DPI-digest: Analyzing traffic, locks, platforms and manufacturers of DPI systems
In the first materials that we published in our blog on Habré, we talked about both the DPI technology itself and the various scenarios that allow it to be used, and we also touched on the subject of equipment .
Today we decided to sum up the interim results of the introductory cycle and prepared a DPI-digest for you. We tried to diversify the theory with information and entertainment materials from the VAS Experts thematic blog .
The global market for DPI systems could grow to $ 4.7 billion by 2020. Here we understand those who may be interested in DPI-technologies, where they can be used and to solve what problems they can be used.
DPI equipment works in conjunction with other devices and services of the data transmission network of the operator. In this material, we present an analysis of the components and some of the functionality.
Analysis of the main scenarios: analysis, classification and prioritization of traffic, optimization of uplinks, channel distribution between subscribers and caching.
A little more about DPI usage scenarios, but with a focus on user interaction and security: behavioral assessment, notification, white and black lists, traffic protection and interception, SORM prefilter.
How to connect devices of the deep analysis of the traffic to already available equipment of the operator. There are two basic schemes on which derived connection options can be based.
Continuation of reviews of foreign and domestic systems - a comparison of primary and secondary level devices that are most popular in the market and are available not only to large operators.
Discussion of recent legislative initiatives and already adopted laws, along with what Russian developers of DPI-systems can offer in response to the demands put forward.
Discussion of the situation around the topic of import substitution of telecommunications equipment in Russia. Someone still does not know, someone goes to the Chinese equipment. Let's see what this will lead to.
By the end of 2016, more than half of all global Internet traffic will be transmitted in encrypted form. This situation will have to work and those who use the DPI-system, but there are alternatives for analyzing traffic.
The fact that the expert study of the problem showed by using the system of deep traffic analysis (Deep Packet Inspection) to determine the anomalies in the behavior of traffic.
A fridge with Wi-Fi or “smart” TV can become tools for a cyber criminal. Here we provide a checklist of the main threats and ways to protect our network and devices.