Showing 1 - 20 results of 36 for search '"Deep packet inspection"', query time: 0.16s Refine Results
  1. 1
  2. 2
  3. 3

    A first look at deep packet inspection employed by the Golden Shield by Farnan, O

    Published 2014
    “…These tests focus on the Deep Packet Inspection capabilities of the Golden Shield, aiming to find out what is filtered and what is not. …”
    Working paper
  4. 4

    A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection by Wenguang Song, Mykola Beshley, Krzysztof Przystupa, Halyna Beshley, Orest Kochan, Andrii Pryslupskyi, Daniel Pieniak, Jun Su

    Published 2020-03-01
    “…We compared the proposed software DPI system with the existing SolarWinds Deep Packet Inspection for the possibility of network traffic anomaly detection and prevention. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning by Yung-Fa Huang, Chuan-Bi Lin, Chien-Min Chung, Ching-Mu Chen

    Published 2021-06-01
    “…However, the traditional traffic classification methods, such as IP/ASN (Autonomous System Number) analysis, Port-based and deep packet inspection, etc., can classify traffic behavior, but cannot effectively handle encrypted traffic. …”
    Get full text
    Article
  10. 10

    Digital Depth: A Volumetric Speculation by De Seta, Gabriele

    Published 2023-12-01
    “… Counter commonplace associations with superficial mediation and networked flatness, the digital seems to have its own peculiar depths, which range from the infrastructural (deep sea cables, deep packet inspection, crawl depth) to the metaphorical (Deep Web, deep learning, deepfakes). …”
    Get full text
    Article
  11. 11

    Volunteer-Based System for Research on the Internet Traffic by T. Riaz, S. Ligaard Nørgaard Hald, K. Balachandran, T. Bujlow, J. Myrup Pedersen

    Published 2012-06-01
    “…To overcome the drawbacks of existing methods for traffic classification (by ports, Deep Packet Inspection, statistical classification) a new system has been developed, in which data are collected and classified directly by clients installed on machines belonging to volunteers. …”
    Get full text
    Article
  12. 12

    Implementing BREeze - a High-Performance Regular Expression Library Using Code Generation with BuildIt by Mitrovska, Tamara

    Published 2023
    “…Regular expression matching is a very common problem in software engineering, with applications in text processing, text searching, data scraping, syntax highlighting, deep packet inspection in networks, etc. Due to the varying complexity of regular expressions, having one general approach to match all types of expressions is usually not enough to get the needed performance for software applications. …”
    Get full text
    Thesis
  13. 13

    Behavior pattern recognition of game dragon nest using bloom filter method by Stiawan, D., Idris, M. Y., Aryandi, D., Heryanto, A., Septian, T. W., Muchtar, F., Budiarto, R.

    Published 2019
    “…The purpose is to analyze the traffic data of the Dragon Nest to find and discern the patterns of behavior of the Dragon Nest INA and the Legend DN II using Deep Packet Inspection (DPI). A dataset is constructed by capturing traffic data from the testbed environment. …”
    Article
  14. 14

    Prediction-Based Energy Saving Mechanism in 3GPP NB-IoT Networks by Jinseong Lee, Jaiyong Lee

    Published 2017-09-01
    “…The mechanism consists of two parts: first, the network architecture that predicts the uplink packet occurrence through a deep packet inspection; second, an algorithm that predicts the processing delay and pre-assigns radio resources to enhance the scheduling request procedure. …”
    Get full text
    Article
  15. 15

    Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware by Eva Papadogiannaki, Sotiris Ioannidis

    Published 2021-02-01
    “…Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. …”
    Get full text
    Article
  16. 16

    Towards practical intrusion detection system over encrypted traffic* by Sébastien Canard, Chaoyun Li

    Published 2021-05-01
    “…To reconcile security and privacy, BlindBox and BlindIDS are proposed to perform Deep Packet Inspection over an encrypted traffic, based on two different cryptographic techniques. …”
    Get full text
    Article
  17. 17

    TCN enhanced novel malicious traffic detection for IoT devices by Liu Xin, Liu Ziang, Zhang Yingli, Zhang Wenqiang, Lv Dong, Zhou Qingguo

    Published 2022-12-01
    “…Besides, we implement a complete IoT traffic security detection procedure based on deep packet inspection and protocol analysis. The proposed Multi-class S-TCN significantly improves the detection speed without degrading the detection effect. …”
    Get full text
    Article
  18. 18

    Flow-based approach on bro intrusion detection by Alaidaros, Hashem, Mahmuddin, Massudi

    Published 2017
    “…Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges when coping with high volume of traffic. …”
    Get full text
    Article
  19. 19

    Entropy-Based Characterization of Internet Background Radiation by Félix Iglesias, Tanja Zseby

    Published 2014-12-01
    “…Attack detection methods based on deep packet inspection are time consuming and costly, due to their high computational demands. …”
    Get full text
    Article
  20. 20

    Malware dection using IP flow level attributes by Abdalla, Ahmed, A. Jamil, Haitham, Hamza Ibrahim, Hamza Awad, Mohd. Nor, Sulaiman

    Published 2013
    “…Although the task of malware detection in network traffic had been done successfully through Deep Packet Inspection (DPI) in the last two decades, this approach is becoming less efficient due to the continuous increasing of network traffic volumes and speeds and concerns on user's privacy. …”
    Get full text
    Article