Abstract
Deep Packet Inspection (DPI) remains a critical technique for network traffic analysis, enabling comprehensive examination of both packet headers and payload content for security, policy enforcement, and traffic management. As network threats become more complex, especially with deepfake-based social engineering attacks, there is a crucial need to advance DPI capabilities through the development of intelligent firewalls that integrate machine learning (ML) for real-time threat detection. This paper advances the state-of-the-art in DPI research through three key contributions. First, it proposes a novel taxonomy that systematically distinguishes between traditional DPI techniques and ML DPI techniques, and highlights their respective strengths, limitations, and applicability. Second, it presents a comparative performance evaluation of ML models across multiple benchmark datasets and the evaluation offers insights into their practical deployment in real-world environments. Third, the paper explores emerging trends in DPI, including hybrid analytical approaches and methods to inspect encrypted traffic. Furthermore, it outlines strategic future directions, such as incorporating deepfake detection into DPI frameworks for improving data governance, and embedding explainable artificial intelligence (XAI) for transparent and trusted decision-making. These contributions collectively provide a forward-looking perspective on the integrated role of DPI and ML in next-generation cybersecurity systems.
| Original language | English |
|---|---|
| Title of host publication | Availability, Reliability and Security |
| Editors | Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter |
| Place of Publication | Cham |
| Publisher | Springer Nature Switzerland Cham |
| Pages | 185-202 |
| Number of pages | 18 |
| ISBN (Print) | 978-3-032-00639-4 |
| Publication status | Published - Aug 2025 |
Fingerprint
Dive into the research topics of 'A Review of Deep Packet Inspection for Network Security: From Traditional Techniques to Machine Learning Integration'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver