What is Deep Packet Inspection (DPI)? (2024)

By

  • Rahul Awati
  • Jessica Scarpati

What is deep packet inspection (DPI)?

Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. It is a form of packet filtering that locates, identifies, classifies and reroutes or blocks packets with specific data or code payloads that conventional packet filtering, which examines only packet headers, cannot detect.

Usually performed as part of a firewall defense, deep packet inspection functions at the application layer of the Open Systems Interconnection (OSI) reference model.

How does deep packet inspection work?

Deep packet inspection examines the contents of packets passing through a given checkpoint and makes real-time decisions depending on what a packet contains and based on rules assigned by an enterprise, an internet service provider or a network manager.

Previous forms of packet filtering only looked at packet header information, which is analogous to reading an address printed on an envelope without any knowledge of the contents of the envelope. This was due partly to the limitations of older technology.

Until recently, firewalls did not have the processing power necessary to perform deeper inspections on large volumes of traffic in real time. Technological advancements have enabled DPI to perform more advanced inspections so that it can check both packet headers and data.

DPI can examine the contents of a message and identify the specific application or service that sent it. In addition, filters can be programmed to look for and reroute network traffic from a specific Internet Protocol address range or a certain online service, such as Facebook or Twitter.

What are common uses and applications of deep packet inspection?

DPI is mainly used by firewalls that include an intrusion detection system feature and by standalone IDSes that are intended to both detect attacks and protect the network.

It can be used for benevolent purposes as a network security tool to detect and intercept viruses, worms, spyware and other forms of malicious traffic and intrusion attempts. But it can also be used for more nefarious activities, like eavesdropping and state-sponsored censorship.

Deep packet inspection is also useful for network management and content policy enforcement to stop data leaks and to streamline or modify the flow of network traffic as per specific use cases. For example, a message tagged as high-priority can be routed to its destination ahead of less important or lower-priority messages or packets. DPI can also be used to throttle data transfers to prevent peer-to-peer abuse and thus improve network performance.

Because DPI makes it possible to identify the originator or recipient of content containing specific packets, it has sparked concern among privacy advocates and opponents of net neutrality.

What is Deep Packet Inspection (DPI)? (1)

What are limitations of deep packet inspection?

Deep packet inspection has three significant limitations:

  1. It can create new vulnerabilities in the network, even as it provides protection against existing vulnerabilities. While effective against buffer overflow attacks, denial-of-service attacks and certain types of malware, DPI can also be exploited to facilitate attacks in those same categories.
  2. DPI adds to the complexity and unwieldy nature of existing firewalls and other security-related software. And, to remain optimally effective, DPI requires periodic updates and revisions, which can increase the administrative burden for security teams.
  3. DPI can reduce network speed and performance because it creates network bottlenecks and increases the burden on firewall processors for data decryption and inline inspection.

Despite these limitations, many network administrators have embraced deep packet inspection technology to cope with the increase in the volume, complexity and frequency of internet-related threats.

What is Deep Packet Inspection (DPI)? (2)

Deep packet inspection techniques

The following are the three main techniques used in deep packet inspection:

  1. Pattern or signature matching. A firewall with IDS capability analyzes each packet against a database of known network attacks. It looks for specific patterns that are known to be malicious and blocks the traffic if it finds such a pattern. The disadvantage of this approach is that its effectiveness depends on the signatures being updated regularly. This method only works against known threats or attacks. As new threats are discovered daily, ongoing signature updates are critical to ensure that the firewall can detect the threats and continue to protect the network.
  2. Protocol anomaly. The protocol anomaly method -- again, used by firewalls with an IDS -- doesn't have the inherent weakness of the pattern/signature matching method because it doesn't simply allow all content that doesn't match the signature database. Rather, it follows a default deny approach. The firewall determines which content/traffic should be allowed based on protocol definitions. Thus, unlike signature matching, this method also protects the network against unknown attacks.
  3. Intrusion prevention system (IPS). IPS solutions can block detected attacks in real time by preventing malicious packets from being delivered based on their contents. Thus, if a particular packet represents a known security threat, the IPS will proactively deny network traffic based on a defined rule set. One drawback of IPS is that the cyberthreat database must be regularly updated with information about new threats. The risk of false positives is also high but can be mitigated by establishing proper baseline behaviors for network components, creating conservative policies and custom thresholds, and regularly reviewing alerts and logged incidents to improve monitoring and alerting.

Deep packet inspection versus conventional packet filtering

In a network, each data packet comes with a header that provides basic information about its sender, intended recipient and the time it was sent. Conventional packet filtering can only read this information. This is the traditional approach used by older firewalls since they were incapable of processing other types of data quickly enough to avoid adversely affecting network performance.

With deep packet inspection, firewalls can overcome those shortcomings for more comprehensive, real-time packet inspection. This enables them to extract or filter information beyond packet headers for more proactive and advanced network monitoring and protection. Within the constantly expanding cyberthreat landscape, DPI is a powerful aspect of the network security ecosystem.

This was last updated in September 2021

Continue Reading About deep packet inspection (DPI)

  • How to deploy deep packet inspection in the cloud
  • 6 firewall selection criteria to purchase NGFWs
  • How can organizations address VoIP security threats?

Related Terms

network orchestration
Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network ...Seecompletedefinition
network scanning
Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...Seecompletedefinition
programmable logic controller (PLC)
A programmable logic controller (PLC) is a small, modular, solid-state computer with customized instructions for performing a ...Seecompletedefinition

Dig Deeper on Network management and monitoring

  • Arista adds network change analysis to CloudVisionBy: AntoneGonsalves
  • firewallBy: KinzaYasar
  • network analyzer (protocol analyzer or packet analyzer)By: AndrewFroehlich
  • next-generation firewall (NGFW)By: CaseyClark
What is Deep Packet Inspection (DPI)? (2024)

FAQs

What is a DPI inspection? ›

Deep packet inspection (DPI), also known as packet sniffing, is a method of examining the content of data packets as they pass by a checkpoint on the network.

What does DPI mean in access control? ›

3) DPI (Door Position Indicator)

As the name suggests, the DPI is an optional system component that allows the access controller to understand if a door is open or closed.

What is DPI in LTE? ›

Broadly speaking, DPI refers to services based on inspecting the contents of packets. Usually this inspection is done for the purpose of understanding which application is creating the traffic – whether it is a VoIP packet, a P2P application, e-mail or a Web page download.

What is DPI code? ›

Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. It is a form of packet filtering that locates, identifies, classifies and reroutes or blocks packets with specific data or code payloads that conventional packet filtering, which examines only packet headers, cannot detect.

What is the DPI method of inspection? ›

DPI is a cost-effective and straightforward method of inspection that requires minimal equipment compared to other NDT methods. The process can quickly identify surface cracks, porosity, laps, and lapses, making it ideal for inspecting components such as welds, castings, and forgings.

What is deep packet inspection used for? ›

Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly.

What does DPI mean? ›

DPI stands for Dots per Inch, referring to the number of ink droplets a printer will produce per inch while printing an image.

What does DPI stand for in data? ›

Dots per inch (DPI, or dpi) is a measure of spatial printing, video or image scanner dot density, in particular the number of individual dots that can be placed in a line within the span of 1 inch (2.54 cm).

What is the use of DPI? ›

A dry powdered inhaler (DPI) is an asthma treatment option for older kids and teens. Using a dry powdered inhaler allows medicine to get deep into the lungs. Unlike other inhalers which deliver a puff of medicine, these inhalers hold the medicine as a dry powder.

Is deep packet inspection worth it? ›

1. Deep packet inspection is very effective in preventing attacks such as denial of service attacks, buffer overflow attacks, and even some forms of malware. But it can also be used to create similar attacks.

How to disable deep packet inspection? ›

To disable DPI on the specific traffic, follow the steps as below: Step 1. In web management interface, navigate to Policies > Rules and Policies > Access Rules. Click Add and Add Rule window will be displayed or Click Edit to modify the existing rule.

What is DPI testing? ›

Dye Penetrant Inspection (DPI) is widely used to detect surface breaking flaws. This non-destructive testing technique, also known as liquid penetrant inspection (LPI), is a cost-effective method used to locate surface breaking flaws such as cracks, porosity, laps, seams and other surface discontinuities.

What is DPI during production inspection? ›

During Production Inspections are quality control measures that are conducted at various stages of the manufacturing process to ensure that the final product meets the required quality standards.

What is the difference between DPI and IPS? ›

DPI: Provides in-depth analysis of transferred data by extracting information such as URLs, email content, file types, etc. DPI is commonly used to enforce policies, such as blocking certain websites or applications. IPS: Prevents attacks by taking immediate automated actions such as blocking or modifying traffic.

What is DPI tracking? ›

DPI - Dots per Inch. The standard used to measure the mouse sensitivity. It's the resolution of the mouse which can track certain dots per square inch. E.g. if the mouse supports 1200 dpi means it senses and read 1200 × 1200 dots in a square of 1 inch × 1 inch.

Top Articles
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 5519

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.