-
1
DSM: Delayed Signature Matching in Deep Packet Inspection
Published 2020-12-01Subjects: Get full text
Article -
2
Cyber attack evaluation dataset for deep packet inspection and analysis
Published 2023-02-01Get full text
Article -
3
A first look at deep packet inspection employed by the Golden Shield
Published 2014“…These tests focus on the Deep Packet Inspection capabilities of the Golden Shield, aiming to find out what is filtered and what is not. …”
Working paper -
4
A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection
Published 2020-03-01“…We compared the proposed software DPI system with the existing SolarWinds Deep Packet Inspection for the possibility of network traffic anomaly detection and prevention. …”
Get full text
Article -
5
Length-Bounded Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet Inspection
Published 2017-01-01Subjects: Get full text
Article -
6
Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU
Published 2023-07-01Subjects: “…deep packet inspection…”
Get full text
Article -
7
Offset-FA: A Uniform Method to Handle Both Unbounded and Bounded Repetitions in Regular Expression Matching
Published 2022-10-01Subjects: Get full text
Article -
8
Derin Paket İncelemesi için Önerilen Yeni Bir Örüntü Eşleştirme Algoritması
Published 2023-07-01Subjects: Get full text
Article -
9
Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning
Published 2021-06-01“…However, the traditional traffic classification methods, such as IP/ASN (Autonomous System Number) analysis, Port-based and deep packet inspection, etc., can classify traffic behavior, but cannot effectively handle encrypted traffic. …”
Get full text
Article -
10
Digital Depth: A Volumetric Speculation
Published 2023-12-01“… Counter commonplace associations with superficial mediation and networked flatness, the digital seems to have its own peculiar depths, which range from the infrastructural (deep sea cables, deep packet inspection, crawl depth) to the metaphorical (Deep Web, deep learning, deepfakes). …”
Get full text
Article -
11
Volunteer-Based System for Research on the Internet Traffic
Published 2012-06-01“…To overcome the drawbacks of existing methods for traffic classification (by ports, Deep Packet Inspection, statistical classification) a new system has been developed, in which data are collected and classified directly by clients installed on machines belonging to volunteers. …”
Get full text
Article -
12
Implementing BREeze - a High-Performance Regular Expression Library Using Code Generation with BuildIt
Published 2023“…Regular expression matching is a very common problem in software engineering, with applications in text processing, text searching, data scraping, syntax highlighting, deep packet inspection in networks, etc. Due to the varying complexity of regular expressions, having one general approach to match all types of expressions is usually not enough to get the needed performance for software applications. …”
Get full text
Thesis -
13
Behavior pattern recognition of game dragon nest using bloom filter method
Published 2019“…The purpose is to analyze the traffic data of the Dragon Nest to find and discern the patterns of behavior of the Dragon Nest INA and the Legend DN II using Deep Packet Inspection (DPI). A dataset is constructed by capturing traffic data from the testbed environment. …”
Article -
14
Prediction-Based Energy Saving Mechanism in 3GPP NB-IoT Networks
Published 2017-09-01“…The mechanism consists of two parts: first, the network architecture that predicts the uplink packet occurrence through a deep packet inspection; second, an algorithm that predicts the processing delay and pre-assigns radio resources to enhance the scheduling request procedure. …”
Get full text
Article -
15
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
Published 2021-02-01“…Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. …”
Get full text
Article -
16
Towards practical intrusion detection system over encrypted traffic*
Published 2021-05-01“…To reconcile security and privacy, BlindBox and BlindIDS are proposed to perform Deep Packet Inspection over an encrypted traffic, based on two different cryptographic techniques. …”
Get full text
Article -
17
TCN enhanced novel malicious traffic detection for IoT devices
Published 2022-12-01“…Besides, we implement a complete IoT traffic security detection procedure based on deep packet inspection and protocol analysis. The proposed Multi-class S-TCN significantly improves the detection speed without degrading the detection effect. …”
Get full text
Article -
18
Flow-based approach on bro intrusion detection
Published 2017“…Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges when coping with high volume of traffic. …”
Get full text
Article -
19
Entropy-Based Characterization of Internet Background Radiation
Published 2014-12-01“…Attack detection methods based on deep packet inspection are time consuming and costly, due to their high computational demands. …”
Get full text
Article -
20
Malware dection using IP flow level attributes
Published 2013“…Although the task of malware detection in network traffic had been done successfully through Deep Packet Inspection (DPI) in the last two decades, this approach is becoming less efficient due to the continuous increasing of network traffic volumes and speeds and concerns on user's privacy. …”
Get full text
Article