FINDING · DETECTION

Regex-based DPI is fundamentally vulnerable to format-transforming encryption: because every tested system (including the proprietary enterprise-grade DPI-X, rated for 1.5 Gbps at $8,000) classifies protocols solely by membership in a regular language, any ciphertext can be guaranteed to match any chosen regex. The paper argues this forces DPI to adopt machine learning, active probing, or non-regular semantic checks — but notes that making such checks fast, scalable, and low-false-positive at line rate for arbitrary target protocols remains an open problem.

From 2013-dyer-protocolProtocol Misidentification Made Easy with Format-Transforming Encryption · §3, §7 · 2013 · Computer and Communications Security

Implications

Tags

censors
generic
techniques
dpiml-classifieractive-probing
defenses
format-transform

Extracted by claude-sonnet-4-6 — review before relying.