This method only works against known threats or attacks. The disadvantage of this approach is that its effectiveness depends on the signatures being updated regularly. It looks for specific patterns that are known to be malicious and blocks the traffic if it finds such a pattern. A firewall with IDS capability analyzes each packet against a database of known network attacks. The following are the three main techniques used in deep packet inspection: DPI is mainly used by firewalls with intrusion detection systems.
0 Comments
Leave a Reply. |