{"id":8635,"date":"2012-12-07T18:17:21","date_gmt":"2012-12-08T00:17:21","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=8635"},"modified":"2012-12-07T18:17:21","modified_gmt":"2012-12-08T00:17:21","slug":"itus-deep-packet-snooping-standard-leaks-online","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=8635","title":{"rendered":"ITU&#8217;s deep packet snooping standard leaks online"},"content":{"rendered":"<blockquote><p>The standard describes itself as applicable to \u201capplication identification, flow identification, inspected traffic types\u201d \u2013 which The Register would highlight as the most sensitive functions \u2013 along with how DPI systems manage signatures, report to network management systems, and interact with their policy engines.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.theregister.co.uk\/2012\/12\/06\/dpi_standard_leaked\/?utm_source=twitterfeed&amp;utm_medium=twitter\">Revealed: ITU&#8217;s deep packet snooping standard leaks online \u2022 The Register<\/a>.<\/p>\n<blockquote><p>The ITU has now <a href=\"http:\/\/itu4u.wordpress.com\/2012\/12\/06\/data-deluge-motivates-itu-standard-on-deep-packet-inspection\/\">announced<\/a> that the DPI standard has been approved. Its announcement spins the standard in the direction of performance management, managing not to dwell on unwelcome issues such as BitTorrent or VoIP blocking.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The standard describes itself as applicable to \u201capplication identification, flow identification, inspected traffic types\u201d \u2013 which The Register would highlight as the most sensitive functions \u2013 along with how DPI systems manage signatures, report to network management systems, and interact &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=8635\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[823,675,190],"class_list":["post-8635","post","type-post","status-publish","format-standard","hentry","category-technical","tag-dpi","tag-itu","tag-standards"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/8635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8635"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/8635\/revisions"}],"predecessor-version":[{"id":8636,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/8635\/revisions\/8636"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8635"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}