2022
DOI: 10.28948/ngumuh.1184020
|View full text |Cite
|
Sign up to set email alerts
|

Modern ağ trafiği analizi için derin paket incelemesi hakkında kapsamlı bir çalışma: sorunlar ve zorluklar

Abstract: Deep Packet Inspection (DPI) provides full visibility into network traffic by performing detailed analysis on both packet header and packet payload. Accordingly, DPI has critical importance as it can be used in applications i.e network security or government surveillance. In this paper, we provide an extensive survey on DPI. Different from the previous studies, we try to efficiently integrate DPI techniques into network analysis mechanisms by identifying performance-limiting parameters in the analysis of moder… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 165 publications
0
0
0
Order By: Relevance
“…Initially, TCP/IP header attacks were relatively simple, often involving basic techniques like IP spoofing or SYN flooding. These attacks primarily targeted vulnerabilities in the TCP/IP protocol stack, exploiting weaknesses in packet header fields to disrupt network communications or compromise system integrity [34]- [37]. As network security measures improved, attackers adapted by developing more sophisticated methods to evade detection and bypass security controls.…”
Section: Figure 2 Tcp Headermentioning
confidence: 99%
“…Initially, TCP/IP header attacks were relatively simple, often involving basic techniques like IP spoofing or SYN flooding. These attacks primarily targeted vulnerabilities in the TCP/IP protocol stack, exploiting weaknesses in packet header fields to disrupt network communications or compromise system integrity [34]- [37]. As network security measures improved, attackers adapted by developing more sophisticated methods to evade detection and bypass security controls.…”
Section: Figure 2 Tcp Headermentioning
confidence: 99%
“…Но всегда оставался класс задач, которые решались только протокольным декодированием. Это задачи, в которых важна высокая точность распознавания протоколов или их признаков, с небольшим количеством ложных срабатываний [10]. Кроме того, с ростом возможностей вычислительной техники проводить более "глубокий" анализ стало проще, что позволило как решать задачи в большем числе случаев, так и решать всё более сложные задачи.…”
Section: применение анализа сетевого трафикаunclassified
“…В[10] выделяют 4 метода реализации функций глубокого анализа трафика:  Классификация пакетов по портам L4.…”
unclassified