|
Notes :: Deep Packet Inspection (DPI) |
-Notes - DSL -Telephone - - AT&T History - - - AntiTrust - - - Industry : AT&T - - CPE Carterfone - -Long Distance - - ILECs - - BOCs - Universal Service -Timeline - Telegraph - Internet - - Computer Inquiries - - Info Services - Common Carrier - Telecom - VoIP - Comm Act 34 - Telecom Act 96 - ICC - FCC - FCC Chairs & Commissioners |
The Internet's original design involves a subnetwork of computers which were dedicated to network transmissions. Computers in the subnetwork would talk to other computers in the subnetwork; host computers (at say a university) would talk with its representative subnetwork computer, and not directly with the other host computers at the other universities. Originally, in the ARPANet these were known as Interface Message Processors (IMPs) (not to be confused with ecumenicalism of Interfaith Message Processors). Today they are known as routers.
Computational resources available to these subnetwork computers was limited; therefore the IMPs would not engage in processing of data transmissions, but would only be involved in the routing and transmission of the packets. All processing of the packets would be done by the end, host computers, leading to what is known as the "end-to-end" principle. The principle for routing became refered to as "best effort" and "first in, first out." There was no discrimination of packets within the network as there was no ability to discriminate.
Computational power grew. In time, the computational resources available to a network were sufficient such that it could engage in some levels of packet processing and analysis. This packet inspection was initially superficial.
In time, computeration resources available to networks grew even more and routers could now engage in Deep Packet Inspection (DPI), making sophisticated analyses of the packets flying by. In a combination of Intrusion Detection Systems and firewalls, networks could now look inside the packets at layers 4 through 7, and take action accordingly. Networks using DPI can look at
Port numbers domain names SIP numbers IP numbers application signatures Content filtering IM chat channels Transport protocol Differentiated service code point or traffic class Packet's length Media Access Control (MAC) address This creates a departure from the previous routing policy of "best effort" and "first in, first out."
DPI can be used to
Block spam, malware, DOS, and other secruity threats Block certain types of traffic (ie., P2P) Block competitors
A policy issue has developed over whether and when the use of DPI constitutes reasonable network managment and when it constitutes a violation of network neutrality. According to the FTC
"To treat some data packets differently than others, as opposed to simply using a first-in-first-out and best-efforts approach, a network operator must be able to identify certain relevant characteristics of those packets. One source of identifying information is the packet's header, which contains the IP address of its source and destination. The packet header also contains several types of information that suggest the type of application required to open the data file, such as the source and destination port numbers, the transport protocol, the differentiated service code point or traffic class, and the packet's length. Additionally, the header contains the Media Access Control ("MAC") address of the packet's source and destination, which provides information about the manufacturer of the device attached to the network.108
"In recent years, router manufacturers have refined packet-inspection technologies to provide network operators with a wide range of information about the data traffic on their networks, including information not provided in packet headers. These technologies were developed in part to help local area networks direct traffic more efficiently and to thwart security risks. Deep packet inspection may also be implemented on the Internet to examine the content of packet streams - even search for keywords in text - and to take action based on content- or application-specific policies. Such actions could involve tracking, filtering, or blocking certain types of packet streams. Further, deep packet inspection can map the information it accumulates to databases containing, for instance, demographic or billing information.
"Another relatively new technology that may be implemented to reveal information about packet streams is flow classification. This technology monitors the size of packets in a data stream, the time elapsed between consecutive packets, and the time elapsed since the stream began, with the goal of making reasonable determinations about the nature of the packets in the stream. Thus, flow classification may reveal information about a packet stream even if the individual packets themselves are encrypted against packet inspection. With the development of these two technologies, it is now costeffective for a network operator to gain extensive knowledge about the nature of the data traveling across its network." [FTC Staff Report 2007 p 30]
Previous tracking of end-user behavior online was achieved, and is still achieved, through the use of cookies. DPI however is a significant advancement in tracking personal information over cookies.
Cookies
Web based Captures only predetermined information Static On users hard drive End user can block use of cookies End user can see cookies on computer DPI
Captures data from all application Captures all information Dynamic Located within network End user cannot block DPI End user cannot see use of DPI [Person 442]
Hearings
- House Commerce Committee Communications Networks and Consumer Privacy: Recent Developments Hearings - Subcommittee on Communications, Technology, and the Internet Thursday, 23 April 2009 15:32 The Subcommittee on Communications, Technology, and the Internet held a hearing titled, "Communications Networks and Consumer Privacy: Recent Developments" on Thursday, April 23, 2009, in 2322 Rayburn House Office Building. The hearing focused on technologies that network operators utilize to monitor consumer usage and how those technologies intersect with consumer privacy. The hearing explored three ways to monitor consumer usage on broadband and wireless networks: deep packet inspection (DPI); new uses for digital set-top boxes; and wireless Global Positioning System (GPS) tracking.
- What Your Broadband Provider Knows About Your Web Use: Deep Packet Inspection and Communications Laws and Policies Before the Subcomm. on Telecomm. and the Internet of the H. Comm. on Energy and Commerce, 110th Cong., at 4-5 (2008)
- testimony of Bob Dykes, CEO NebuAd
Timeline
- 2000: US Patent 6163843 - Packet inspection device, mobile computer and packet transfer method in mobile computing with improved mobile computer authenticity check scheme (Issued Dec. 2000, filed 1997)
- 1994: Checkpoint releases Firewall-1 [Avolio]
- 1993:
- Stateful firewalls appear on market
- Oct. 1: Trusted Information Systems (TIS) Firewall Toolkit (FWTK) released [Avolio]
- 1992: DEC SEAL firewall released [Higgins]
- 1991: First commercial firewall installed [Avolio]
- 1988: Morris Worm blasts a wake up call for network security
- 1986: Dorothy Denning proposes intrusion detection technologies
- 1969: In order to maximize throughput in light of limited computational resources, ARPANet is designed with a subnet of IMPs which simply routed packets
- 5th Century BC: China builds Great Wall of China
Papers
- Andrea N Person, Behavioral Advertising Regulation: How the Negative Perception of Deep Packet Inspection Technology May Be Limiting the Online Experience, 62 FCLJ 435
- Kelly Jackson Higgins, Who Invented the Firewall, Dark Reading (Jan. 15, 2008)
- Nate Anderson, Throttle Me This: An Introduction to DPI, Ars Technica (July 25, 2007)
- Deep Packet Inspection and the Role of Network Processors, dPacket.org (Feb. 4, 2008)
- Fang Yu, Zhifeng Chen, Yanlei Diao, TV Laksshman, Randy Katz, Fast and memory-efficient regular expression matching for deep packet inspection, Symposium On Architecture For Networking And Communications Systems, Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems (2006)
- Thomas Porter, The Perils of Deep Packet Inspection, Security Focus (January 11, 2005)
- Frederic Avolio, Firewalls and Internet Security, the Second Hundren (Internet) Years, The Internet Protocol Journal Vol 2, No. 2 (1999)
- Cheswick, W. and Bellovin, S., Firewalls and Internet Security: Repelling the Wily Hacker, ISBN 0201633574, Addison-Wesley, 1994
- Kenneth Ingham and Stephanie Forrest, A History and Survey of Network Firewalls ACM Journal (nd)