Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.

Slides:



Advertisements
Similar presentations
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Advertisements

Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
PowerPoint® Slides to Accompany
Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 19: Configuring Windows Firewall
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Department Of Computer Engineering
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Issues Raised by ICT.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Securing Information Systems
Market Analysis Decision Group.
Unit 4, Lesson 11 How Data Travels the Internet
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Anonymity, Security, Privacy and Civil Liberties
What is FORENSICS? Why do we need Network Forensics?
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Topics Communication Technology Internet Data Security Information Misuse Information Systems Technological Trends Impact of IT.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Deep Packet Inspection. Definition Uses Privacy Concerns Neutrality Concerns.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Surveillance around the world
Network Security Marshall Leitem 11/30/04
Firewalls.
Intercepting Communications
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Setting Up Firewall using Netfilter and Iptables
Firewall.
FIREWALL.
OSI Network Layer Presented By Dr. Waleed Alseat Mutah University.
Presentation transcript:

Deep Packet Inspection Matthew Carson

What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet as it passes an inspection point, which searches for protocol non-compliance, viruses, spam, intrusions or other specified criteria to determine whether the packet may pass through the inspection point or if it needs to be routed to a different destination.

How is it used? Network Security Network Optimization Copyright enforcement Data mining Eavesdropping Censorship

Why is it important?

How much data?? According to Intel In just 60 seconds, nearly 640 TB of IP data is transferred over the internet Amazon averages $83,000 in sales Google processes over 2 million search requests In one day, on average, nearly 900 Petabytes are sent over the internet

My information is protected… Right?

Electronic Communications Privacy Act of 1986 (ECPA) Prevents unauthorized interception of electronic communications Imposes civil liability upon those who do Includes traffic on the internet

Embarq & NebuAd In 2007 ISP Embarq authorized NebuAd to collect information about their customers Collected Browsing data as customers passed through network “checkpoints” Class Action Lawsuit filed November 2008

Legal vs Ethical

Court Ruling Embarq was not in violation of ECPA Embarq had “access” to the information through the use of devices used during the course of normal business operations Embarq had no access to the data apart from its access as an ISP

And NebuAd? SUBSEQUENTLY DISSOLVED AGREED TO A $2.4 MILLION DOLLAR SETTLEMENT ASSERTS NO WRONG DOING

Other Uses of DPI technology Security Dell utilizes a DPI technology known as Reassembly-Free Deep Packet Inspection (RFDPI) to monitor for viruses, malware, Trojans, etc. Internet Censorship China uses DPI to monitor and control the flow of information throughout the population CALEA

Communications Assistance for Law Enforcement Act (CALEA) Requires Telecommunications providers to provide the ability for law enforcement to intercept communications in the pursuit of criminal activity

Conclusion DPI is a powerful and necessary technology Mostly used for security purposes Can be misused, like all other technology Need for more detailed, up-to-date laws

References _Enforcement_Act Inspection.html nebuad-hides-link-in-5000-word-privacy-policy rt-rules-for-isp-in-deep-packet-inspection-lawsuit

References lights-nebuad m internet-640tb-data-transferred-100k-tweets-204-million- s- sent.html