• @binom
    link
    English
    62 years ago

    can you maybe link some ressources on how the protocol used can be detected? i did not know about this and would like to read into it some more :)

    • @[email protected]
      link
      fedilink
      English
      22 years ago

      Look up NBAR for the basic idea. Each vendor has their own ‘secret sauce’ implementation, Palo Alto only needs 9 bytes of payload for disambiguation, iirc.

      • @binom
        link
        English
        12 years ago

        thank you! so it is basically looking at identifiable patterns in the packet flow and matching them to protocols. i also found this paper about traffic identification interesting.

        • Meldroc
          link
          English
          22 years ago

          Time to up the spoofing game. Maybe some AI-generated traffic to throw off the packet analytics.