<s>
Deep	B-Application
packet	I-Application
inspection	I-Application
(	O
DPI	O
)	O
is	O
a	O
type	O
of	O
data	O
processing	O
that	O
inspects	O
in	O
detail	O
the	O
data	O
being	O
sent	O
over	O
a	O
computer	B-Architecture
network	I-Architecture
,	O
and	O
may	O
take	O
actions	O
such	O
as	O
alerting	O
,	O
blocking	O
,	O
re-routing	O
,	O
or	O
logging	O
it	O
accordingly	O
.	O
</s>
<s>
Deep	B-Application
packet	I-Application
inspection	I-Application
is	O
often	O
used	O
to	O
baseline	O
application	O
behavior	O
,	O
analyze	O
network	O
usage	O
,	O
troubleshoot	O
network	O
performance	O
,	O
ensure	O
that	O
data	O
is	O
in	O
the	O
correct	O
format	O
,	O
check	O
for	O
malicious	O
code	O
,	O
eavesdropping	O
,	O
and	O
internet	B-Application
censorship	I-Application
,	O
among	O
other	O
purposes	O
.	O
</s>
<s>
There	O
are	O
multiple	O
headers	O
for	O
IP	B-Protocol
packets	I-Protocol
;	O
network	O
equipment	O
only	O
needs	O
to	O
use	O
the	O
first	O
of	O
these	O
(	O
the	O
IP	O
header	O
)	O
for	O
normal	O
operation	O
,	O
but	O
use	O
of	O
the	O
second	O
header	O
(	O
such	O
as	O
TCP	O
or	O
UDP	O
)	O
is	O
normally	O
considered	O
to	O
be	O
shallow	O
packet	O
inspection	O
(	O
usually	O
called	O
stateful	O
packet	O
inspection	O
)	O
despite	O
this	O
definition	O
.	O
</s>
<s>
There	O
are	O
multiple	O
ways	O
to	O
acquire	O
packets	O
for	O
deep	B-Application
packet	I-Application
inspection	I-Application
.	O
</s>
<s>
Using	O
port	B-Protocol
mirroring	I-Protocol
(	O
sometimes	O
called	O
Span	B-Protocol
Port	I-Protocol
)	O
is	O
a	O
very	O
common	O
way	O
,	O
as	O
well	O
physically	O
inserting	O
a	O
network	B-Device
tap	I-Device
which	O
duplicates	O
and	O
sends	O
the	O
data	O
stream	O
to	O
an	O
analyzer	O
tool	O
for	O
inspection	O
.	O
</s>
<s>
Deep	B-Application
Packet	I-Application
Inspection	I-Application
(	O
and	O
filtering	O
)	O
enables	O
advanced	O
network	O
management	O
,	O
user	O
service	O
,	O
and	O
security	O
functions	O
as	O
well	O
as	O
internet	O
data	B-Application
mining	I-Application
,	O
eavesdropping	O
,	O
and	O
internet	B-Application
censorship	I-Application
.	O
</s>
<s>
For	O
example	O
,	O
Wireshark	B-Language
offers	O
essential	O
DPI	O
functionality	O
through	O
its	O
numerous	O
dissectors	O
that	O
display	O
field	O
names	O
and	O
content	O
and	O
,	O
in	O
some	O
cases	O
,	O
offer	O
interpretation	O
of	O
field	O
values	O
.	O
</s>
<s>
Some	O
security	O
solutions	O
that	O
offer	O
DPI	O
combine	O
the	O
functionality	O
of	O
an	O
intrusion	O
detection	O
system	O
(	O
IDS	O
)	O
and	O
an	O
Intrusion	O
prevention	O
system	O
(	O
IPS	O
)	O
with	O
a	O
traditional	O
stateful	O
firewall	B-Application
.	O
</s>
<s>
This	O
combination	O
makes	O
it	O
possible	O
to	O
detect	O
certain	O
attacks	O
that	O
neither	O
the	O
IDS/IPS	O
nor	O
the	O
stateful	O
firewall	B-Application
can	O
catch	O
on	O
their	O
own	O
.	O
</s>
<s>
Stateful	O
firewalls	B-Application
,	O
while	O
able	O
to	O
see	O
the	O
beginning	O
and	O
end	O
of	O
a	O
packet	O
flow	O
,	O
cannot	O
catch	O
events	O
on	O
their	O
own	O
that	O
would	O
be	O
out	O
of	O
bounds	O
for	O
a	O
particular	O
application	O
.	O
</s>
<s>
In	O
this	O
way	O
,	O
HTTP	B-Protocol
errors	O
of	O
different	O
classifications	O
may	O
be	O
identified	O
and	O
forwarded	O
for	O
analysis	O
.	O
</s>
<s>
The	O
most	O
frequently	O
used	O
tool	O
for	O
accomplishing	O
this	O
has	O
been	O
a	O
stateful	O
firewall	B-Application
.	O
</s>
<s>
Vulnerabilities	O
exist	O
at	O
network	O
layers	O
,	O
however	O
,	O
that	O
are	O
not	O
visible	O
to	O
a	O
stateful	O
firewall	B-Application
.	O
</s>
<s>
Also	O
,	O
an	O
increase	O
in	O
the	O
use	O
of	O
laptops	O
in	O
enterprise	O
makes	O
it	O
more	O
difficult	O
to	O
prevent	O
threats	O
such	O
as	O
viruses	O
,	O
worms	O
,	O
and	O
spyware	O
from	O
penetrating	O
the	O
corporate	O
network	O
,	O
as	O
many	O
users	O
will	O
connect	O
the	O
laptop	O
to	O
less-secure	O
networks	O
such	O
as	O
home	O
broadband	B-General_Concept
connections	O
or	O
wireless	O
networks	O
in	O
public	O
locations	O
.	O
</s>
<s>
Firewalls	B-Application
also	O
do	O
not	O
distinguish	O
between	O
permitted	O
and	O
forbidden	O
uses	O
of	O
legitimately-accessed	O
applications	O
.	O
</s>
<s>
Deep	B-Application
Packet	I-Application
Inspection	I-Application
is	O
able	O
to	O
detect	O
a	O
few	O
kinds	O
of	O
buffer	O
overflow	O
attacks	O
.	O
</s>
<s>
DPI	O
may	O
be	O
used	O
by	O
enterprise	O
for	O
Data	B-Application
Leak	I-Application
Prevention	I-Application
(	O
DLP	O
)	O
.	O
</s>
<s>
Decades	O
ago	O
in	O
a	O
legacy	O
telephone	O
environment	O
,	O
this	O
was	O
met	O
by	O
creating	O
a	O
traffic	O
access	O
point	O
(	O
TAP	O
)	O
using	O
an	O
intercepting	B-Application
proxy	I-Application
server	I-Application
that	O
connects	O
to	O
the	O
government	O
's	O
surveillance	O
equipment	O
.	O
</s>
<s>
Service	O
providers	O
obligated	O
by	O
the	O
service-level	O
agreement	O
with	O
their	O
customers	O
to	O
provide	O
a	O
certain	O
level	O
of	O
service	O
and	O
at	O
the	O
same	O
time	O
,	O
enforce	O
an	O
acceptable	B-Application
use	I-Application
policy	I-Application
,	O
may	O
make	O
use	O
of	O
DPI	O
to	O
implement	O
certain	O
policies	O
that	O
cover	O
copyright	O
infringements	O
,	O
illegal	O
materials	O
,	O
and	O
unfair	O
use	O
of	O
bandwidth	O
.	O
</s>
<s>
Policies	O
can	O
be	O
defined	O
that	O
allow	O
or	O
disallow	O
connection	O
to	O
or	O
from	O
an	O
IP	B-Protocol
address	I-Protocol
,	O
certain	O
protocols	O
,	O
or	O
even	O
heuristics	B-Algorithm
that	O
identify	O
a	O
certain	O
application	O
or	O
behavior	O
.	O
</s>
<s>
Technology	O
providers	O
include	O
NebuAd	B-Application
,	O
,	O
and	O
Phorm	O
.	O
</s>
<s>
Applications	O
such	O
as	O
peer-to-peer	O
(	O
P2P	O
)	O
traffic	O
present	O
increasing	O
problems	O
for	O
broadband	B-General_Concept
service	O
providers	O
.	O
</s>
<s>
Service	O
providers	O
say	O
a	O
minority	O
of	O
users	O
generate	O
large	O
quantities	O
of	O
P2P	O
traffic	O
and	O
degrade	O
performance	O
for	O
the	O
majority	O
of	O
broadband	B-General_Concept
subscribers	O
using	O
applications	O
such	O
as	O
e-mail	O
or	O
Web	O
browsing	O
which	O
use	O
less	O
bandwidth	O
.	O
</s>
<s>
Additionally	O
,	O
a	O
higher	O
priority	O
can	O
be	O
allocated	O
to	O
a	O
VoIP	B-Application
or	O
video	O
conferencing	O
call	O
which	O
requires	O
low	O
latency	O
versus	O
web	O
browsing	O
which	O
does	O
not	O
.	O
</s>
<s>
Mobile	O
and	O
broadband	B-General_Concept
service	O
providers	O
use	O
DPI	O
as	O
a	O
means	O
to	O
implement	O
tiered	O
service	O
plans	O
,	O
to	O
differentiate	O
"	O
walled	B-Application
garden	I-Application
"	O
services	O
from	O
"	O
value	O
added	O
"	O
,	O
"	O
all-you-can-eat	O
"	O
and	O
"	O
one-size-fits-all	O
"	O
data	O
services	O
.	O
</s>
<s>
By	O
being	O
able	O
to	O
charge	O
for	O
a	O
"	O
walled	B-Application
garden	I-Application
"	O
,	O
per	O
application	O
,	O
per	O
service	O
,	O
or	O
"	O
all-you-can-eat	O
"	O
rather	O
than	O
a	O
"	O
one-size-fits-all	O
"	O
package	O
,	O
the	O
operator	O
can	O
tailor	O
their	O
offerings	O
to	O
the	O
individual	O
subscriber	O
and	O
increase	O
their	O
average	O
revenue	O
per	O
user	O
(	O
ARPU	O
)	O
.	O
</s>
<s>
In	O
2006	O
,	O
one	O
of	O
Denmark	O
's	O
largest	O
ISPs	O
,	O
Tele2	O
,	O
was	O
given	O
a	O
court	O
injunction	O
and	O
told	O
it	O
must	O
block	O
its	O
customers	O
from	O
accessing	O
The	B-Application
Pirate	I-Application
Bay	I-Application
,	O
a	O
launching	O
point	O
for	O
BitTorrent	B-Protocol
.	O
</s>
<s>
The	O
Motion	O
Picture	O
Association	O
of	O
America	O
(	O
MPAA	O
)	O
which	O
enforces	O
movie	O
copyrights	O
,	O
has	O
taken	O
the	O
position	O
with	O
the	O
Federal	O
Communications	O
Commission	O
(	O
FCC	O
)	O
that	O
network	O
neutrality	O
could	O
hurt	O
anti-piracy	O
techniques	O
such	O
as	O
deep	B-Application
packet	I-Application
inspection	I-Application
and	O
other	O
forms	O
of	O
filtering	O
.	O
</s>
<s>
The	O
Chinese	O
government	O
uses	O
deep	B-Application
packet	I-Application
inspection	I-Application
to	O
monitor	O
and	O
censor	O
network	O
traffic	O
and	O
content	O
that	O
it	O
claims	O
is	O
harmful	O
to	O
Chinese	O
citizens	O
or	O
state	O
interests	O
.	O
</s>
<s>
China	O
previously	O
blocked	O
all	O
VoIP	B-Application
traffic	O
in	O
and	O
out	O
of	O
their	O
country	O
but	O
many	O
available	O
VoIP	B-Application
applications	O
now	O
function	O
in	O
China	O
.	O
</s>
<s>
Voice	O
traffic	O
in	O
Skype	B-Application
is	O
unaffected	O
,	O
although	O
text	O
messages	O
are	O
subject	O
to	O
filtering	O
,	O
and	O
messages	O
containing	O
sensitive	O
material	O
,	O
such	O
as	O
curse-words	O
,	O
are	O
simply	O
not	O
delivered	O
,	O
with	O
no	O
notification	O
provided	O
to	O
either	O
participant	O
in	O
the	O
conversation	O
.	O
</s>
<s>
China	O
also	O
blocks	O
visual	O
media	O
sites	O
such	O
as	O
YouTube.com	B-General_Concept
and	O
various	O
photography	O
and	O
blogging	O
sites	O
.	O
</s>
<s>
However	O
,	O
it	O
came	O
to	O
news	O
when	O
the	O
country	O
decided	O
to	O
block	O
the	O
encrypted	O
messaging	B-Protocol
app	O
Signal	B-Application
as	O
announced	O
by	O
the	O
application	O
's	O
developer	O
.	O
</s>
<s>
In	O
April	O
2017	O
,	O
all	O
VoIP	B-Application
applications	O
including	O
FaceTime	B-Operating_System
,	O
Facebook	B-Protocol
Messenger	I-Protocol
,	O
Viber	B-Application
,	O
WhatsApp	B-Application
calls	O
and	O
Skype	B-Application
have	O
been	O
all	O
blocked	O
in	O
the	O
country	O
.	O
</s>
<s>
As	O
of	O
2022	O
,	O
FaceTime	B-Operating_System
,	O
Facebook	B-Protocol
Messenger	I-Protocol
are	O
unblocked	O
.	O
</s>
<s>
The	O
Indonesian	O
Government	O
via	O
Telkom	O
Indonesia	O
,	O
supported	O
by	O
Cisco	O
Meraki	O
DPI	O
technology	O
,	O
perform	O
country-wide	O
surveillance	O
by	O
the	O
way	O
of	O
deep	B-Application
packet	I-Application
inspection	I-Application
,	O
and	O
map	O
it	O
into	O
SSN/NIK	O
(	O
Nomor	O
Induk	O
Kependudukan	O
)	O
of	O
its	O
citizens	O
that	O
registered	O
to	O
the	O
state-owned	O
ISP	O
.	O
</s>
<s>
The	O
purpose	O
of	O
deep	B-Application
packet	I-Application
inspection	I-Application
including	O
filtering	O
porn	O
,	O
hates	O
speech	O
,	O
and	O
reducing	O
tension	O
in	O
West	O
Papua	O
.	O
</s>
<s>
The	O
Iranian	O
government	O
purchased	O
a	O
system	O
,	O
reportedly	O
for	O
deep	B-Application
packet	I-Application
inspection	I-Application
,	O
in	O
2008	O
from	O
Nokia	O
Siemens	O
Networks	O
(	O
NSN	O
)	O
(	O
a	O
joint	O
venture	O
Siemens	O
AG	O
,	O
the	O
German	O
conglomerate	O
,	O
and	O
Nokia	O
Corp.	O
,	O
the	O
Finnish	O
cell	O
telephone	O
company	O
)	O
,	O
now	O
NSN	O
is	O
Nokia	O
Solutions	O
and	O
Networks	O
,	O
according	O
to	O
a	O
report	O
in	O
the	O
Wall	O
Street	O
Journal	O
in	O
June	O
,	O
2009	O
,	O
quoting	O
NSN	O
spokesperson	O
Ben	O
Roome	O
.	O
</s>
<s>
NSN	O
has	O
issued	O
the	O
following	O
denial	O
:	O
NSN	O
"	O
has	O
not	O
provided	O
any	O
deep	B-Application
packet	I-Application
inspection	I-Application
,	O
web	B-Application
censorship	I-Application
or	O
Internet	O
filtering	O
capability	O
to	O
Iran	O
"	O
.	O
</s>
<s>
A	O
concurrent	O
article	O
in	O
The	O
New	O
York	O
Times	O
stated	O
the	O
NSN	O
sale	O
had	O
been	O
covered	O
in	O
a	O
"	O
spate	O
of	O
news	O
reports	O
in	O
April	O
[2009],	O
including	O
The	O
Washington	O
Times	O
,	O
"	O
and	O
reviewed	O
censorship	B-Application
of	I-Application
the	I-Application
Internet	I-Application
and	O
other	O
media	O
in	O
the	O
country	O
,	O
but	O
did	O
not	O
mention	O
DPI	O
.	O
</s>
<s>
According	O
to	O
Walid	O
Al-Saqaf	O
,	O
the	O
developer	O
of	O
the	O
internet	B-Application
censorship	I-Application
circumventor	O
Alkasir	O
,	O
Iran	O
was	O
using	O
deep	B-Application
packet	I-Application
inspection	I-Application
in	O
February	O
2012	O
,	O
bringing	O
internet	O
speeds	O
in	O
the	O
entire	O
country	O
to	O
a	O
near	O
standstill	O
.	O
</s>
<s>
This	O
briefly	O
eliminated	O
access	O
to	O
tools	O
such	O
as	O
Tor	B-Application
and	O
Alkasir	O
.	O
</s>
<s>
Facebook	B-Application
accounts	O
,	O
blogs	O
and	O
news	O
portals	O
.	O
</s>
<s>
Some	O
human	O
rights	O
activists	O
consider	O
Deep	B-Application
Packet	I-Application
inspection	I-Application
contrary	O
to	O
Article	O
23	O
of	O
the	O
Constitution	O
of	O
the	O
Russian	O
Federation	O
,	O
though	O
a	O
legal	O
process	O
to	O
prove	O
or	O
refute	O
that	O
has	O
never	O
taken	O
place	O
.	O
</s>
<s>
The	O
city	O
state	O
reportedly	O
employs	O
deep	B-Application
packet	I-Application
inspection	I-Application
of	O
Internet	O
traffic	O
.	O
</s>
<s>
The	O
state	O
reportedly	O
employs	O
deep	B-Application
packet	I-Application
inspection	I-Application
of	O
Internet	O
traffic	O
,	O
to	O
analyze	O
and	O
block	O
forbidden	O
transit	O
.	O
</s>
<s>
The	O
National	O
Security	O
Agency	O
(	O
NSA	O
)	O
,	O
with	O
cooperation	O
from	O
AT&T	O
Inc.	O
,	O
has	O
used	O
Deep	B-Application
Packet	I-Application
Inspection	I-Application
to	O
make	O
internet	O
traffic	O
surveillance	O
,	O
sorting	O
,	O
and	O
forwarding	O
more	O
intelligent	O
.	O
</s>
<s>
The	O
DPI	O
is	O
used	O
to	O
find	O
which	O
packets	O
are	O
carrying	O
e-mail	O
or	O
a	O
Voice	B-Application
over	I-Application
Internet	I-Application
Protocol	I-Application
(	O
VoIP	B-Application
)	O
telephone	O
call	O
.	O
</s>
<s>
Traffic	O
associated	O
with	O
T	O
's	O
Common	O
Backbone	O
was	O
"	O
split	O
"	O
between	O
two	O
fibers	O
,	O
dividing	O
the	O
signal	B-Application
so	O
that	O
50	O
percent	O
of	O
the	O
signal	B-Application
strength	O
went	O
to	O
each	O
output	O
fiber	O
.	O
</s>
<s>
The	O
secure	O
room	O
contained	O
Narus	O
traffic	O
analyzers	O
and	O
logic	O
servers	B-Application
;	O
Narus	O
states	O
that	O
such	O
devices	O
are	O
capable	O
of	O
real-time	O
data	O
collection	O
(	O
recording	O
data	O
for	O
consideration	O
)	O
and	O
capture	O
at	O
10	O
gigabits	O
per	O
second	O
.	O
</s>
<s>
According	O
to	O
an	O
affidavit	O
by	O
expert	O
witness	O
J	O
.	O
Scott	O
Marcus	O
,	O
a	O
former	O
senior	O
advisor	O
for	O
Internet	B-Architecture
Technology	I-Architecture
at	O
the	O
US	O
Federal	O
Communications	O
Commission	O
,	O
the	O
diverted	O
traffic	O
"	O
represented	O
all	O
,	O
or	O
substantially	O
all	O
,	O
of	O
T	O
’s	O
peering	O
traffic	O
in	O
the	O
San	O
Francisco	O
Bay	O
area	O
"	O
,	O
and	O
thus	O
,	O
"	O
the	O
designers	O
of	O
the	O
…	O
configuration	O
made	O
no	O
attempt	O
,	O
in	O
terms	O
of	O
location	O
or	O
position	O
of	O
the	O
fiber	O
split	O
,	O
to	O
exclude	O
data	O
sources	O
primarily	O
of	O
domestic	O
data	O
"	O
.	O
</s>
<s>
Narus	O
's	O
Semantic	O
Traffic	O
Analyzer	O
software	O
,	O
which	O
runs	O
on	O
IBM	O
or	O
Dell	O
Linux	B-Application
servers	B-Application
using	O
DPI	O
,	O
sorts	O
through	O
IP	O
traffic	O
at	O
10Gbit/s	O
to	O
pick	O
out	O
specific	O
messages	O
based	O
on	O
a	O
targeted	O
e-mail	O
address	O
,	O
IP	B-Protocol
address	I-Protocol
or	O
,	O
in	O
the	O
case	O
of	O
VoIP	B-Application
,	O
telephone	O
number	O
.	O
</s>
<s>
The	O
Defense	O
Information	O
Systems	O
Agency	O
has	O
developed	O
a	O
sensor	O
platform	O
that	O
uses	O
Deep	B-Application
Packet	I-Application
Inspection	I-Application
.	O
</s>
<s>
Vietnam	O
launched	O
its	O
network	O
security	O
center	O
and	O
required	O
ISPs	O
to	O
upgrade	O
their	O
hardware	O
systems	O
to	O
use	O
deep	B-Application
packet	I-Application
inspection	I-Application
to	O
block	O
Internet	O
traffic	O
.	O
</s>
<s>
The	O
Indian	O
ISP	O
Jio	O
,	O
which	O
is	O
also	O
the	O
largest	O
network	O
operator	O
in	O
India	O
has	O
been	O
known	O
to	O
employ	O
sophisticated	O
DPI	O
techniques	O
like	O
SNI-based	O
filtering	O
to	O
enforce	O
censorship	O
.	O
</s>
<s>
People	O
and	O
organizations	O
concerned	O
about	O
privacy	O
or	O
network	O
neutrality	O
find	O
inspection	O
of	O
the	O
content	O
layers	O
of	O
the	O
Internet	B-Protocol
protocol	I-Protocol
to	O
be	O
offensive	O
,	O
saying	O
for	O
example	O
,	O
"	O
the	O
'	O
Net	O
was	O
built	O
on	O
open	O
access	O
and	O
non-discrimination	O
of	O
packets	O
!	O
"	O
</s>
<s>
Critics	O
of	O
network	O
neutrality	O
rules	O
,	O
meanwhile	O
,	O
call	O
them	O
"	O
a	O
solution	O
in	O
search	O
of	O
a	O
problem	O
"	O
and	O
say	O
that	O
net	O
neutrality	O
rules	O
would	O
reduce	O
incentives	O
to	O
upgrade	O
networks	O
and	O
launch	O
next-generation	B-Protocol
network	I-Protocol
services	O
.	O
</s>
<s>
Deep	B-Application
packet	I-Application
inspection	I-Application
is	O
considered	O
by	O
many	O
to	O
undermine	O
the	O
infrastructure	O
of	O
the	O
internet	O
.	O
</s>
<s>
With	O
increased	O
use	O
of	O
HTTPS	B-Protocol
and	O
privacy	O
tunneling	O
using	O
VPNs	O
,	O
the	O
effectiveness	O
of	O
DPI	O
is	O
coming	O
into	O
question	O
.	O
</s>
<s>
In	O
response	O
,	O
many	O
web	B-Protocol
application	I-Protocol
firewalls	I-Protocol
now	O
offer	O
HTTPS	B-Protocol
inspection	O
,	O
where	O
they	O
decrypt	O
HTTPS	B-Protocol
traffic	O
to	O
analyse	O
it	O
.	O
</s>
<s>
The	O
WAF	B-Protocol
can	O
either	O
terminate	O
the	O
encryption	O
,	O
so	O
the	O
connection	O
between	O
WAF	B-Protocol
and	O
client	O
browser	O
uses	O
plain	O
HTTP	B-Protocol
,	O
or	O
re-encrypt	O
the	O
data	O
using	O
its	O
own	O
HTTPS	B-Protocol
certificate	O
,	O
which	O
must	O
be	O
distributed	O
to	O
clients	O
beforehand	O
.	O
</s>
<s>
Firewall	B-Application
now	O
works	O
as	O
Man-in-the-middle	O
.	O
</s>
<s>
(	O
a	O
fork	O
from	O
OpenDPI	O
which	O
is	O
EoL	O
by	O
the	O
developers	O
of	O
ntop	B-Protocol
)	O
is	O
the	O
open	B-Application
source	I-Application
version	O
for	O
non-obfuscated	O
protocols	O
.	O
</s>
<s>
PACE	O
,	O
another	O
such	O
engine	O
,	O
includes	O
obfuscated	O
and	O
encrypted	O
protocols	O
,	O
which	O
are	O
the	O
types	O
associated	O
with	O
Skype	B-Application
or	O
encrypted	O
BitTorrent	B-Protocol
.	O
</s>
<s>
As	O
OpenDPI	O
is	O
no	O
longer	O
maintained	O
,	O
an	O
OpenDPI-fork	O
named	O
nDPI	O
has	O
been	O
created	O
,	O
actively	O
maintained	O
and	O
extended	O
with	O
new	O
protocols	O
including	O
Skype	B-Application
,	O
Webex	O
,	O
Citrix	B-Application
and	O
many	O
others	O
.	O
</s>
<s>
L7-Filter	O
is	O
a	O
classifier	O
for	O
Linux	B-Application
's	O
Netfilter	O
that	O
identifies	O
packets	O
based	O
on	O
application	O
layer	O
data	O
.	O
</s>
<s>
It	O
can	O
classify	O
packets	O
such	O
as	O
Kazaa	B-Protocol
,	O
HTTP	B-Protocol
,	O
Jabber	B-Protocol
,	O
Citrix	B-Application
,	O
Bittorrent	B-Protocol
,	O
FTP	B-Protocol
,	O
Gnucleus	O
,	O
eDonkey2000	O
,	O
and	O
others	O
.	O
</s>
<s>
It	O
classifies	O
streaming	O
,	O
mailing	O
,	O
P2P	O
,	O
VoIP	B-Application
,	O
protocols	O
,	O
and	O
gaming	O
applications	O
.	O
</s>
<s>
The	O
software	O
has	O
been	O
retired	O
and	O
replaced	O
by	O
the	O
open	B-Application
source	I-Application
Netify	O
DPI	O
Engine	O
.	O
</s>
<s>
Hippie	O
(	O
Hi-Performance	O
Protocol	O
Identification	O
Engine	O
)	O
is	O
an	O
open	B-Application
source	I-Application
project	O
which	O
was	O
developed	O
as	O
Linux	B-Application
kernel	O
module	O
.	O
</s>
<s>
It	O
supports	O
both	O
DPI	O
as	O
well	O
as	O
firewall	B-Application
functionality	O
.	O
</s>
<s>
It	O
is	O
just	O
a	O
proof	O
of	O
concept	O
application	O
and	O
currently	O
supports	O
approximately	O
15	O
application/protocols	O
such	O
as	O
eDonkey	O
Obfuscation	O
traffic	O
,	O
Skype	B-Application
UDP	O
and	O
TCP	O
,	O
BitTorrent	B-Protocol
,	O
IMAP	B-Protocol
,	O
IRC	B-Protocol
,	O
MSN	B-Protocol
,	O
and	O
others	O
.	O
</s>
<s>
A	O
comprehensive	O
comparison	O
of	O
various	O
network	O
traffic	O
classifiers	O
,	O
which	O
depend	O
on	O
Deep	B-Application
Packet	I-Application
Inspection	I-Application
(	O
PACE	O
,	O
OpenDPI	O
,	O
4	O
different	O
configurations	O
of	O
L7-filter	O
,	O
NDPI	O
,	O
Libprotoident	O
,	O
and	O
Cisco	O
NBAR	O
)	O
,	O
is	O
shown	O
in	O
the	O
Independent	O
Comparison	O
of	O
Popular	O
DPI	O
Tools	O
for	O
Traffic	O
Classification	O
.	O
</s>
<s>
There	O
is	O
a	O
greater	O
emphasis	O
being	O
placed	O
on	O
deep	B-Application
packet	I-Application
inspection	I-Application
-	O
this	O
comes	O
in	O
light	O
after	O
the	O
rejection	O
of	O
both	O
the	O
SOPA	B-Application
and	O
PIPA	O
bills	O
.	O
</s>
