gptkbp:instanceOf
|
computer networking
|
gptkbp:abbreviation
|
gptkb:DPI
|
gptkbp:analyzes
|
Packet Header
Packet Payload
|
gptkbp:block
|
Specific Content
|
gptkbp:canBe
|
gptkb:Parental_Control
Data Loss Prevention
Policy Enforcement
Bandwidth Management
|
gptkbp:canBeBypassedBy
|
gptkb:VPN
gptkb:tunnel
Encryption
Obfuscation Techniques
|
gptkbp:canInspect
|
gptkb:Layer_7
gptkb:Layer_3
Layer 2
Layer 4
|
gptkbp:canThrottle
|
Network Traffic
|
gptkbp:criticizedFor
|
gptkb:censorship
Surveillance
Privacy Concerns
|
gptkbp:detects
|
gptkb:Spam
malware
Viruses
Intrusions
|
gptkbp:hasFeature
|
Quality of Service
Traffic Shaping
|
https://www.w3.org/2000/01/rdf-schema#label
|
Deep Packet Inspection
|
gptkbp:implementedIn
|
Routers
Switches
Network Appliances
|
gptkbp:introducedIn
|
1990s
|
gptkbp:recognizedBy
|
Application Layer Protocols
|
gptkbp:relatedTo
|
gptkb:fire
gptkb:Network_Monitoring
Network Security
Packet Filtering
Net Neutrality
Content Filtering
|
gptkbp:usedBy
|
gptkb:Internet_Service_Providers
Governments
Enterprises
|
gptkbp:usedFor
|
gptkb:network_protocol
gptkb:Internet_Censorship
Data Mining
Intrusion Detection
Network Traffic Analysis
Lawful Interception
|
gptkbp:violatedBy
|
User Privacy
|
gptkbp:bfsParent
|
gptkb:Transparent_Proxy
|
gptkbp:bfsLayer
|
5
|