DFI (deep/dynamicflow inspection, depth/dynamic flow detection) __ Flow

Source: Internet
Author: User

DFI adopts an application recognition technique based on traffic behavior, that is, different application types are different in the state of session connection or data flow. For example, the network IP voice traffic reflected in the flow state of the characteristics are very obvious: the RTP packet length is relatively fixed, generally in the 130~220byte, the connection rate is low, for 20~84KBIT/S, while the session duration is relatively long And the traffic model based on peer-to-peer downloading is characterized by average packet length above 450byte, long downloading time, high connection rate, TCP and so on the preferred Transport layer protocol. DFI technology is based on the behavior of this series of traffic characteristics, set up a traffic characteristic model, through the analysis of the session connection flow packet length, connection rate, transmission byte volume, packet and packet spacing between the information and traffic model to compare, so as to achieve the identification application type.
DFI only to the flow behavior analysis, so only the corresponding type of general classification, such as the application to meet the Peer-to-peer flow model of unified identification for the Peer-to-peer flow, the network voice traffic model is classified as a unified VoIP traffic, but can not determine whether the flow of the use of H.323 or other protocols. If the packet is encrypted transmission, the DPI-mode flow control technology can not identify its specific application, and the DFI mode of the flow control technology is not affected, because the application of the state behavior characteristics of the flow will not be fundamentally changed by encryption.

Traffic anomaly model is to apply baseline template (Baseline Template) to the user-defined monitoring range (Internet, interconnected autonomous domain, subnet, router, server, interface, monitoring conditions, etc.) The traffic anomaly detection model mainly relies on the system to form the flow baseline of the normal flow in the network, and then dynamically analyze the abnormal traffic in the network according to the network traffic model, in order to discover the traffic surge and the sudden reduction in the network at the earliest time. For different network monitoring range, users can use the definition of different traffic baseline template for monitoring. The system supports the automatic establishment and updating of traffic baselines, and allows administrators to manually set and adjust baseline parameters and value periods, and to exclude certain specific days of abnormal traffic attacks from being included in the calculation to avoid affecting the accuracy of baselines. By setting the parameters, the system can divide the severity of network abnormal traffic into several levels according to the influence of network efficiency, including: normal, moderate anomaly (yellow), height anomaly (red), and allow users to set appropriate parameters for each detection range through parameter setting.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.