Premium Content

Access "Deep packet inspection tools: Proxy vs. stream-based"

David B. Jacobs, Contributor Published: 10 Oct 2012

Deep packet inspection (DPI) tools have been mostly associated with service provider networks, but enterprise network managers are increasingly turning to the technology to better manage application performance and ensure a greater level of security. Basic firewalls inspect packet headers to ensure that HTTP requests go only to the Web server and that SMTP traffic is directed to the email server, but this does not protect against Web attacks or email-borne malware. DPI tools, on the other hand, inspect the entire contents of a packet and determine performance based on which application layer protocol is in use. As such, DPI makes it possible to find, identify, classify, reroute or block packets with specific data or code payloads that conventional packet filtering cannot detect. DPI tools: Stream vs. proxy-based Packet inspection strategies can be broken into two categories: stream-based and proxy-based. Stream-based inspection examines the data in each incoming packet as it arrives. If no threat is found, the packet is forwarded to its destination. ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free