2017
DOI: 10.21108/ijoict.2016.22.77
|View full text |Cite
|
Sign up to set email alerts
|

Improving Network Security - A Comparison of Open Source DPI Software

Abstract: The classification of data traffic in a firewall using parameters such as port number, IP address, and MAC address is not sufficient. For example, currently, many applications can be used without a port number meaning they can easily circumvent a firewall. Firewalls inspecting up to only layer four could allow malicious data to pass. Next-generation deep packet inspection (DPI) is a method that can be used for firewalls as a method of classification up to layer seven in data traffic control. This research reco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…In addition, nDPI supports DPDK which is a kernel bypass technology to minimize performance losses caused by the hardware or the operating system. There are many studies comparing the accuracy of nDPI and PACE libraries according to the degree of granularity in terms of detection of the application protocol [45][46][47][48]. According to these studies, nDPI is the library with the highest accuracy among the open-source classifiers, except for the study numbered [47].…”
Section: Protocol Decoding Techniquementioning
confidence: 99%
“…In addition, nDPI supports DPDK which is a kernel bypass technology to minimize performance losses caused by the hardware or the operating system. There are many studies comparing the accuracy of nDPI and PACE libraries according to the degree of granularity in terms of detection of the application protocol [45][46][47][48]. According to these studies, nDPI is the library with the highest accuracy among the open-source classifiers, except for the study numbered [47].…”
Section: Protocol Decoding Techniquementioning
confidence: 99%