Network Shunt-DPI Deep Packet Detection Technology and Its Functions

Source: Internet
Author: User
Tongteng Network Shunt, also known as the core network collector, is an important basic equipment for the network monitoring front-end in the network security field. It is an essential equipment for the entire network security! It plays a key role in network security! Currently, the fixed network has been upgraded to 400 GB, supporting different links. The mobile Internet signaling collection traffic has been upgraded to a GB interface, supporting different carriers to separately distribute traffic and IPv4 and IPv6! Today, we will introduce the popular Deep Packet detection technology and its functions! --- Network Shunt

Network Shunt ATCA Frame Type focuses on high-density and cost-effective

The Network Shunt cartridge supports 48 10 Gbit/s

The Network ATCA frame-type Network Shunt has a maximum of 14 slots, supports 480 10 GB and 76 100 GB, and the switching capability reaches 12.8 TB.

16-cell network shunt with the latest orthogonal architecture, with an exchange capability of 52.6 TB and a data processing capability of 26.5 TB

Network Shunt-DPI Deep Packet detection technology and functions

Rong | Teng mobile Internet signaling collection currently supports a maximum of 384 10g, 48g, and 96 10g, 14-groove ATCA Frame

DPI

DPI is called "Deep Packet Inspection" and "Deep Packet detection ". The so-called "depth" is similar to common packets.

In comparison with the analysis layer, "common packet detection" only analyzes the content of Lower Layer 4 of the IP packet, including the source address and destination

Addresses, source ports, destination ports, and protocol types. In addition to the preceding hierarchical analysis, DPI also adds application layer analysis,

The basic concepts for identifying various applications and their content are shown in:


DPI of Network Shunt

DPI Technical Principles

The key to DPI technology is to efficiently identify various applications on the network.

Common packet detection uses port numbers to identify application types. If the port number is 80, the application indicates

Internet applications. Some illegal applications on the current network will use hidden or fake port numbers to avoid detection and supervision

The data streams of legitimate packets are eroded by the network. L2 ~ Traditional detection methods on the L4 layer are no longer available.

DPI technology is to detect the content of data packets in the application stream to determine the real application of data packets. Because not

The application can hide the port number, but it is difficult to hide the Protocol features of the application layer.

DPI recognition technology can be divided into the following categories:

(1) Recognition Technology Based on "special characters"

Different applications usually rely on different protocols, and different protocols have their special fingerprints, which may be specific terminals.

Port, specific string, or specific bit sequence. The Recognition Technology Based on "feature character" identifies a specific datagram in a business flow.

Text

To determine the application carried by the business flow.

Based on different detection methods, the recognition technology based on "feature words" can be divided into fixed-position feature word matching and change

Location feature matching and State feature matching.

Through the upgrade of "fingerprint" information, feature-based recognition technology can be easily extended to implement the new Protocol

Detection.

The key to DPI is that it constantly identifies various characteristic characters in an unformatted data packet to implement the basic technology of this process.

That is, pattern matching. In layman's terms, it is a string match, that is, whether the search from the data exists

String. Generally, the target string is described using the standard regular expression syntax.

(2) Application Layer Gateway Recognition Technology

The control flow of some services is separated from the business flow, and the business flow has no characteristics. In this case, we need to use the application

Layer Gateway identification technology.

The Application Layer Gateway must first identify the control flow and parse it through a specific Application Layer Gateway Based on the control flow protocol.

Identifies the corresponding business flow in the Protocol content.

Different Application Layer gateways are required to analyze each protocol.

For example, sip and h323 protocols belong to this type. Sip/h323 obtains its data channel through the signaling interaction process and negotiation, which is generally

Audio streams encapsulated in RTP format. That is to say, purely detecting the RTP Stream does not mean that this RTP stream is created through that protocol.

. The complete analysis can be obtained only by detecting the Protocol interaction of SIP/h323.

(3) Behavior Pattern Recognition Technology

The behavior pattern recognition technology is based on the analysis of the behavior that has been implemented on the terminal to determine whether the user is performing the action or is about to implement it.

. Behavior pattern recognition technology is usually used to identify businesses that cannot be determined by protocol. Example: Spam

The business flow is exactly the same as the normal email business flow in terms of the email content, only by dividing user behavior

To accurately identify spam businesses.

The above three identification technologies are used to identify different types of protocols and cannot be replaced by each other. Huawei's DPI Technology Department

The Multi-Service Control Gateway (mscg) Hierarchical DPI solution is adopted in the DPI system. These three technologies are used in the detection

Both efficiency and flexibility are optimized.

DPI Technology Application

Deploying the DPI system in an IP network can achieve business identification, business control, and business statistics in network operations.

Function.

Business Identification

Generally, there are two methods for business identification: one is to activate legitimate services for the operator, and the other is required by the operator.

Business under supervision.

The former can be identified by a 5-tuple of a business flow, for example, a VoD Service. Its business flow address belongs to the location of the VOD server network segment.

The port is a fixed port. The system generally uses ACL to identify such businesses.

The latter requires DPI technology, through the aforementioned business identification method, through the analysis of IP packet content, through the Feature Word Query

Find or perform business behavior statistics to obtain the business flow type.

Business Control

After identifying various types of business flows through DPI technology, the combination conditions of network configurations, such as users, time, bandwidth, and historical streams

To control the business flow. Control methods include normal forwarding, blocking, bandwidth restriction, ×××, And Remarking priority.

.

To facilitate business operation, business control policies are generally configured in the Policy server and dynamically distributed after the User goes online.

Supports four 100 GB cartridges

Business Statistics

DPI's service statistics function is designed to intuitively measure the network's business traffic distribution and various user business usage, thus improving

Good discovery promotes business development and affects normal network operations, and provides a basis for network and business optimization. For example, mining

Users' attractive business, verify whether the service level has reached the SLA of the user's service level agreement, and make statistical analysis on the network

* ** The amount of traffic, the number of users using a certain game business, the number of services that consume the most network bandwidth and

The user has used illegal VOIP and so on.

Development of DPI Technology

We can see that the DPI detection technology and the anti-detection of abnormal applications on the network are the relationship between spear and shield. The DPI technology mentioned earlier is not

It remains static. With the development of detection technology, the hidden technology of unusual applications is also evolving. For example, partial data encryption and hiding

Hiding feature characters and avoiding detection through tunnel technology.

In the development of DPI technology, the above detection methods will be constantly adjusted to achieve high detection accuracy.

In short, DPI technology will gradually be widely used in security, business control, and other aspects, to provide

A powerful tool-Network Shunt

Network Shunt-DPI Deep Packet Detection Technology and Its Functions

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.