Deep Packet Inspection. Definition Uses Privacy Concerns Neutrality Concerns.

Slides:



Advertisements
Similar presentations
Nicholas Weaver International Computer Science Institute
Advertisements

ITU-T 1 EU Commission Open Workshop – Identifying policy and regulatory issues of Next Generation Networks, Brussels 22 June 2005 Some comments on ITU-T.
© JANET(UK) 2011 Running a Public Communications Service Andrew Cormack Chief Regulatory Adviser, Janet
CC4100 Active Cellular Intercept Technologies
Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Net Neutrality presented by: Brian G. Riesen What Is It? Service providers should remain “end-to-end neutral” The Two Sides: Telecoms (against) View.
Net Neutrality1. Definition Net Neutrality can be broadly defined as the policy of Internet Service Provider’s (ISP’s) and Telecom Carriers treating all.
Network Neutrality By Ema Woodward, Phil Denny, & Scott Harrison.
Net Neutrality – An Overview – Bob Bocher Technology Consultant, WI Dept of Public Instruction, State Division for Libraries ,
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 E-Government PPA 490 Margaret Moorhead. 2 Introduction E-government – to deliver public services in a more convenient, customer oriented, cost effective,
Network neutrality is the idea that all internet traffic should be treated equally. It does not matter who is downloading and what is being downloaded.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All High Intelligent Network (Smart Pipe) Yuqing CHEN CCSA Document No: GSC16-PLEN-75 Source: CCSA Contact:
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
1 MTN Briefing to the Parliamentary Portfolio Committee on Home Affairs relating to Access to Adult Content 15 November 2005.
Association of Communications Engineers Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas.
Market Analysis Decision Group.
Comparing modem and other technologies
Enhancement of IPTV using a Wireless Sensor Network Sandeep Kakumanu,Sriram Lakshmanan, and Raghupathy Sivakumar GNAN Research Group Georgia Institute.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
© British Telecommunications plc Network Filtering.
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
Internet Packet Switching and Its Impact on the Network Neutrality Debate and the Balance of Power Between IP Creators and Consumers Rob Frieden, Pioneers.
THE BATTLE OVER NET NEUTRALITY
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
© 2009 Wipro Ltd - Confidential 1 Security Challenges and Opportunities -Indian ISP Scenario.
Overview of Network Neutrality Kyle D. Dixon Senior Fellow & Director, Federal Institute for Regulatory Law & Economics The Progress & Freedom Foundation.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Enabling Technologies (Chapter 1)  Understand the technology and importance of:  Virtualization  Cloud Computing  WAN Acceleration  Deep Packet Inspection.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Netowork Neutrality Does it Rock or Smell like Dirty Socks?
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
QoS for Broadband Services, Consumer Perspective and Regulatory Challenges BEREC – EMERG – E A P E R EG - REGULATEL S UMMIT CHALLENGES FOR TELECOMS IN.
The Mass Media Mass media – all the means for communicating any information to the general public. News media condense and clarify stories, alert the.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Network Neutrality Juergen Hahn MIS 304 November 23, 2010.
Domestic Surveillance By: Joshua Hedden. What is Domestic Surveillance? A legal investigative process entailing a close observing or listening to a person.
1 “Media and Sovereignty: The Global Information Revolution and Its Challenge to State Power” Monroe E. Price, Ch. 36, pp (Excerpted from Price,
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Cryptography and Network Security
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Net Neutrality and Quality of Service. OVERVIEW Transparency and more strict regulation IAS versus specialized services NN and monitoring of overall IAS.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Bellwork Think about this…. Historical Event
Surveillance around the world
Net Neutrality: WhaT YOU NEED TO KNOW
The FUTURE OF the internet
NET 536 Network Security Firewalls and VPN
Different Traffic Management Techniques for Mobile Broadband Networks
Basic Policy Overview Palo Alto.
Firewalls.
GetWired Internet Manager
High Intelligent Network (Smart Pipe)
Freedom of Speech … refers to the ability of a person to publicly speak or publish any thought without legal constraints or repercussions. In this section:
Using Software Restriction Policies
Presentation transcript:

Deep Packet Inspection

Definition Uses Privacy Concerns Neutrality Concerns

DPI – Definition Packet Inspection – looking at the header portion of a packet for security or analysis purposes.

DPI – Internet Packets & OSI Deep Packet Inspection (DPI) – Removes the header information from a packet to inspect the actual contents of the packet. Capable of inspecting layers 2 – 7 of the OSI model.

DPI – Potential Uses MarketingLoad Balancing Virus/Spam ProtectionCopyright Enforcement SurveillanceTiered Internet Access

DPI – Current Capabilities Targeted Advertising – The ability to deliver ad content based on a specific user’s browsing habits.

DPI – Current Capabilities P2P file sharing and streaming video represent nearly 60% of today's bandwidth Source:

DPI – Current Capabilities Bandwidth Optimization – Prioritizing certain network services over others to improve overall network performance. Tiered Broadband Services – The ability to fine tune services and restrictions on different levels of internet access.

DPI – Current Capabilities PlusNet Service Plans

DPI – Current Capabilities Lawful Intercept – The requirement of telecommunications systems to provide access to information to law enforcement agencies. DPI enables efficient lawful intercept of internet traffic.

DPI – Current Capabilities “The Great Firewall of China” – An effort by the Chinese government to block its citizens’ access to “subversive” material. Uses DPI, along with packet filtering, IP blocking, and URL filtering to restrict access to content.

DPI – Current Capabilities In 2004, Mark Klein, an AT&T technician, uncovered the existence of a secret room used by the NSA to intercept its network traffic.

DPI – Current Capabilities Narus ST-6400  Capable of 10G/s of analysis  CALEA-compliant

DPI – Current Capabilities Numerous lawsuits have since been filed, with no success, challenging the indiscriminate collection of domestic communications. In 2007, the FISA bill was amended to accommodate the collection of intelligence from those “reasonably believed” to be linked to Al- Qaeda or other terrorist groups. Telecoms like AT&T – which participated in the initial program – were granted immunity from civil liability.

DPI – Concerns Major Concerns:  Net Neutrality  Privacy  Legality

DPI – Net Neutrality “…the principle that Internet users should be in control of what content they view and what applications they use on the Internet” Practices of China represent an obvious threat to net neutrality – but what about “tiered” internet services?

DPI – Privacy Concerns 2006 – Phorm conducted a test of its services on 18,000 unwitting broadband subscribers 2008 – Investigation launched into the 2006 secret trials of the Phorm system. No charges filed since they provided an opt-out mechanism.

DPI - Summary