SlideShare una empresa de Scribd logo
1 de 17
DEEP PACKET INSPECTION (DPI)
AS A SOLUTION TO MANAGING
SECURITY THREATS

Ian Betteridge
November 2013
THE SECURITY CHALLENGE
• More sophisticated and effective cyber attacks
mean traditional security solutions e.g.
firewall, IDS/IPS, UTM are struggling to cope.
• Need flexible and customized security policy
control for real pro-active cyberdefense, especially to meet the high security
needs of the government sector.
IPOQUE PACE = STATE OF THE ART DPI

PREPROCESSING

• Defragmentation
Engine

• Packet Re-ordering
• Connection
subscriber tracking
• L3 encapsulation

CLASSIFICATION

METADATA
EXTRACTION

EXTRA
FEATURES

• Protocol

• Traffic statistics

• OS detection

• Protocol group

• Users/Subscribers’
statistics

• Client-Server
identification

• QoS parameters

• Tethering detection

• Sub protocol
• Application

• Ads detection
• Custom defined
protocol

• Fast Path
PACE – HOW WE DO DPI
•

We use a variety of analysis techniques to reliably detect
network protocols:
•

Pattern matching

•

Finite state machine

•

Behavioral & heuristic analyses
•

Lengths checks

•

Frequency of packet sending/receiving

•

Amount of connections opened by a single subscriber

•

Encryption usage
PRE PROCESSING IMPROVES ACCURACY AND
RATE OF CLASSIFICATION
PREPROCESSING

• Defragmentation Engine
• Packet Re-ordering

• Connection subscriber
tracking
• L3 encapsulation

•

Key Benefits
•
•

Accuracy
Flexibility
• High performance
CLASSIFICATION

Protocol History

CLASSIFICATION

Protocol
• Flash (Group
Streaming)
• HTTP
(Group Web)

Sub Protocol
• Media

Application
• YouTube
(Group
Streaming)

www.ipoque.com/sites/default/files/mediafiles/
documents/data-sheet-supported-protocols.pdf
METADATA EXTRACTION

METADATA
EXTRACTION

•

Examples
•
•
•
•
•
•

•

User ID
IP address
Time and date of login/off
Host
User agent
Emailsubject, body, sender, receiver, attachm
ent etc.
File transfer:
sender, receiver, login, attachment etc.
METADATA OUTPUT NORMALIZATION
Applications of same type produce the same Class Events:
- i.e. each webmail has a different look and feel and proprietary structure
- PADE Solution: normalize all required fields in a unified format
FROM
TO (CC/BCC)
SUBJECT
TIMESTAMP
…
METADATA EXAMPLE
EXTRA FEATURES

EXTRA
FEATURES

•

Extra features
•
•
•
•
•

•

OS detection
Client-Server identification
Tethering detection
Advertising detection
Custom defined protocols

Optimization features
•
•
•

Dynamic upgrades
SMP support
Fast path
SECURITY BENEFITS IN USING DPI
•

Use application pre-filtering to recognize threats in
adaptable flexible way
•

Improve security intelligence to qualify and block an attack in
real-time

•

Gain efficiency by focusing only on real security threats

•

Stay current with dynamic changes in protocols and
applications

•

Supports recognition of your custom-defined apps
and protocols
•

Granular customization of security policy rules
USING PACE AS A SECOND LINE OF DEFENSE
PACE
DPI
Cyber
attacks

Off the Shelf
Security Products
Anti-Spam, anti-virus, antimalware, firewall, DLK.

Cyber
Defense
Solution

Critical
Infrastructure
HOW PACE ENSURES ACCURACY

Looking for
parameters a,
b and c

Looking for
parameters
d, e, f, and g

Looking for
parameters
x and y

80 %

97%

100%
PACE DETECTION RATE
All Network Elements: Protocol Groups

Over 95% detection
rate
71%
22%

Streaming Protocols

3%

Unclassified Traffic

1%

VoIP Protocols

1%

P2P Protocols

2%

2,000+ Applications and Protocols recognised

Web Protocols

Other
PACE PERFORMANCE TEST RESULTS

Max. concurrent
connections

Average packet
size (Bytes)

Top 5 Protocols

Gbps/core

418.720

569

HTTP, FLASH, BITTOR
RENT, MPEG, SKYPE

3,4

71.191

523

HTTP, SSL, RTP, FLAS
H, OPENVPN

5,6

Test Conditions:
•
•
•

Hardware: i3-2120 CPU @
3.30GHz
All application enabled
All features enabled
PACE STRENGTHS AS A DPI SOLUTION
•

Fast Performance

•

High frequency of protocol and
DPI engine updates

•

High classification accuracy
(no false positives)

•

Low processor to memory
consumption ratio

•

Support for over 500 protocols

•

Support for thousands of applications
THANK YOU!
Ian Betteridge
Ian.betteridge@ipoque.com
Phone +49 341 594030
Fax +49 341 59403019

Más contenido relacionado

Más de Andris Soroka

Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...
Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...
Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...
Andris Soroka
 

Más de Andris Soroka (20)

Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 
Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...
Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...
Zane Beļavska - LR MOD - Normatīvie akti kiberdrošībā - @ LTRK + DSS.LV = Hak...
 
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
 
IBM QRadar versus MK noteikumi 2016
IBM QRadar versus MK noteikumi 2016IBM QRadar versus MK noteikumi 2016
IBM QRadar versus MK noteikumi 2016
 
DSS @ IBM Business Connect 2016 - OUTTHINK. - 10 baušļi mobīlajai drošībai
DSS @ IBM Business Connect 2016 - OUTTHINK. - 10 baušļi mobīlajai drošībaiDSS @ IBM Business Connect 2016 - OUTTHINK. - 10 baušļi mobīlajai drošībai
DSS @ IBM Business Connect 2016 - OUTTHINK. - 10 baušļi mobīlajai drošībai
 
DSS.LV @ Dienas Biznesa, IBM un Exigen Latvija seminārā "Biznesa datu drošība"
DSS.LV @ Dienas Biznesa, IBM un Exigen Latvija seminārā "Biznesa datu drošība"DSS.LV @ Dienas Biznesa, IBM un Exigen Latvija seminārā "Biznesa datu drošība"
DSS.LV @ Dienas Biznesa, IBM un Exigen Latvija seminārā "Biznesa datu drošība"
 
Digitālā Ēra 2016 - Arnis Puksts - Pers.datu. atbilstības novērtējums
Digitālā Ēra 2016 - Arnis Puksts - Pers.datu. atbilstības novērtējumsDigitālā Ēra 2016 - Arnis Puksts - Pers.datu. atbilstības novērtējums
Digitālā Ēra 2016 - Arnis Puksts - Pers.datu. atbilstības novērtējums
 
Digitālā Ēra 2016 - AGENDA
Digitālā Ēra 2016 - AGENDADigitālā Ēra 2016 - AGENDA
Digitālā Ēra 2016 - AGENDA
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

DSS ITSEC 2013 Conference 07.11.2013 - IPOQUE Traffic Management

  • 1. DEEP PACKET INSPECTION (DPI) AS A SOLUTION TO MANAGING SECURITY THREATS Ian Betteridge November 2013
  • 2. THE SECURITY CHALLENGE • More sophisticated and effective cyber attacks mean traditional security solutions e.g. firewall, IDS/IPS, UTM are struggling to cope. • Need flexible and customized security policy control for real pro-active cyberdefense, especially to meet the high security needs of the government sector.
  • 3. IPOQUE PACE = STATE OF THE ART DPI PREPROCESSING • Defragmentation Engine • Packet Re-ordering • Connection subscriber tracking • L3 encapsulation CLASSIFICATION METADATA EXTRACTION EXTRA FEATURES • Protocol • Traffic statistics • OS detection • Protocol group • Users/Subscribers’ statistics • Client-Server identification • QoS parameters • Tethering detection • Sub protocol • Application • Ads detection • Custom defined protocol • Fast Path
  • 4. PACE – HOW WE DO DPI • We use a variety of analysis techniques to reliably detect network protocols: • Pattern matching • Finite state machine • Behavioral & heuristic analyses • Lengths checks • Frequency of packet sending/receiving • Amount of connections opened by a single subscriber • Encryption usage
  • 5. PRE PROCESSING IMPROVES ACCURACY AND RATE OF CLASSIFICATION PREPROCESSING • Defragmentation Engine • Packet Re-ordering • Connection subscriber tracking • L3 encapsulation • Key Benefits • • Accuracy Flexibility • High performance
  • 6. CLASSIFICATION Protocol History CLASSIFICATION Protocol • Flash (Group Streaming) • HTTP (Group Web) Sub Protocol • Media Application • YouTube (Group Streaming) www.ipoque.com/sites/default/files/mediafiles/ documents/data-sheet-supported-protocols.pdf
  • 7. METADATA EXTRACTION METADATA EXTRACTION • Examples • • • • • • • User ID IP address Time and date of login/off Host User agent Emailsubject, body, sender, receiver, attachm ent etc. File transfer: sender, receiver, login, attachment etc.
  • 8. METADATA OUTPUT NORMALIZATION Applications of same type produce the same Class Events: - i.e. each webmail has a different look and feel and proprietary structure - PADE Solution: normalize all required fields in a unified format FROM TO (CC/BCC) SUBJECT TIMESTAMP …
  • 10. EXTRA FEATURES EXTRA FEATURES • Extra features • • • • • • OS detection Client-Server identification Tethering detection Advertising detection Custom defined protocols Optimization features • • • Dynamic upgrades SMP support Fast path
  • 11. SECURITY BENEFITS IN USING DPI • Use application pre-filtering to recognize threats in adaptable flexible way • Improve security intelligence to qualify and block an attack in real-time • Gain efficiency by focusing only on real security threats • Stay current with dynamic changes in protocols and applications • Supports recognition of your custom-defined apps and protocols • Granular customization of security policy rules
  • 12. USING PACE AS A SECOND LINE OF DEFENSE PACE DPI Cyber attacks Off the Shelf Security Products Anti-Spam, anti-virus, antimalware, firewall, DLK. Cyber Defense Solution Critical Infrastructure
  • 13. HOW PACE ENSURES ACCURACY Looking for parameters a, b and c Looking for parameters d, e, f, and g Looking for parameters x and y 80 % 97% 100%
  • 14. PACE DETECTION RATE All Network Elements: Protocol Groups Over 95% detection rate 71% 22% Streaming Protocols 3% Unclassified Traffic 1% VoIP Protocols 1% P2P Protocols 2% 2,000+ Applications and Protocols recognised Web Protocols Other
  • 15. PACE PERFORMANCE TEST RESULTS Max. concurrent connections Average packet size (Bytes) Top 5 Protocols Gbps/core 418.720 569 HTTP, FLASH, BITTOR RENT, MPEG, SKYPE 3,4 71.191 523 HTTP, SSL, RTP, FLAS H, OPENVPN 5,6 Test Conditions: • • • Hardware: i3-2120 CPU @ 3.30GHz All application enabled All features enabled
  • 16. PACE STRENGTHS AS A DPI SOLUTION • Fast Performance • High frequency of protocol and DPI engine updates • High classification accuracy (no false positives) • Low processor to memory consumption ratio • Support for over 500 protocols • Support for thousands of applications
  • 17. THANK YOU! Ian Betteridge Ian.betteridge@ipoque.com Phone +49 341 594030 Fax +49 341 59403019

Notas del editor

  1. Youtube example – file PDF with every release - Marcel
  2. Youtube example – file PDF with every release - Marcel