{"id":82002,"date":"2024-06-19T13:00:00","date_gmt":"2024-06-19T13:00:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82002"},"modified":"2024-06-26T05:44:24","modified_gmt":"2024-06-26T05:44:24","slug":"deep-packet-inspection-analysis-examining-one-packet-killers","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/","title":{"rendered":"Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82002\" class=\"elementor elementor-82002\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7d1c57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7d1c57\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0ba424d\" data-id=\"0ba424d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8d48ed elementor-widget elementor-widget-text-editor\" data-id=\"b8d48ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: June 20, 2024<\/div><div><strong>Time<\/strong>: 4:30 PM CEST | 10:30 AM EDT | 8:00 PM IST<\/div><div><strong>Topic<\/strong>: Deep Packet Inspection Analysis: Examining One Packet Killers<\/div><div>\u00a0<\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Security Operations Center (SOC) teams monitor network traffic using SIEM and IPS solutions, along with other security tools. However, these tools can sometimes fall short in their capability, particularly when faced with complex attacks that exploit legitimate network protocols, such as a single, crafted packet. To combat these threats, SOC teams must adopt advanced techniques such as Deep Packet Inspection (DPI). The webinar explores DPI analysis techniques to detect and mitigate &#8220;One Packet Killers,&#8221; using real-world examples from DHCP, H.225.0, Modbus over TCP, WTP, and BAT_GW protocols. Furthermore, it examines the intricacies of each protocol and highlights how specific message manipulations within these protocols can activate Denial-of-Service (DoS) attacks or disrupt communication flows. By mastering DPI techniques and addressing these protocol security weaknesses, SOC teams can enhance their ability to maintain a robust network security posture.<br \/><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Understand how attackers exploit protocols with single packets and the limitations of IPS, WAF, and SIEM in detecting them.<\/li><li>Learn about &#8220;One Packet Killers&#8221; and how they bypass traditional security measures.<\/li><li>Grasp the importance of DPI analysis in identifying &#8220;One Packet Killers.&#8221;<\/li><li>Analyze &#8220;One Packet Killers&#8221; using examples from DHCP, H.225.0, Modbus\/TCP, WTP, and BAT_GW.<\/li><li>Implement monitoring techniques and learn mitigation strategies using DPI and protocol-specific anomaly detection.<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><strong><img decoding=\"async\" class=\" wp-image-59783 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Michal-Soltysik-scaled.jpg\" alt=\"David Pereira\" width=\"137\" height=\"197\" \/>Micha\u0142 So\u0142tysik<\/strong>, Deep Packet Inspection Analyst<br \/><strong>Bio:<\/strong> Micha\u0142 So\u0142tysik is a Deep Packet Inspection Analyst and Cybersecurity Consultant specializing in network edge profiling and 0-day attacks. With a focus on IT, OT, and IoT areas, he has identified around 254 protocols used for cyber-attacks. Micha\u0142 is also a skilled Digital and Network Forensics Examiner, a CyberWarfare Organizer, and a SOC Trainer, enhancing his cybersecurity roles with a broad range of expert knowledge.<br \/><strong>Certified as:<\/strong><\/p><ul><li>C|CSA &#8211; Certified Cyber Security Analyst<\/li><li><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">C|SA &#8211; Certified SOC Analyst\u00a0<\/span><\/li><li>C|NFE &#8211; Certified Network Forensics Examiner<\/li><li>C|DFE &#8211; Certified Digital Forensics Examiner<\/li><li>WCNA &#8211; Wireshark Certified Network Analyst<\/li><li>C|ND &#8211; Certified Network Defender<\/li><li>C|PTC &#8211; Certified Penetration Testing Consultant<\/li><li>C|PTE &#8211; Certified Penetration Testing Engineer<\/li><li>C|PEH &#8211; Certified Professional Ethical Hacker<\/li><li>C|VA &#8211; Certified Vulnerability Assessor<\/li><li>RvBCWP &#8211; Red vs Blue Cyber Warfare Practitioner<\/li><li>C|IoTSP &#8211; Certified Internet of Things Security Practitioner<\/li><li>OOSE &#8211; OPSWAT OT Security Expert<\/li><li>C|NSP &#8211; Certified Network Security Practitioner<\/li><li>C|NSE &#8211; Certified Network Security Engineer<\/li><li>C|CE &#8211; Certified Cybersecurity Expert<\/li><li>C|CSS &#8211; Certified Cyber Security Specialist<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/2KhJV4LGa5s?si=G7CzlI_B00k-jLMX\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 20, 2024Time: 4:30 PM CEST | 10:30 AM EDT | 8:00 PM ISTTopic: Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0 Watch Now Abstract: Security Operations Center (SOC) teams monitor network traffic using SIEM and IPS solutions, along with other security tools. However, these tools can sometimes fall short in their capability, particularly&hellip;<\/p>\n","protected":false},"author":32,"featured_media":82004,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82002","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Deep Packet Inspection: Mitigating One Packet Killers in Key Protocols<\/title>\n<meta name=\"description\" content=\"Learn how deep packet inspection can detect and mitigate &quot;One Packet Killers&quot; and enhance a SOC&#039;s ability to enhance network security in this expert-led webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0\" \/>\n<meta property=\"og:description\" content=\"Learn how deep packet inspection can detect and mitigate &quot;One Packet Killers&quot; and enhance a SOC&#039;s ability to enhance network security in this expert-led webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-19T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-26T05:44:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Deep-Packet-Inspection-Analysis.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0\",\"datePublished\":\"2024-06-19T13:00:00+00:00\",\"dateModified\":\"2024-06-26T05:44:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/\"},\"wordCount\":450,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Deep-Packet-Inspection-Analysis.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/\",\"name\":\"Deep Packet Inspection: Mitigating One Packet Killers in Key Protocols\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Deep-Packet-Inspection-Analysis.png\",\"datePublished\":\"2024-06-19T13:00:00+00:00\",\"dateModified\":\"2024-06-26T05:44:24+00:00\",\"description\":\"Learn how deep packet inspection can detect and mitigate \\\"One Packet Killers\\\" and enhance a SOC's ability to enhance network security in this expert-led webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Deep-Packet-Inspection-Analysis.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Deep-Packet-Inspection-Analysis.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-packet-inspection-analysis-examining-one-packet-killers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Deep Packet Inspection: Mitigating One Packet Killers in Key Protocols","description":"Learn how deep packet inspection can detect and mitigate \"One Packet Killers\" and enhance a SOC's ability to enhance network security in this expert-led webinar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/","og_locale":"en_US","og_type":"article","og_title":"Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0","og_description":"Learn how deep packet inspection can detect and mitigate \"One Packet Killers\" and enhance a SOC's ability to enhance network security in this expert-led webinar.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-06-19T13:00:00+00:00","article_modified_time":"2024-06-26T05:44:24+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Deep-Packet-Inspection-Analysis.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0","datePublished":"2024-06-19T13:00:00+00:00","dateModified":"2024-06-26T05:44:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/"},"wordCount":450,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Deep-Packet-Inspection-Analysis.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/","name":"Deep Packet Inspection: Mitigating One Packet Killers in Key Protocols","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Deep-Packet-Inspection-Analysis.png","datePublished":"2024-06-19T13:00:00+00:00","dateModified":"2024-06-26T05:44:24+00:00","description":"Learn how deep packet inspection can detect and mitigate \"One Packet Killers\" and enhance a SOC's ability to enhance network security in this expert-led webinar.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Deep-Packet-Inspection-Analysis.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Deep-Packet-Inspection-Analysis.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-packet-inspection-analysis-examining-one-packet-killers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Deep Packet Inspection Analysis: Examining One Packet Killers\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82002"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82002\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82004"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}