Фон
Фон

Deep packet inspection

Deep packet inspection (DPI) is the foundation for network security systems and an indispensable source of data for detecting network threats, sophisticated targeted attacks, and anomalies.

01

What is deep packet inspection?

Deep packet inspection (DPI) is a technology for the detailed analysis of network traffic from the data link layer (L2) to the application layer (L7) of the OSI ISO model. It identifies data transfer protocols, applications, and software. It understands what is transmitted in connections and transactions, and it extracts objects from traffic using network protocol parsers and decoders.

02

What problems does it solve?

DPI is used to solve both classical and non-classical tasks. Classical tasks performed by DPI are most common in telecommunications and among service providers. Classical tasks include the following functions:

  • Traffic prioritization
  • Network node profiling
  • Access control
  • Network attack detection
  • Node inventory
  • Policy compliance monitoring

Learn how we'll protect endpoints tomorrow

03

DPI from Positive Technologies

Positive Technologies has been developing its own DPI technology since 2015 and continuously improves it for security and IT tasks. Beyond the functions common to all existing DPI solutions, our technology has broader capabilities:

  • Captures network packets
  • Defragments IP packets
  • Parses tunnels of arbitrary nesting (VLAN, GRE, IP-to-IP, VXLAN)
  • Protects against flooding
  • Identifies sessions
  • Stores captured packets in storage and assigns session IDs for quick data access
  • Reassembles TCP sessions
  • Identifies and parses application protocols (L7)
  • Identifies and parses proxy protocols (such as HTTP-proxy and SOCKS5)
  • Identifies applications running over the L7 protocol (for example, Telegram)
  • Extracts transferred files
  • Detects attacks using signature-based methods

All these functions operate at speeds of up to 10 Gbps, and in extreme cases, our DPI can process up to 14 million packets per second. For large traffic volumes, horizontal scaling is provided. The technology maintains maximum throughput, and it reassembles and restores sessions even with packet reordering.

Network packet capture

Tunnel parsing

Application protocol identification (L7)

Application identification

Application protocol parsing

Signature-based attack detection

Traffic copy storage

04

Advantages of Positive Technologies DPI

05

DPI in Positive Technologies products

Thinking about the best way to protect your company?

Contact us.

During the consultation we'll propose a solution precisely tailored to your organization.

 

General questions
We're happy to answer any questions you may have.
Partnership
Join us in making the world a safer place.
Request a pilot
Test drive our solutions with a customized pilot program.