2015
DOI: 10.1016/j.procs.2015.03.091
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach to Deep Packet Inspection for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…A popular alternative is deep packet inspection (DPI) techniques which essentially match a network packet's payload with a set of stored signatures to classify network traffic. Deep packet inspection is for example used in the context of intrusion detection systems [13]. However, allowing a platform to inspect the application's payload which potentially contains personal data, may in itself violate most privacy policies.…”
Section: Network Traffic Analysis and Classificationmentioning
confidence: 99%
“…A popular alternative is deep packet inspection (DPI) techniques which essentially match a network packet's payload with a set of stored signatures to classify network traffic. Deep packet inspection is for example used in the context of intrusion detection systems [13]. However, allowing a platform to inspect the application's payload which potentially contains personal data, may in itself violate most privacy policies.…”
Section: Network Traffic Analysis and Classificationmentioning
confidence: 99%
“…DPI checks special commands or requests to determine whether they may or may not pass through the firewall. This prevents unauthorized access to production objects [24]. In principle, however, the well-known measures should not be forgotten, such as cameras, card readers, organizational measures and password control.…”
Section: Information Securitymentioning
confidence: 99%
“…The main obstacles that face DPI are: How to prepare signature dataset?, How to minimise latency and obtain a fast response? and How to diagnosis network activities [26]?.…”
Section: Deep Pimentioning
confidence: 99%