134k views
0 votes
Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scenario where the use of DPI may be considered a privacy concern.

1 Answer

2 votes

Answer:

Answered below

Step-by-step explanation:

Deep packet inspection is a kind of data processing that thoroughly inspects data sent over a computer network and acts on it by rerouting, logging or blocking it. Uses of DPI include;

To ensure that data is in the correct format, internet censorship, to check for malicious code, and also eavesdropping.

DPI uses port mirroring and optical splitter to acquire packets for inspection. It combines the functionality of an intrusion detection system and intrusion prevention system with a traditional stateful firewall.

DPI is therefore helpful in perimeter security by keeping unauthorized users out and at the same time protecting authorized users from attack. Privacy concerns have been raised over the inspection of content layers of internet protocols such as in the case of censorship and government regulations and control.

User Christos Baziotis
by
7.1k points