Sei sulla pagina 1di 10

White Paper:

5 Things You Need to Know About


Deep Packet Inspection (DPI)

By Safa Alkateb

Updated April 2011


White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 2

5 Things You Need to Know About


Deep Packet Inspection (DPI)
By Safa Alkateb

Network and telecommunications engineers face stark challenges in the coming years.
Analysts predict sharp increases in demand for network bandwidth and speed, as well
as the proliferation of sophisticated security risks. YouTube video already accounts for
about one fifth of all Internet data, and Cisco forecasts that by 2014 online video use will
increase seven fold. Peer to peer networking, VoIP, video chat and conferencing, online
gaming, cloud computing and other data-intensive activities are also expected to grow
dramatically, straining physical and wireless infrastructure across the globe.

On top of these bandwidth concerns are the ever-changing security threats that
jeopardize government and corporate networks, individual computers and mobile
devices. According to WhiteHat Security, the number of security threats doubled in the
past year and a half, and the pace of cyber crime is quickening.

To combat these pressures and meet future demand for data services, governments,
enterprises and carriers are not only upgrading their network infrastructure for greater
speed and quality of service, but they are looking for ways to manage their data flows
more intelligently. And the key to maintaining the integrity and efficiency of a multi-Gbps
network is a technology called deep packet inspection (DPI).

In this white paper, we explore five critical issues related to DPI, helping companies that
are interested in adding DPI to their products or networks better understand DPI, what it
can achieve, what best practices look like and what implications DPI has on privacy and
net neutrality.
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 3

1. What is DPI?
DPI is a hardware and software solution that monitors a network's data stream and
identifies protocols and applications, inappropriate URLs, intrusion attempts and
malware by looking deep into data packets. DPI provides important security and
translation functions by inspecting incoming packets, reassembling and decompressing
them, analyzing the code and passing data to appropriate applications and services. If
malicious URLs or code are detected, the system can block them entirely.

DPI can also be used by service providers to offer subscribers different levels of access
(such as type of usage, data limits or bandwidth level), comply with regulations, prioritize
traffic, adjust loads and gather statistical information. As more and more software moves
off the desktop and onto the enterprise network or into the cloud, network performance
becomes critical to productivity. DPI can recognize applications as data passes through
the system, allocating each the resources they need.
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 4

To offer such a wide array of


services, DPI examines not
only a packet’s originating
port and IP address
(sometimes called ―shallow
inspection‖) — which provide
limited and sometimes
misleading information —
but looks deep into the
Application layer of the OSI
model (the seven layered
model that describes the
structure of packet data),
where it can use a variety of
techniques, including
signature- and heuristics-
based detection, to identify
the nature of the packet’s payload.

Today, the DPI industry is growing rapidly, with product revenue expected to reach $1.5
billion by 2014. DPI is an important part of a larger network security appliance and
software market that is expected to reach $7 billion by 2014.

2. What are the critical applications of a DPI system?


In most situations, a DPI system needs to be able to provide four major services:

 Protocol Analysis & Application Recognition


 Anti-malware and Anti-virus Protection
 IDS and/or IPS
 URL Filtering

Protocol Analysis & Application Recognition


To make sense of the data that flows through a network, a DPI system must be able to
distinguish between many different protocols. Today’s sophisticated DPI systems can
identify hundreds of protocols covering almost every type of application and service. For
instance, strong DPI systems should be able to distinguish between email services,
including IMAP, POP3 and SMTP. They should identify web protocols, such as HTTP,
FTP and TCP, as well as multimedia types, such as Flash, QuickTime, Real, YouTube
and Windows Media. In fact, DPI systems need to be able to identify a wide variety of
web 2.0, tunneling, session, peer-to-peer, messaging and voice over IP protocols in
order to route the data to appropriate detection and processing engines. DPI can also
extract a payload’s meta data, including attachment formats, file names, phone numbers
and more.
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 5

The ability to quickly and easily update detection profiles without disrupting the system is
important in a DPI solution, particularly for data centers and carriers. For this reason,
detection engines should be user configurable without requiring a system reboot. A
credible DPI system should be able to detect protocols and applications using all of the
following methods:

 Port Detection
 Signature Detection
 Heuristics Detection

Other characteristics of a high-performance DPI system include flow-based detection


(for TCP, UDP and WAP), support for IPv4 and IPv6, TCP/IP normalization and
reassembly and rules-based metadata extraction.

Anti-malware and Anti-virus


DPI is an ideal environment for detecting and filtering a wide range of malware and
viruses, such as worms, Trojan horses, spyware, adware and other malicious
applications. Most DPI systems can be configured to detect and eliminate the vast
majority of these threats or the systems can be extended with third-party solutions.
Almost all threats can be intercepted if the system employs a three-pronged security
approach:

 Normalized URL Detection – Comparing incoming and embedded URLs


against a database of known malicious sites

 Object Detection – Searching the data flow for potentially harmful executables
or objects (such as JPEG images), then analyzing them

 Signature Detection – Using a signature database to detect certain kinds of


malware, especially viruses that mutate upon replication

Each of these detection approaches can and should be updated with third-party
signature subscriptions (such as those from security service provider Kaspersky).

IDS / IPS
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) both detect
intrusion attempts and share many characteristics. They are used to detect hackers and
unauthorized people trying to access a network or computer, usually by exploiting a
vulnerability in an application. But the two systems differ in one important aspect: IDS is
primarily an out-of-band logging tool used for forensic analysis. IPS, on the other hand,
runs inline and automatically takes action when malicious activity is detected.
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 6

DPI systems can provide one or both of these services. To provide optimal performance,
IDS and IPS should support PCRE syntax, SNORT rules, normalized URL detection and
TCP normalization. Third party signature databases are available to detect thousands of
threats.

URL Filtering
URL filtering is a basic security feature, blocking unauthorized or inappropriate URLs.
But to work in a carrier-grade DPI environment it must be able to perform at a high level.
Specifically, the filtering function must be able to handle millions of URLs at real-time
speeds. To achieve these speeds, the system must be able to support both literal strings
and wildcards. To reduce the complexity of the rules that govern it, the filtering system
should provide URL normalization.

3. Why speed and efficiency matter.


Until recently, most DPI systems weren’t able to keep up with modern, multi-gigabit
network speeds. Latency and quality of service were serious problems. But the
introduction of multi-core processors and hardware acceleration of important functions
have made DPI practical and affordable enough for wide deployment. In fact, many of
today’s carrier-grade DPI systems can be housed in a single enclosure and run at wire-
speed, processing tens of billions of bits of information in real time. Without the hardware
advantages of modern systems, DPI would become a bottleneck in high-traffic
circumstances.

Raw throughput speed is only part of the picture. Advanced DPI systems are also highly
efficient, so they consume fewer resources and can run on less expensive equipment.
Until recently, DPI had to run on power-hungry, dedicated systems. Today, it can be
integrated efficiently into a larger system.

What do these advances mean to you? To provide DPI, you no longer need deep
expertise in the technology. Standardization has made DPI relatively easy to add to
many OEM and enterprise systems.
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 7

4. How do you achieve high-performance DPI?


Recent technical advances have made line-speed DPI a practical and affordable option
for many enterprise and carrier-grade networks. Today’s state-of-the-art multi-gigabit
DPI systems include many hardware and software innovations. If you are considering
implementing a DPI system, you will want to look out for these high-performance
features:

Hardware Features:
 Multi-core processor technology
 On-chip or on-board hardware acceleration for common functions
 Code compaction to reduce l-cache misses
 ―Normal‖ path prediction to reduce execution cycles
 Data structure consolidation to improve flow setup performance
 Pre-fetching to sustain performance through data flow spikes

Software Features:
 TCP-IP reassembly for accurate payload scanning
 An abstracted centralized flow manager to allow for additional DPI engines
 In-line decompress/GZIP support to decompress HTTPS payloads
 HTML and MIME parsing to allow URL and object extraction
 Minimal packet rescanning for 3x to 4x performance improvement
 Ability to dynamically update rules
 Optimized signatures

5. The implications of DPI on privacy


DPI is a powerful technology. And with great power comes the potential for abuse.
Because DPI can search through the contents of Internet traffic — including email, http
requests and chat — some privacy advocates are worried that individuals’ civil liberties
are at risk. For instance, DPI can scan all of a network’s unencrypted traffic, searching
for and logging specific keywords, identification characteristics and Internet use. (In fact,
this exactly the sort of snooping that is allowed under the Communications Assistance to
Law Enforcement Act (CALEA), the federal law that allows law enforcement under a
warrant to tap into networks.) Fortunately, few cases of this type of abuse have been
discovered in the private sector, to date. In fact, there is little reason to look into the data
portion of a packet’s payload, as signatures, meta data and rules can usually identify an
application without that information.

Companies that deploy DPI can combat privacy concerns with clearly written,
enforceable policies that lay out what information can be collected and what cannot.
They should also remind themselves on a regular basis that intrusive behavior, if
discovered, can have serious repercussions on their reputation and revenues.
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 8

There is nothing inherent in DPI that compromises people’s privacy, of course. In fact,
DPI provides features and benefits to network communications that are available
nowhere else. For instance, DPI’s ability to feed data to applications at different bit rates
allows service provides to make optimal use of limited bandwidth and dramatically
improve the end user’s experience. Using DPI, a provider can discriminate in favor of
applications that require smooth data delivery. In this way, a streaming video can be
allocated more bandwidth than a video download. This technology allows companies like
Netflix and YouTube to deliver high performance even during peak hours. And now
lower speed options are becoming available at commodity prices, putting DPI within
reach of consumer-facing products.

A Comprehensive Approach to DPI


What does a comprehensive approach to DPI look like? A number of companies build
carrier-grade DPI devices, but in an attempt to describe a fully-featured product, we will
look at the solution with which we are most familiar.

Cavium Solutions and Services’ TurboDPI™


TurboDPI, a network-based multi-function software platform, is designed to take
advantage of Cavium Networks’ multi-core OCTEON II processors and their built-in
packet inspection engines. The product is designed for OEM and ODM customers who
either 1) don’t have their own DPI product and want to add carrier-grade performance to
a new or existing product; or 2) want to enhance the performance and functionality of
their existing DPI product. TurboDPI can be adapted to any of several standard form
factors, including AMC modules and ATCA blades.

Architecture
The TurboDPI system is designed to simultaneously support multiple functions, such as
protocol detection, URL filtering and IDS/IPS, and anti-malware. Packets passing
through the system first undergo on-the-fly IP and TCP reassembly and decompression
before being passed to the flow manager. HTTP, MIME and URL normalization are
applied and the data flow is checked against a variety of signatures and rules. Packets
flagged as positives are then routed to appropriate applications (such as anti-malware)
for further processing.

TurboDPI’s patented Uni-Scan technology offers an additional three-fold performance


boost by performing multiple detection scans in a single pass. The system is able to
achieve this efficiency by taking advantage of OCTEON’s hardware acceleration
features, such as HFA.
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 9

Key Functions
The TurboDPI system comes with built-in support for all four critical detection functions:
Protocol detection and application recognition, anti-malware and anti-virus, IDS/IPS and
URL filtering. The protocol detection engine is supported by signature-, port- and
heuristics-based detection systems, all of which can be updated dynamically. Similarly,
the anti-malware and anti-virus system can be easily updated, either manually or using
an automated third-party profiling service (such as Kaspersky).
White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 10

Performance
TurboDPI was designed for performance. It’s state-of-the-art OCTEON II processor with
on-board HFA can process packets at a data rate of up to 40 Gbps. In addition, the
solution’s hardware-based decompression and checksum engines, together with its Uni-
Scan technology, provide industry-leading performance in a compact form factor.

About Cavium Solutions and Services


Cavium Solutions and Services (CSS) is the leading authority on software application
development for the Cavium platform. With insider access to Cavium’s chip designers
and engineers, CSS is able to achieve the greatest possible performance from Cavium
parallel processors. CSS has been developing multi-core software for over nine years,
and it has helped many brand-name manufacturers bring top-performing products to
market.

Potrebbero piacerti anche