This article describes how deep packet inspection (DPI) is different from other types of packet processing. Most packet processing is done via the IP header, but deep packet processing inspects the packet contents. How does DPI help to secure a network? What are the different approaches to DPI? Make sure you can explain the three techniques used in DPI and name some of the tools used for packet analysis.
Milestones
1998
Wireshark, an earlier part of the Ethereal project, is released as a free, open-source packet sniffing tool. It initially supports shallow packet inspection, only at the IP header level.
2002
Traffic inspection solutions NetScreen (acquired by Juniper networks) are designed to be installed into firewall systems. Since the operation is expensive, it is triggered only on a need basis.
2005
MIMESweeper, ClamAV, NetCache are some of the early open-source internet proxy caching servers introduced for scanning content to an ICAP server running anti-virus software.
2006
The Great Firewall of China is deployed successfully. This internet censorship project commenced in 1998 for online traffic regulation in China.
2012
DPI becomes a powerful network security tool with deployment on SDN/cloud servers.
2012
DPI analysis tools feed network traffic data into Big Data Analytics for ISPs to derive critical insights on user behavior.