• @binom
    link
    English
    61 year ago

    can you maybe link some ressources on how the protocol used can be detected? i did not know about this and would like to read into it some more :)

    • @[email protected]
      link
      fedilink
      English
      21 year ago

      Look up NBAR for the basic idea. Each vendor has their own ‘secret sauce’ implementation, Palo Alto only needs 9 bytes of payload for disambiguation, iirc.

      • @binom
        link
        English
        11 year ago

        thank you! so it is basically looking at identifiable patterns in the packet flow and matching them to protocols. i also found this paper about traffic identification interesting.

        • Meldroc
          link
          English
          21 year ago

          Time to up the spoofing game. Maybe some AI-generated traffic to throw off the packet analytics.