Deep Packet Inspection Digest

    In our first issue of the DPI digest, we selected expert materials on the topic of traffic analysis and blocking, comparing platforms and manufacturers of DPI systems. Today we decided to make a selection for those who are interested in working as an Internet provider and more detailed information on the operation of Deep Packet Inspection technologies. / Flickr / pascal / PD



    Quick Start: 5 Steps to Launch an Internet Service Provider
    • We conducted a brief analysis of the market of Internet providers and compiled basic instructions for those who would like to launch their own company. About what is required to solve such a difficult task - in our material.

    “Cache and compress”: 4 ways to save bandwidth
    • Even with the rapid development of the capabilities of the IT infrastructure of the provider, it is worth thinking about saving bandwidth. This is necessary in order to ensure the comfortable operation of all customers. We examined practical options for taking into account the capabilities of the cache server - an additional component of the DPI system.

    Internet Resource Ranking: DPI Traffic Analysis
    • Here we figured out why the provider should analyze the data by application, protocol, tariff plan, and other categories. Along with this, we stopped a little on how the “ module for viewing statistics and reports ” helps with the solution of the problem of optimization and cost reduction.

    “Unload and ensure speed”: Experience in implementing SCAT on ANADYR.NET communication network
    • We tell you how to implement a DPI solution that is not tied to any equipment in just two weeks. And also about how the provider can solve the problem with the distribution of traffic without shifting the problem to the client, and at the same time fulfill all the requirements of Roskomnadzor.

    How to use QoS to ensure the quality of Internet access
    • We give a good example to understand the essence of the traffic distribution system, give universal advice, consisting of several specific steps, on setting up the quality of service function in your home network. We also tell how QoS is used by the provider, and most importantly - why.

    Filtering Internet content for schools. Using White Lists (ACLs)
    • Let's talk about how providers help schools protect students on the Internet. Why, in the case of schoolchildren, the formation of a black list will not take effect, and how to make it possible to bypass the lock was impossible. As well as laws governing Internet access in schools.

    Alerting the public in case of emergency - a solution for telecom operators
    • Today, standard methods for alerting people through televisions and radios are unlikely to work - many people do not have not only radios, but even televisions. Therefore, for this category, the most reliable, if not the only possible, method of notification today is the Internet. And DPI systems give providers such an opportunity.


    / Flickr / pascal / PD
    Advanced Traffic Analysis System (DPI) Administrator Library
    • We bring to your attention a selection of books that are required to be read both for those who are only at the beginning of the way of knowing DPI, as well as specialists in this field. The 8 books we have selected will give you knowledge and understanding of how to work with network traffic: configure, analyze, and manage it.

    We choose the Russian DPI system
    • We talk about what is important when choosing a deep traffic analysis platform. We also compare the characteristics of the largest players in the Russian market of DPI systems and select the best systems in three categories.

    Public Wi-Fi. Analyze and manage with DPI
    • With a specific example, we show how the DPI platform helps to correctly distribute the network load during a major event and due to which this load can be reduced. We also compare traffic consumption with enabled and disabled restrictions and describe the security situation for a public Wi-Fi network.

    Subscriber identification in Wi-Fi network by phone number
    • In the article you will find information about why identification is needed and who should carry it out. Did you know that there are only three ways to identify? In addition, we will describe in detail how identification is performed using our DPI SCAT system and show how our system is configured.

    New SCAT features: SNI, BRAS, CG-NAT
    • About how our DPI system is developing: how sites are blocked now, how SNI filtering allows you to block domains precisely and how you can use SCAT to create IPoE tariff plans. And also about the current functions of the platform and plans for the near future.

    What's new in SKAT 6.0 "Sevastopol"
    • In the article, we will talk more about new features: for example, how NAT functions can make life easier for corporate clients, what new features have appeared in IPFIX protocol, what new features did SCAT acquire as BRAS, and what updates are planned for 2017.

    DPI SCAT system as L3 BRAS
    • We talk about what BRAS is, what tasks the device solves, its configuration and the conditions for ensuring its correct operation. Consider the types of termination of subscribers that are used in the SKAT system, and the integration of BRAS in the operator’s network. And in conclusion, we give examples of the application of our system with this function.


    / Flickr / pascal / PD
    DPI Introduction: System Composition and Connection Diagrams
    • In this post on Habré, we talked about the 3GPP standards and the elements of mobile networks built in accordance with these standards. As well as the differences between the active “off-line” installation scheme and the passive traffic mirroring scheme, their advantages, possible problems and ways to solve them.

    DPI Technology Brief - Deep Packet Inspection
    • Here you can read more about what the DPI system is, what the world's largest manufacturers are on the market, how to use traffic analysis systems and why they are needed at all. And a little about how the network model will change in the future, due to which providers will be able to earn more, as well as a few words about how DPI uses special services, and what is network neutrality.

    Machine Learning Instead of DPI - Traffic Classifier
    • The main disadvantage of DPI is the need to see the payload, which is not always possible. But the main DPI task can be performed without the most in-depth analysis. Read more about how to implement the definition of an application layer protocol with a minimum set of information, see the article.

    Bypass DPI provider on a router with OpenWrt using only busybox
    • It has long been known that the more restrictions exist, the more there are ways to get around them. In the post, read more about which way to bypass DPI found by users if the system tries to extract the URL from the first packet with data from the client to the server.

    Fooling DPI with two scripts
    • Another way to get around DPI developed by the user. How can you easily and easily access a blocked page if the provider redirects you to the stub page.

    The fight against DDoS - CAPTCHA and its history
    • Everyone knows that CAPTCHA is used to protect against DDoS attacks and helps to identify who generates requests to the site - a person or a bot. But not everyone knows when and by whom such a system was developed, why the developers needed The New York Times archive numbers and old books, and why images with cats, rather than text, are now increasingly used for protection.

    DDoS attack from IoT devices
    • Why do cybercriminals choose IoT devices? How is hacking carried out? What needs to be done to protect yourself and what does the provider do for your safety? Read the answers to these and other questions in the article.

    Also popular now: