{"guid":"import-b434c1bed6ba5d62df","title":"Techniken zur Identifizierung von Netzwerk-Protokollen","subtitle":null,"slug":"27c3-4097-de-identifizierung_von_netzwerkprotokollen","link":"http://events.ccc.de/congress/2010/Fahrplan/events/4097.en.html","description":"Der Vortrag soll Techniken aufzeigen, mit denen man Netzwerk-Protokolle identifizieren kann, die in Layer 7 des OSI-Modells angesiedelt sind. Alle Techniken - darunter auch die Deep Packet Inspection (DPI) - werden technisch erläutert und kritisch bewertet.\n","original_language":"eng","persons":["Florian Adamsky"],"view_count":204,"promoted":false,"date":"2010-12-28T01:00:00.000+01:00","release_date":"2011-01-04T01:00:00.000+01:00","updated_at":"2026-04-13T23:30:05.957+02:00","tags":["27c3"," Science"],"length":2657,"duration":2657,"thumb_url":"https://static.media.ccc.de/media/congress/2010/27c3-4097-de-identifizierung_von_netzwerkprotokollen.jpg","poster_url":"https://static.media.ccc.de/media/congress/2010/27c3-4097-de-identifizierung_von_netzwerkprotokollen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2010/import-b434c1bed6ba5d62df-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2010/import-b434c1bed6ba5d62df-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/27c3-4097-de-identifizierung_von_netzwerkprotokollen","url":"https://api.media.ccc.de/public/events/import-b434c1bed6ba5d62df","conference_title":"27C3: We Come In Peace","conference_url":"https://api.media.ccc.de/public/conferences/27c3","related":[{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":1},{"event_id":1441,"event_guid":"import-0ed61800336f786fca","weight":1},{"event_id":1444,"event_guid":"import-01fa9b6c433d8f94ff","weight":1},{"event_id":1447,"event_guid":"import-6b22151f92f9683519","weight":2},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":1},{"event_id":1458,"event_guid":"import-d91ee307eb6ced5743","weight":1},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":1},{"event_id":1467,"event_guid":"import-a8048485bc5b1c889d","weight":1},{"event_id":1473,"event_guid":"import-929c3529e5a0128662","weight":1},{"event_id":1504,"event_guid":"import-5fd47fda6b0beea4de","weight":1},{"event_id":1507,"event_guid":"import-5abb31379fa9080171","weight":1},{"event_id":1514,"event_guid":"import-277d479110cdedadc5","weight":2},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1626,"event_guid":"import-5df9e92b7e9a94d01d","weight":1},{"event_id":1639,"event_guid":"import-c1ae7fae8ec6c162b5","weight":1},{"event_id":1644,"event_guid":"import-7510d3224277db726d","weight":1},{"event_id":1653,"event_guid":"import-bd5d87a074dddac6bf","weight":2},{"event_id":1693,"event_guid":"import-49361059fb0ed0c492","weight":2},{"event_id":1697,"event_guid":"import-3d743102bd3d845235","weight":1},{"event_id":1698,"event_guid":"import-8ea249dc923ddef614","weight":1},{"event_id":1700,"event_guid":"import-badb660dc5d862b268","weight":1},{"event_id":1709,"event_guid":"import-8f293c99e8d1851518","weight":1},{"event_id":2225,"event_guid":"_jFN0YWHACogrN4ddVWK0Q","weight":2},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":1},{"event_id":3619,"event_guid":"84ce6d72-3f4f-445b-801e-37f6a1331bed","weight":1}],"recordings":[{"size":385,"length":2657,"mime_type":"audio/ogg","language":"eng","filename":"27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:52.661+02:00","recording_url":"https://cdn.media.ccc.de/congress/2010/ogg-audio-only/27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg","url":"https://api.media.ccc.de/public/recordings/2806","event_url":"https://api.media.ccc.de/public/events/import-b434c1bed6ba5d62df","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":385,"length":2657,"mime_type":"video/mp4","language":"eng","filename":"27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4","state":"downloaded","folder":"mp4-h264-HQ","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:43.507+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/mp4-h264-HQ/27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4","url":"https://api.media.ccc.de/public/recordings/2805","event_url":"https://api.media.ccc.de/public/events/import-b434c1bed6ba5d62df","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":385,"length":2657,"mime_type":"video/webm","language":"eng","filename":"27c3-4097-de-identifizierung_von_netzwerkprotokollen.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:43.531+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/webm/27c3-4097-de-identifizierung_von_netzwerkprotokollen.webm","url":"https://api.media.ccc.de/public/recordings/2804","event_url":"https://api.media.ccc.de/public/events/import-b434c1bed6ba5d62df","conference_url":"https://api.media.ccc.de/public/conferences/27c3"}]}