This classification information is then merged with traffic metadata to establish various performance parameters such as speed, jitter and latency. Traffic patterns are also used to identify traffic that is malicious, suspicious and anomalous traffic.
How DPI analytics break down application complexities
Let us take the example of Facebook. Around 1.9 billion people use Facebook daily.8 Facebook traffic peaks on Wednesdays, from 9am to 1pm. As networks wake up to a new day, they will find a steady stream of traffic heading towards Facebook servers as users log into their accounts and start watching reels, browsing their feed, uploading photos and commenting on friends’ posts.
To monitor and manage these sessions, networks need to identify not only the applications they are handling, but a deeper set of data relating to each application as well. The DPI engines R&S®PACE 2 and R&S®vPACE provide these insights, illustrated in the following Facebook example:
- Application protocols: e.g., HTTP(S), own proprietary Facebook protocol, QUIC
- Applications: e.g., Facebook, Facebook Lite or Facebook Messenger
- Application attributes: e.g., video, audio or live broadcasting
This level of analytical depth fuels a truly dynamic response to network events. Mobile operators bundling unlimited Facebook access in their data plans will prioritize Facebook traffic, knowing how it drives subscription and customer satisfaction. Segregation of Facebook traffic by service types, such as video, audio or live broadcasting, also allows networks to queue or cache video traffic to make more space for its other feed.
Through combining traffic classification with traffic parameters, operators can flex their networks even further. Where speeds and performance of other applications on the network take a hit due to Facebook traffic, operators can reallocate bandwidth in real-time and ensure no major degradations in service.
This is not all. The threat awareness of the DPI technology from ipoque can easily pinpoint the exact network subscriber that is involved in a DDoS attack or in the transfer of malicious content. This ramps up protection against threats hidden in any application.
Same insights, different actions
Policy responses to the same application insights can be different across networks. A corporate network will offload all social media traffic, including Facebook, onto standard internet links. This leaves premium routes for business-critical applications. An enterprise can also enforce rules that only allow Facebook Lite on its official devices to alleviate congestion on LAN and WAN. Similarly, DPI analytics can be used to impose parental control on Facebook usage within a home network.
Built-in quality assurance
Staying ahead of changes in the app universe requires a lot of effort. At ipoque, we take pride in our expertise, continuous R&D and built-in quality assurance (QA) which ensure that we have the most comprehensive, accurate and updated signature library. We conduct robust testing, generating more than 1000 traces every week from various nodes globally. These traces add to our 3.3 terabytes of test material which we use to train and perfect our classification models. Using automated regression testing executed in the CI/CD pipeline, we validate each code merge against our test material, up to 100 times a week. This ensures our DPI software remainr highly accurate and updated.
We also ensure adequate coverage for all network types and scenarios. For mobile traffic specifically, we leverage our mobile application framework (MAF) which processes traffic from 150 high-priority applications. This allows applications such as Samsung TouchWiz Home, Gmail and Google Maps9 to be continuously monitored and reflected accurately in our weekly software updates.
Seamless tech
On top of all this, our DPI engines are easily deployed. With linear scalability of 14 Gbit/s per core on average for R&S®PACE 2 and 35 Gbit/s per core on average for R&S®vPACE, the DPI technology by ipoque can be integrated into any networking or cybersecurity solution across traditional, virtualized and cloud environments. Both of our engines come with encrypted traffic intelligence and boast advanced features such as first-packet classification, mobile tethering detection or custom service classification that enables you to implement your own DPI signatures by using easy, pre-defined criteria to smoothly extend network visibility on-the-fly. Leveraging these advancements, our deep industry expertise and 24/7 support, we ensure networks are adequately equipped with the network intelligence they need to ensure a smooth app experience at all times.
Sources
[1] https://www.edudwar.com/list-of-most-popular-apps-in-the-world/
[2] https://backlinko.com/facebook-users
[3] https://worldpopulationreview.com/
[4] https://www.demandsage.com/youtube-stats/
[5] https://verloop.io/blog/whatsapp-statistics-2023
[6] https://www.edudwar.com/list-of-most-popular-apps-in-the-world/
[7] https://blog.apptopia.com/worldwide-and-us-download-leaders-2022
[8] https://backlinko.com/facebook-users
[9] https://www.data.ai/en/apps/unified-app/top/active-user/worldwide