Embedded Systems Conference
Breaking News
News & Analysis

Benchmark for deep packet inspection

7/30/2010 04:01 AM EDT
More Related Links
View Comments: Newest First | Oldest First | Threaded View
User Rank
re: Benchmark for deep packet inspection
ahshabazz   8/3/2010 3:06:23 PM
Why not actually execute the instructions, right in the pipeline, along with having separate channels for instruction and data? I call this "threading". At least in this manner, through node emulation, the DPI can, through chaos-induced reconfigurable AI - quickly learn the essence of a threat, and any indication of packet nefariousness can be communicated back to the cloud. Better yet, once a suspect packet is found by the device, why not dump the entire subnet into emulation, as a quickly extant binary tree ( using minor delay ), until the payloads intentions are confirmed, or the packet reaches its destination. The packet stream could be "rebuilt" along the way, to do what they were intended to do, and subsequently dropped.

Mark Wehrmeister
User Rank
re: Benchmark for deep packet inspection
Mark Wehrmeister   7/31/2010 4:38:03 AM
It will be important for manufacturers to run the benchmarks frequently if the virus signatures will be changed often. It will not be enough to run the benchmarks only once prior to releasing a product because the continually changing benchmarks would make it impossible to compare products tested at different times. I hope the EMBC is taking into account the cost of running periodic tests and publishing the results.

Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Top Comments of the Week