undetectable, but it only makes us, as DPI company, to apply smarter techniques to detect the services. Some granularity is lost, but the main service will be available. Just as an example, 3 years ago we were able to see the videos seen in youtube looking at the URL, and this is not possible anymore.
  2. What is common between bird-watching and traffic detection? When we talk about DPI, how it is today and how it will work in the future, the analogy between DPI and Bird-watching is very powerful. Let´s call it packet-watching Every birds have their own body shape and profile.  The shape, size, colour and feature of legs, feathers, skin, beak. This is a starling Today for DPI we look into specific details of a packet, which is written in clear text, like the hostname, or which hexadecimal pattern we can find in that packet. This is going to change, the same way that in bird-watching you have to deal with a flock.
  3. Between 50% and 70% of traffic volume is encrypted nowadays. The trend keeps growing. This tweet by Josh Aas is the Head of Let´s Encrypt, former Mozilla employee, represents the importance of HTTPS for web browsing. For the first time, in October more than 50% page loads done in Firefox were HTTPS. Let´s Encrypt is an open certificate authority and gives free certificates to web sites.
  4. Netflix, with its global expansion taking hold, is the overall leader in downstream worldwide, followed closely by HTTP Media streaming, which is used by many other video streaming services from content providers.
  5. Regionally, Netflix is King in North America and a close 2nd in APAC, but not a force in Europe yet, with other streaming video services being major contributors throughout the regions as well. SSL v3 and HTTP represent the share of traffic to pure web browsing, and Bittorrent is still a big contributor in Europe to upstream traffic (which usually tracks where Netflix is popular).
  6. Netflix has grown substantially in 2016 due to it’s worldwide expansion, and both Amazon Prime and Twitch had major jumps in contribution in 2016. SSL continues to grow fast as encryption becomes more widespread. Filesharing traffic is still growing (as seen in the European traffic trends), but far slower than other traffic types.
  7. When we talk about encryption, we really refer to different kind of transport techniques that ensures privacy in the communication. Let’s see one by one. Obfuscation: The main purpose is to hide the traffic send, many times, like in the case of Tor, anonymizing the sender. Their main purpose is to not being detected. Using Tor gives worst performance. Other obfuscated services are Viber and Bitorrent. - Proxies: They are intermediate devices to access web content. For the web server the originator of the request is the proxy server, not the local computer. In the figure ProxyServer app, Opera turbo Encryption: We talk about keeping the payload private. There are different mechanisms: VPN: It tunnels the traffic in an extra layer towards a VPN server, but information is keept private. You usually have to pay for it. In the figure openVPN Connect app QUIC Crypto (over UDP), TLS (over TCP) are protocols which implementation is open and well described, that use certificates to keep the connection secured.
  8. If you remember from a previous presentation, this is the forecast we did in early 2016 about how encryption will evolve. In our current state, number 1, the prediction was that during 2017 we were going to see the introduction of TLS 1.3. How is this prediction going? TLS is not new. First TLS 1.0 RFC came in 1999 (SSL 3.0 was the original name, owned by Netscape). TLS 1.1 standard released in 2006 and TLS 1.2 was released in 2008. TLS 1.3 is still a draft. DNS over HTTPS is being under development by Google: https://developers.google.com/speed/public-dns/docs/dns-over-https
  9. If we move forward to the next slide, here we have a graph with the last bundles updates and additions. What is a signature? A Signatures is a service or application (from all supported devices), some of them split into different kind of traffic (for example control and data, or regular traffic and VoIP. What I would like you to highlight when you meet our customers one of our strengths compared with the competitors is not only the total amount of applications we support, but also the average number of updates we have. Number of signatures in last bundle available in http://sigdev.int.prnw.net/frontpage/
  10. Real-Time Endpoint Classification: Currently we can retrieve the mapping hostname-IP address using lookup on URL or SNI. Instead, we will use a Endpoint Database will give us the mapping service-IP address that won’t be possible when TLS 1-3 with 0-RTT is deployed. Bin code detectors in signature bundle: this will provide more rich detection capabilities, beyond pure signatures, available each week, without the need of waiting for a full software upgrade. Including in the RAHE is the Evolving Flow Behavior Analysis for encrypted apps. This means more metrics to improve detection. Procera has used XFB, aka behavioral classification, for over 10 years (Active, Asymmetric, Beginning, Initial flag, Bulky, CBR Streaming, Client is Local, Download, Established, Flowsynced, Inbound, Initial, Interactive, Outbound, Pseudo , Random, Server is Local, Streaming, Unidirectional, Untracked, and VoIP-like are existing behavior flags) Extended to cover encrypted VoIP and Encrypted Video detection. Device detection: Possibility of extract the device from encrypted traffic
  11. Over 30 solutions and 150 use cases
  12. Over 30 solutions and 150 use cases
  13. But they don’t’ get there by just buying a few boxes form us. It’s a large operation, they need additional Infrastructure such as an Hadoop Data lake, mediation systems, campaign management platforms for taking action, and machine learning technologies in order to analyze the data. You need people with specific skills, who are intelligence and high educated and also understand your business. These don’t exist (enough), Dr. Bob admitted they with in tight teams for this purpose so people complement each other – and a lot of time is spend on training. Understanding the data, researching algorithms and skilling up on Tools.
  14. Procera is a Subscriber, Service, and Network Intelligence software provider for network operators, with over 360M subscribers across more than 60 Tier 1 operators in 88 countries worldwide. Our customers include some of the largest and most prestigious and innovative operators in the world – Softbank in Japan, British Telecom, and Boingo Wireless t oname a few. Our solutions are based on Deep Packet Inspection, and provide real-time visibility into100% of the traffic flowing through broadband networks – regardless of the access type and at any volume of traffic. We decorate the application data with a wealth of subscriber attributes, including location, service plan, network quality, and many more. Our Headquarters is in Silicon Valley in the US, but we have engineering locations in Sweden and Canada, and regional offices in Japan, Malaysia, and Dubai. Procera employs ~219 employees worldwide, with 37% of our headcount in sales and marketing, and 32% in R&D.