Whitepaper - Deep Packet Inspection - Technology, Applications & Net Neutrality
Whitepaper - Deep Packet Inspection - Technology, Applications & Net Neutrality
Deep packet inspection has been subject to controversial debates about network neutral-
ity and online privacy for the last few years. In this white paper we will argue that DPI as
such is a neutral, neither good nor bad technology, and that it depends on the applica-
tion that utilizes DPI if and how it will affect the Internet and our society. This paper will
focus on Internet bandwidth management based on DPI. Interestingly, the technology has
been around in other applications such as firewalls and virus scanners for much longer
without sparking similar controversy. After a simple technical explanation of what DPI is
– and what it is not –, we will straighten some myths and untruths. Future discussions,
particularly in the area of bandwidth management, should not focus on DPI as a tech-
nology, but on its specific applications. To facilitate these discussions, we will propose a
simple system of categories that classify different Internet traffic management schemes
according to their impact on net neutrality, market competition and online privacy.
This white paper aims to contribute to this debate by first Technical Background: What Is DPI?
clarifying the technological background from the perspec-
tive of a vendor of networking products based on DPI tech- At first glance, a technical definition of deep packet inspec-
nology, and by second discussing the potential impact the tion is straightforward to write down and in fact very sim-
widespread deployment of DPI applications may have on ple. DPI systems inspect entire packets traveling the network
the Internet and society. as part of a communication, looking not only at packet
headers like legacy systems, but also at the packet’s pay-
Critics often mix up DPI with a network service or function load.
using DPI as its base technology. Examples of network func-
tions using DPI include spam and virus filters, intrusion de- The central point of this definition is the inspection of packet
tection and prevention systems (IDS/IPS), and firewalls, all payload. While this seems to be quite clear, both terms
of which have been around for many years. And there has require a closer look, not least because this payload inspec-
hardly been a debate about the perils of any of these. So tion constitutes the main draw for criticism of DPI technol-
what is happening in the DPI discussion? ogy. The key problem is that Internet packets do not have
only a single header plus payload. Instead, there is a
The target of it was not so much DPI, but Internet traffic packet header and payload at each layer of the multi-layer
management based on DPI as a new network function – yet Internet architecture that can be found in each network-
another application using DPI. The core claims of its oppo- connected host. A detailed discussion of this header-
nents is the alleged violation of privacy and net neutrality. payload dilemma can be found in the boxed text on the
In fact there are other DPI-based network functions that following page.
could be seen even more critical than traffic management.
Deep Packet Inspection – Technology, Applications & Net Neutrality
The most useful definition is based on the demarcation line Nevertheless, the IP header boundary is the most commonly
between IP header and IP payload. It is also used in used limit for packet inspection and is frequently cited by
Wikipedia’s definition of DPI 1: DPI opponents. It is a sensible and understandable position,
“Deep Packet Inspection (DPI) is the act of any IP net- and even if one choses to deviate from it, it is still a useful
work equipment which is not an endpoint of a commu- baseline and starting point for any DPI discussion. We will
nication using any field other than the layer 3 destina- indeed go beyond this very restricted understanding of
tion IP [...]. [...] This is in contrast to shallow packet what inspection operations should be allowed for a packet
inspection (usually called Stateful Packet Inspection) in transit. Exactly how deep a DPI system has to look, and
which just checks the header portion of a packet.” what data it needs to gather, strongly depends on the ap-
plication or network function that it is used for.
This many-headers dilemma can be confusing, which be-
comes apparent in the contradiction in the above definition. Myths and Wrong Analogies
Its second sentence implies that stateful packet inspection is
the same as shallow inspection. However, stateful inspec- Analogies are a favorite instrument to illustrate technical
tion – or filtering –, as it is commonly deployed in pretty matters for a non-technical audience. It is often a challenge
much all of today’s firewalls, keeps track of network con- to get them right. And sometimes a poor analogy is inten-
nections or flows by grouping all packets with the same 5- tionally used to convey a personal opinion instead of tech-
tuple {source IP, destination IP, source port, destination port, nical facts – or worse, to evoke fear, uncertainty and doubt.
layer-4 protocol}. Port numbers are encoded in the TCP and One such analogy has enjoyed particular popularity in the
UDP headers, which are part of the IP payload. This would recent debate about DPI. In its “Memorandum Opinion and
be a clear violation of the first statement. Order” from 1 August 2008 2, the FCC states:
1
http://en.wikipedia.org/wiki/Deep_packet_inspection, retrieved 1 September 2009
2
Document: http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-08-183A1.pdf, linked from
http://www.fcc.gov/Document_Indexes/WCB/2008_index_WCB_Order.html, row FCC-08-183, retrieved 1 September 2009
2 © ipoque 2009
White Paper
“[...] Comcast opens its customers’ mail because it Internet for many years without drawing much criticism.
wants to deliver mail not based on the address or type Here is a short list of examples:
of stamp on the envelope but on the type of letter con- ◦ E-mail spam filtering
tained therein.” ◦ Anti-virus filtering for e-mail and other Internet content
Later in the same document, a statement by then FCC ◦ Intrusion detection and prevention systems (IDS/IPS)
chairman Kevin J. Martin begins with: ◦ Firewalls
◦ Content caching systems (e.g. for Web pages)
“Would it be OK if the post office opened your mail,
◦ Network probes for network monitoring and trouble-
decided they didn’t want to bother delivering it, and hid
shooting
that fact by sending it back to you stamped ‘address
unknown –return to sender’? Or would it be OK, when All these technologies have a certain misuse potential as
someone sends you a first class-stamped letter, if the they all have access to user content data. DPI-based traffic
post office opened it, decided that because the mail management is just another DPI application on this list and
truck is full sometimes, letters to you could wait, and should be treated as such.
then hid both that they read your letters and delayed
them?
Bandwidth Management –
Unfortunately, that is exactly what Comcast was doing
A DPI Application
with their subscribers’ Internet traffic.”
DPI in bandwidth management systems does not read all The Big QoS Failure
packets. Instead, it only scans for patterns in the first few
It is common knowledge that different network applications
packets of each network flow – about 1-3 packets for unen-
have varying quality of service (QoS) requirements. For
crypted and 3-20 packets for encrypted communication
instance, Internet telephony and online games work best
protocols. The rest is done by a flow tracking – or stateful
under low-latency, low-jitter conditions, but consume little
filtering as known from firewalls. Scanning all packets of a
bandwidth. Large downloads are nearly unaffected by la-
flow would be both unnecessary and rather expensive.
tency and jitter and only need as much bandwidth as pos-
If one really wants to use the ‘reading of letters’ analogy, it sible.
should be postcards instead of letters, and the ‘reader’
Unfortunately, the Internet has so far failed to bring about
should be one who does not understand the language of
QoS support. Not that there have been no attempts. ATM3
the letter and who only scans certain parts of the contents
tried to solve this issue by overturning the entire architecture
for matching symbols from a list of symbols – or patterns. It
of the Internet – and failed due to its overwhelming com-
is important for our discussion to understand that DPI is not
plexity. Then, extensions to TCP/IP were proposed, most
automatically a privacy violation.
prominently Integrated Services (IntServ) and Differentiated
Services (DiffServ). The more comprehensive IntServ failed
Applications and Systems Using DPI
for its poor scalability. The simpler DiffServ failed because it
Interestingly, there have been DPI-based applications and would have required the support by all router hops of an
network functions deployed in many places across the end-to-end communication path, hence the cooperation of
3
ATM: Asynchronous Transfer Mode is a standards suite developed by the International Telecommunications Union (ITU) and the ATM
Forum (an industry consortium) with the ultimate goal to replace the entire Internet infrastructure from the core to the end system, includ-
ing the TCP/IP protocol suite that is the very basis of the Internet.
3
Deep Packet Inspection – Technology, Applications & Net Neutrality
all network operators along the path – something which is sizes, per-flow data and packet rates, number of flows
and will be difficult to achieve. and new flow rate per application.
◦ Statistical analysis:
All these legacy mechanisms for providing QoS guarantees
the calculation of statistical indicators that can be used
to certain types of network traffic relied on marking of spe-
to identify transmission types (e.g. real-time audio and
cific requirements by the end points. Basically, the sending
video, chat, or file transfer), including mean, median
application would mark a certain packet as, for instance,
and variation of values collected as part of the behav-
real-time traffic (i.e. requiring low latency and jitter) with a
ioral analysis, and the entropy of a flow.
certain data rate profile. All intermediate routers would
then assign the marked packets to a separate queue that Once the classification has been done, bandwidth man-
gets special treatment according to the required QoS pro- agement systems installed at those points in the network
file. As mentioned above, one challenge that prevented that that will most likely become a bottleneck during periods of
approach from being widely implemented is the missing high network load can at least provide ‘soft’ QoS guaran-
cooperation among all network operators. A second prob- tees similar to what DiffServ could have offered. ‘Soft’
lem for such an implementation would be the proper mark- means that the guarantees would only be network-local to
ing of network traffic. The routers along the path would where the bandwidth management system is deployed.
have to rely on the marking as set by the sending applica- While this falls short of providing full, end-to-end QoS sup-
tion. Without any additional access policing at the network port, it can solve the most common problems in today’s
edge, mismarkings cannot be avoided and can potentially Internet infrastructure: congestions in network access links
mess up the QoS guarantees for an entire traffic class (e.g. at the edge (i.e. at the DSLAM or CMTS level), and at tran-
if a large download would be marked as time-sensitive sit and peering points.
voice traffic).
The following list gives some examples of potential uses for
DPI-based bandwidth management. More can be found in
DPI Bandwidth Management
the last part of this paper.
DPI can effectively solve the traffic marking problem by its
◦ Prioritize interactive real-time applications such as Inter-
capability to classify network flows according to the com- net telephony, online gaming and remote access
municating application. This marking would be a network
◦ Rate-limit bandwidth-intensive applications such as large
function – as opposed to an end system function – and thus downloads from peer-to-peer (P2P) networks and Web-
be immune against intentional mismarkings. For this classi- based file hosting services during periods of congestion
fication to work reliably, DPI is a necessity. Inspecting
◦ Block access to undesired applications such as P2P file
headers only – looking at port numbers in TCP and UDP sharing in an enterprise environment
headers – does not yield a reliable protocol or application
classification anymore, as many modern applications use DPI bandwidth management is a rather new technology. A
dynamic ports or even ports that have traditionally been commonly cited reason is that powerful-enough hardware
used by other applications (e.g. Skype and other peer-to- to inspect the content of network packets has become
peer systems often used port 80 that is historically reserved available only in recent years. This is wrong. In fact, Inter-
for Web traffic). Note that even this type of header inspec- net data rates have been growing faster than the perform-
tion would already violate the above mentioned DPI de- ance of any other information technology, including CPU,
marcation line between IP header and payload. Interest- memory and bus systems. DPI would have been easier ten
ingly, this has never drawn any complaints from privacy or years ago using the then available technology than it is
net neutrality activists. today. No, the right reason for the advent of DPI bandwidth
management is the continuing increase of data rates along
The DPI-based protocol and application classification is with proprietary, non-standard applications that use arbi-
achieved using a number of different techniques: trary TCP and UDP ports for their data exchange, defying
◦ Pattern matching: legacy methods of application classification necessary for
the scanning for strings or generic bit and byte patterns network management, troubleshooting and capacity plan-
anywhere in the packet, including the payload portion, ning.
usually at fixed locations.
◦ Behavioral analysis: DPI & Encryption
the scanning for patterns in the communication behavior
It is a common claim that encryption and obfuscation pre-
of an application, including absolute and relative packet
vent DPI systems from being able to classify the encrypted
4 © ipoque 2009
White Paper
4
In January 2009, the European Advanced Networking Test Center (EANTC) conducted an independent test
of DPI system with special focus on the detection capabilities with respect to encrypted P2P protocols. The
results clearly showed that the three participating vendors had no difficulties with encryption. The test results
are available at Internet Evolution: http://www.internetevolution.com/document.asp?doc_id=178633.
5
Deep Packet Inspection – Technology, Applications & Net Neutrality
5
http://en.wikipedia.org/wiki/Net_neutrality, retrieved 1 September 2009
6 © ipoque 2009
White Paper
The simplest form of such an application-specific traffic Ultimately, the long-term solution to the net neutrality dispute
management would be the assignment of priorities to dif- is rather simple. Governments have to ensure a competitive
ferent application classes. A ruleset could for instance be: environment among service providers. And then, the market
◦ Internet telephony (e.g. SIP, H.323, Skype) gets the – including ISP subscribers – can and will decide.
highest priority
◦ Interactive applications (Web, instant messaging) get Privacy
high priority DPI as such has no negative impact on online privacy. It is,
◦ Non-interactive applications (FTP, e-mail) get normal again, only the applications that may have this impact.
priority Prohibiting DPI as a technology would be just as naive as
◦ High-bandwidth downloads (P2P file sharing, file host- prohibiting automatic speech recognition because it can be
ing6 ) get low priority used to eavesdrop on conversations based on content. Al-
It is important to understand that providing priorities to se- though DPI can be used as a base technology to look at
lected applications does not necessarily cause a service and evaluate the actual content of a network communica-
degradation. For instance, giving voice traffic a higher tion, this goes beyond what we understand as DPI as it is
priority than P2P will not at all affect the bandwidth avail- used by Internet bandwidth management – the classification
able to P2P. This is because only less than 1 percent of all of network protocols and applications. Other applications
Internet traffic is voice versus at least 50 percent P2P traffic. of DPI, for instance lawful interception and targeted injec-
The voice traffic increase will be unnoticeable and insignifi- tion of advertisements, do indeed go further, but they are
cant relative to the P2P traffic volume. The fear that low beyond the scope of this paper.
priority does automatically mean a slower application is Ultimately, it is again a matter of regulation and social dis-
unfounded. course to decide what levels of DPI and what applications
However, if there are two types of high-volume applica- are considered acceptable. But it is also naive to believe
tions, for instance P2P and Internet TV, then priorities can that intelligence services will refrain from using the latest
indeed have an adverse effect on the lower-priority applica- available technology for wiretapping. This, too, is a matter
tion. In the specific case of Internet TV, which requires a lot of regulation. Quis custodiet ipsos custodes?
of network resources, this is why most service providers
who offer such a service have chosen to build a separate Content-Specific Filtering
network dedicated to this service only. Filtering of data transfers based on their content is one ap-
plication where DPI goes beyond a simple protocol or ap-
Now even if everybody agreed that priorities are a good
plication classification. Here, not only the application or
idea, one open problem remains: who decides what appli-
communication protocol get classified, but the content that
cation gets what priority? One option would be to let users
is exchanged. After this classification, certain content types
pick their priorities themselves. This option has two prob-
may be blocked. Today, this type of content filtering is usu-
lems. First, it requires knowledge about the quality of serv-
ally limited to Web traffic and is only deployed in certain
ice requirements of applications and network protocols,
countries.
and second, users would most likely tend to over-prioritize
their own traffic. So the other option would be to have the This DPI application does indeed have a potential impact
Internet service provider assign priorities. Here it is impor- on net neutrality and freedom of speech and thus becomes
tant that assignments are not driven by the interests of a a matter of national – and maybe also international – legis-
certain ISP, but only by the QoS requirements of an applica- lation. Every country has its own rules on what is legal and
tion or application class. Even an international standardiza- what is not. Freedom of speech is not unconditional even in
tion process is conceivable. The same applies to bandwidth the USA, meaning there are limits to what kind of content
management that goes beyond simple priority management can legally be made publicly available. This kind of regula-
by assigning application-specific bandwidth guarantees. tion of course exists in most countries for non-Internet con-
tent. There are age ratings for movies, and one country
A totally different solution to this fairness problem among
would certainly not accept the categorization of another
users would be going back from flat rate Internet access
country. Access to movies is controlled based on these rat-
fees to volume-based billing. While this would provide for
ings. There is no similar classification scheme along with
maximum fairness among users – yes, there is a cost per
access control for Internet content. This is something we
transmitted byte! – and indeed most users, probably over
could see in the Internet of the future, and whether this is
80 percent, would financially benefit by paying less for
desirable or not needs to be decided by society.
their Internet access, it would also severely limit the Inter-
net’s potential to foster innovation.
6
“File hosting” refers to Web-based services that allow to upload files, including very large ones, and then provide a URL, or link, to that
file which can be shared with other users who can then simply download the file by following that link. These services are also known as
“direct download links” (DDL). The largest operators of such services currently are RapidShare and MegaUpload.
7
Deep Packet Inspection – Technology, Applications & Net Neutrality
8 © ipoque 2009
White Paper
We strongly believe that a more differentiated discussion The ISP offers its subscribers the ability to block access to
has been long overdue. For this reason we propose a clas- selected protocols, applications or even content as a man-
sification scheme with seven levels of bandwidth manage- aged service. Residential customers can use this feature for
ment – some involving DPI, some not. The following list is in parental control and enterprise customers for blocking of
ascending order according to a bandwidth management non-work-related applications. For example, residential
policy’s potential impact on net neutrality. All measures subscribers may chose to disable P2P file sharing to avoid
could be deployed separately or in combination. prosecution for copyright infringements done by their chil-
dren. The same could be done in a company network or at
Independent of the bandwidth management policy imple-
a public hotspot to avoid any liability issues for user activi-
mented by ISPs we strongly believe that this policy should
ties. Also, access to recreational applications (e.g. media
be openly communicated to customers and – more impor-
streaming, social networking sites, online games) could be
tantly – to prospective customers. This is also were legisla-
blocked for company staff.
tion, if deemed necessary, should put its focus on. Instead
of trying to define what kind of bandwidth management is Pros:
acceptable, it should enforce transparency and let the mar- ◦ Improved security and application control for Internet
ket do the regulation. users
◦ Protection against copyright liabilities
Best Effort Service ◦ Protection against application-specific attacks
This has been the status quo in the Internet since its incep- Cons:
tion. Every packet is treated equally independent of its type ◦ Requires DPI equipment
or content. In case of congestion at a particular router hop
along a network path, packets are randomly dropped de- Application-Aware Congestion Management
pending on their arrival time and router buffer occupancy. Based on the fact that certain QoS guarantees (e.g. mini-
Pros: mum available bandwidth, maximum delay and jitter,
◦ Provides maximum net neutrality according to some maximum packet loss) are more critical for some applica-
definitions tions than for others, an ISP implements a QoS manage-
◦ No additional implementation cost ment scheme taking into account the specific requirements
for an application or application class. In its simplest form,
Cons:
this could be a tiered priority scheme as in the following
◦ Prevents the implementation of QoS guarantees example:
◦ Unfair to the majority of network users
◦ Highest priority: network-critical protocols such as BGP,
ICMP, DNS, maybe TCP FIN and ACK packets
9
Deep Packet Inspection – Technology, Applications & Net Neutrality
In addition, bandwidth guarantees can be assigned per QoS Guarantees for Provider Services
application – either aggregated for an entire network or Triple play providers offering Internet, telephone and TV
even per individual subscriber or subscriber group. service over a single broadband connection need to ensure
Pros: that each of these application classes gets its required QoS
parameters. Some run entirely separated networks for each
◦ Better congestion protection
service so that there is no QoS interdependency between
◦ Better QoS for network users with the same available
bandwidth them and with third-party services. A less expensive way to
solve this problem is to simply prioritize VoIP over IPTV over
◦ Better resource utilization at the ISP which can mean
lower charges for Internet access service everything else that runs through a shared pipe. The priori-
tization only has an effect during network congestion, and
Cons: it would be limited to the ISP’s VoIP and IPTV services.
◦ Low priority applications will get slightly less bandwidth
in times of network congestion Higher priorities for a provider’s own service always has a
◦ Requires DPI equipment certain misuse potential. A priority advantage of the ISP’s
services over competing, over-the-top third-party services
Tiered Services and Pricing limits competition and could in turn drive up prices. A clear
regulation that defines how much resources can by used
Internet access fees have seen an evolution from online- exclusively by the infrastructure provider versus resources
time, over data volume charges, to today’s prevalent model that need to be available for third-party use would be de-
of flat rates that differ mostly by maximum access data sirable.
rates. Usage-based charges are still the norm in mobile
networks, but even in wireline networks they have reap- Pros:
peared in the discussion due to the huge disparity in data ◦ Guaranteed performance for providers’ business-critical
volumes between normal and heavy users. This is a bad applications
idea because – and this is a widely accepted assumption – ◦ Better resource utilization, which can potentially mean a
it would stifle innovation in the Internet. cheaper Internet access for subscribers
Cons:
A possible way out of this dilemma for ISPs and their sub-
scribers is an approach that strikes a balance between flat ◦ Misuse potential requires regulation
rates and usage-based charging. The basic idea is to offer ◦ Depending on the specific infrastructure, DPI equipment
customers a choice of which services they require from their may be required
ISP – and they are happy to pay for – and which they do
not. Below is a short list with examples of different services Revenue Protection and Generation
that could be offered by an ISP with such a tiered services An ISP blocks services that directly compete with its own,
and pricing model: revenue-generating product. If the ISP offers a triple-play
◦ A very cheap or ad-financed Web-only service package including VoIP and IPTV, and there is a usage-
◦ A cheaper service that excludes certain high-bandwidth based charge for instance for international calls, services
applications like Skype are a clear competitor and decrease the poten-
◦ In addition to the previous service, allow customers to tial revenues of the provider’s service. Free voice services
enable excluded services for an additional one-time fee have caused headaches particularly for mobile operators.
on demand via a customers portal Customers are asking for data flat rates, and the operators
◦ A more expensive all-inclusive service want to offer them for a fee to generate additional revenue,
◦ An expensive business service with QoS guarantees for but they fear that Skype and free SIP services will bite big
user-selected applications such as VoIP, the corporate chunks out of their normal voice revenues. This fear has so
VPN, and business-critical SaaS sites like Salesforce.com far limited the introduction of data flat rates in the mobile
Pros: market.
◦ Better, more flexible access services The networks of mobile operators are also more susceptible
◦ More fairness among subscribers (normal vs. heavy us- to congestion due to their limited capacity. A few P2P users
ers) can have a devastating effect on the performance of an
◦ Subscribers get more control over access fees entire network cell. Thus, providers may chose to exclude
high-bandwidth services that have a negative performance
10 © ipoque 2009
White Paper
Feedback Welcome!
The presented list is not meant to be complete, but as a
contribution to bring more structure into the public debate
about DPI Internet traffic management. Feedback and
comments are always welcome.
11
Deep Packet Inspection – Technology, Applications & Net Neutrality
Contact Contact:
ipoque BRAIN FORCE Software GmbH
Mozartstr. 3 Ohmstr. 12
D 04107 Leipzig 63225 Langen (near Frankfurt)
Germany Germany
Tel.: +49 (341) 59 40 30 Tel.: +49 (0)6103 906-767
Fax: +49 (341) 59 40 30 19 Fax: +49 (0)6103 906-789
12 © ipoque 2 0 0 9