2017 12th International Conference on Computer Engineering and Systems (ICCES) 2017
DOI: 10.1109/icces.2017.8275301
|View full text |Cite
|
Sign up to set email alerts
|

A survey on deep packet inspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(13 citation statements)
references
References 24 publications
0
12
0
1
Order By: Relevance
“…The payload-based traffic detection method [5], [6] uses the information of the application layer protocol to express the features of the traffic, the most representative of which is the deep packet inspection (DPI) technology [7]. Deep packet inspection technology needs to decrypt and encrypt the transmitted traffic data.…”
Section: Introductionmentioning
confidence: 99%
“…The payload-based traffic detection method [5], [6] uses the information of the application layer protocol to express the features of the traffic, the most representative of which is the deep packet inspection (DPI) technology [7]. Deep packet inspection technology needs to decrypt and encrypt the transmitted traffic data.…”
Section: Introductionmentioning
confidence: 99%
“…The survey [60] gives a brief idea about challenges in DPI and some of the design objectives and then briefly explains different matching algorithms and their limitations. At the end, some of the most popular techniques using DPI are outlined.…”
Section: Related Research On Network Traffic Analysis and Anomaly Detmentioning
confidence: 99%
“…[3,4]. Among them, packet-level traffic analysis is a common approach, wherein deep packet inspection (DPI) is an accepted conduct [8]. This approach requires the capturing and analysis of highly-detailed network traffic data including the payload of each packet.…”
Section: Netflow As a Basis For Privacy-preserving Traffic Analysismentioning
confidence: 99%