{"id":13062,"date":"2016-10-04T18:08:50","date_gmt":"2016-10-04T15:08:50","guid":{"rendered":"https:\/\/vasexperts.com\/?p=13062"},"modified":"2025-08-18T18:36:22","modified_gmt":"2025-08-18T15:36:22","slug":"traffic-classification-and-deep-packet-inspection","status":"publish","type":"post","link":"https:\/\/vasexperts.com\/br\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/","title":{"rendered":"Classifica\u00e7\u00e3o de tr\u00e1fego e Deep Packet Inspection"},"content":{"rendered":"Embora n\u00e3o haja problemas com redes locais (LANs) devido \u00e0 sua alta largura de banda, a largura de banda limitada dos canais de acesso \u00e0 Internet (WANs) requer um ajuste fino.\r\n\r\n<h2>Classifica\u00e7\u00e3o e marca\u00e7\u00e3o<\/h2>\r\nA presta\u00e7\u00e3o de servi\u00e7os de acesso \u00e0 Internet \u00e9 orientada para o usu\u00e1rio, e o mais importante \u00e9 a percep\u00e7\u00e3o do usu\u00e1rio sobre a qualidade do servi\u00e7o: a Internet n\u00e3o deve \u201cficar lenta\u201d, os aplicativos devem responder rapidamente aos comandos, os arquivos devem ser baixados rapidamente e as chamadas de voz n\u00e3o devem apresentar falhas, caso contr\u00e1rio, o usu\u00e1rio come\u00e7ar\u00e1 a procurar outro provedor de servi\u00e7os. O gerenciamento do tr\u00e1fego do canal de acesso \u00e0 Internet, as configura\u00e7\u00f5es de restri\u00e7\u00e3o e as prioridades devem atender aos requisitos do usu\u00e1rio. As informa\u00e7\u00f5es sobre protocolos e aplicativos tamb\u00e9m permitem que o administrador implemente pol\u00edticas de seguran\u00e7a para proteger os usu\u00e1rios da rede.\r\n\r\nA classifica\u00e7\u00e3o do tr\u00e1fego \u00e9 o primeiro passo para identificar os v\u00e1rios aplicativos e protocolos transmitidos pela rede. O segundo passo \u00e9 gerenciar, otimizar e priorizar esse tr\u00e1fego. Ap\u00f3s a classifica\u00e7\u00e3o, todos os pacotes s\u00e3o marcados de acordo com sua perten\u00e7a a um protocolo ou aplicativo espec\u00edfico, o que permite que os dispositivos de rede apliquem pol\u00edticas de servi\u00e7o (QoS) com base nessas etiquetas e sinalizadores.\r\n\r\nConceitos-chave: classifica\u00e7\u00e3o \u2013 identifica\u00e7\u00e3o de aplicativos ou protocolos; marca\u00e7\u00e3o \u2013 o processo de etiquetar pacotes para a aplica\u00e7\u00e3o de pol\u00edticas de servi\u00e7o em equipamentos.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2016\/10\/classification-methods.jpg\" alt=\"m\u00e9todos de classifica\u00e7\u00e3o\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13067\" srcset=\"\/wp-content\/uploads\/2016\/10\/classification-methods.jpg 600w, \/wp-content\/uploads\/2016\/10\/classification-methods-300x131.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2016\/10\/classification-methods.jpg\" alt=\"m\u00e9todos de classifica\u00e7\u00e3o\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13067 lazyload\" sizes=\"(max-width: 600px) 100vw, 600px\" data-src=\"\/wp-content\/uploads\/2016\/10\/classification-methods.jpg\" data-srcset=\"\/wp-content\/uploads\/2016\/10\/classification-methods.jpg 600w, \/wp-content\/uploads\/2016\/10\/classification-methods-300x131.jpg 300w\">\r\n\r\n<strong>Existem dois m\u00e9todos principais de classifica\u00e7\u00e3o de tr\u00e1fego:<\/strong>\r\n<ul>\r\n\t<li>Classifica\u00e7\u00e3o baseada na carga \u00fatil. Baseia-se em campos de blocos de dados, como portas da camada 4 da OSI (remetente e destinat\u00e1rio ou ambos). Esse m\u00e9todo \u00e9 o mais comum, mas n\u00e3o funciona com tr\u00e1fego criptografado e tunelado.<\/li>\r\n\t<li>Classifica\u00e7\u00e3o baseada em estat\u00edsticas. Baseia-se na an\u00e1lise do comportamento do tr\u00e1fego (tempo entre pacotes, tempo de sess\u00e3o, etc.).<\/li>\r\n<\/ul>\r\nUma abordagem universal para a classifica\u00e7\u00e3o do tr\u00e1fego \u00e9 baseada nas informa\u00e7\u00f5es do cabe\u00e7alho do pacote IP \u2014 geralmente o endere\u00e7o IP (Camada 3), endere\u00e7o MAC (Camada 2) e protocolo usado. Essa abordagem tem recursos limitados, uma vez que as informa\u00e7\u00f5es s\u00e3o obtidas apenas do cabe\u00e7alho IP, assim como os m\u00e9todos da Camada 4 s\u00e3o limitados \u2014 afinal, nem todos os aplicativos usam portas padr\u00e3o.\r\n\r\nUma classifica\u00e7\u00e3o mais sofisticada pode ser obtida por meio da inspe\u00e7\u00e3o profunda de pacotes (DPI). Esse m\u00e9todo \u00e9 o mais preciso e confi\u00e1vel, ent\u00e3o vamos examin\u00e1-lo mais de perto.\r\n\r\n[product id=\u201d19\u2033 type=\u201ddark\u201d]\r\n<h2>Deep Packet Inspection<\/h2>\r\nOs sistemas de inspe\u00e7\u00e3o profunda de pacotes permitem classificar aplicativos e protocolos que n\u00e3o podem ser identificados nas camadas 3 e 4, como URLs dentro de pacotes, conte\u00fado de mensagens instant\u00e2neas, tr\u00e1fego de voz do Skype e pacotes p2p do BitTorrent.\r\n\r\nO principal mecanismo para identificar aplicativos em DPI \u00e9 a an\u00e1lise de assinatura. Cada aplicativo tem suas pr\u00f3prias caracter\u00edsticas exclusivas, que s\u00e3o inseridas em um banco de dados de assinaturas. A compara\u00e7\u00e3o de uma amostra do banco de dados com o tr\u00e1fego analisado permite que o aplicativo ou protocolo seja identificado com precis\u00e3o. No entanto, como novos aplicativos aparecem periodicamente, o banco de dados de assinaturas tamb\u00e9m deve ser atualizado para garantir alta precis\u00e3o de identifica\u00e7\u00e3o.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2016\/10\/signatures.png\" alt=\"signatures\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13068\" srcset=\"\/wp-content\/uploads\/2016\/10\/signatures.png 1340w, \/wp-content\/uploads\/2016\/10\/signatures-300x162.png 300w, \/wp-content\/uploads\/2016\/10\/signatures-1024x553.png 1024w, \/wp-content\/uploads\/2016\/10\/signatures-768x414.png 768w\" sizes=\"(max-width: 1340px) 100vw, 1340px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2016\/10\/signatures.png\" alt=\"signatures\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13068 lazyload\" sizes=\"(max-width: 1340px) 100vw, 1340px\" data-src=\"\/wp-content\/uploads\/2016\/10\/signatures.png\" data-srcset=\"\/wp-content\/uploads\/2016\/10\/signatures.png 1340w, \/wp-content\/uploads\/2016\/10\/signatures-300x162.png 300w, \/wp-content\/uploads\/2016\/10\/signatures-1024x553.png 1024w, \/wp-content\/uploads\/2016\/10\/signatures-768x414.png 768w\">\r\n\r\n<strong>Existem v\u00e1rios m\u00e9todos de an\u00e1lise de assinaturas:<\/strong>\r\n\r\n\r\n<ul>\r\n \t<li>An\u00e1lise de padr\u00f5es (Pattern analysis)<\/li>\r\n \t<li>An\u00e1lise num\u00e9rica (Numerical analysis)<\/li>\r\n \t<li>An\u00e1lise comportamental (Behavioral analysis)<\/li>\r\n \t<li>An\u00e1lise heur\u00edstica (Heuristic analysis)<\/li>\r\n \t<li>An\u00e1lise de protocolo\/estado (Protocol\/state analysis)<\/li>\r\n<\/ul>\r\n<h2>An\u00e1lise de padr\u00f5es<\/h2>\r\nAlgumas aplica\u00e7\u00f5es cont\u00eam amostras espec\u00edficas (bytes\/caracteres\/cadeias) no bloco de dados do pacote que podem ser utilizadas para identifica\u00e7\u00e3o e classifica\u00e7\u00e3o. Estas amostras podem estar localizadas em qualquer parte do bloco de dados; isso n\u00e3o afeta o processo de identifica\u00e7\u00e3o. No entanto, como nem todos os pacotes cont\u00eam uma amostra da aplica\u00e7\u00e3o, este m\u00e9todo nem sempre funciona.\r\n\r\n<h2>An\u00e1lise num\u00e9rica<\/h2>\r\nA an\u00e1lise num\u00e9rica estuda as caracter\u00edsticas quantitativas dos pacotes, como tamanho do bloco de dados, tempo de resposta do pacote e intervalo entre pacotes. Por exemplo, a vers\u00e3o antiga do Skype (anterior \u00e0 vers\u00e3o 2.0) era adequada para esse tipo de an\u00e1lise porque a solicita\u00e7\u00e3o do cliente tinha 18 bytes e a resposta recebida tinha 11 bytes. Como a an\u00e1lise pode ser distribu\u00edda pelos pacotes de uma cadeia de lojas, a decis\u00e3o de classifica\u00e7\u00e3o pode demorar mais. A an\u00e1lise simult\u00e2nea de v\u00e1rios pacotes leva bastante tempo, o que torna esse m\u00e9todo menos ideal.\r\n\r\n<h2>An\u00e1lise comportamental e heur\u00edstica<\/h2>\r\nEste m\u00e9todo \u00e9 baseado no comportamento do tr\u00e1fego gerado por um aplicativo em execu\u00e7\u00e3o. Enquanto o aplicativo est\u00e1 em execu\u00e7\u00e3o, ele gera tr\u00e1fego din\u00e2mico que tamb\u00e9m pode ser identificado e marcado. Por exemplo, o BitTorrent gera tr\u00e1fego com uma sequ\u00eancia espec\u00edfica de pacotes que t\u00eam as mesmas caracter\u00edsticas (porta de entrada e sa\u00edda, tamanho do pacote, n\u00famero de sess\u00f5es abertas por unidade de tempo), que podem ser classificadas de acordo com um modelo comportamental (heur\u00edstico).\r\n\r\n[important]A an\u00e1lise comportamental e heur\u00edstica s\u00e3o geralmente utilizadas em conjunto, e muitos programas antiv\u00edrus utilizam esses m\u00e9todos para identificar v\u00edrus e worms.[\/important]\r\n<h2>An\u00e1lise de protocolo\/status<\/h2>\r\nOs protocolos de algumas aplica\u00e7\u00f5es s\u00e3o uma sequ\u00eancia de a\u00e7\u00f5es espec\u00edficas. A an\u00e1lise dessas sequ\u00eancias permite identificar a aplica\u00e7\u00e3o com precis\u00e3o suficiente. Por exemplo, uma solicita\u00e7\u00e3o GET de um cliente FTP deve ser seguida por uma resposta correspondente do servidor.\r\n\r\nMore and more applications on the Internet are starting to use traffic encryption mechanisms, which creates major problems for any classification method. The <a href=\"\/products\/stingray\/\">DPI system<\/a> cannot look inside an encrypted packet to analyze its contents, so the main methods for identifying such traffic are behavioral and heuristic analysis, but even these cannot identify all applications. The latest mechanism, which uses both of these methods simultaneously, is called clustering, and only it allows encrypted traffic to be identified.\r\n\r\nCada vez mais aplicativos na Internet est\u00e3o come\u00e7ando a usar mecanismos de criptografia de tr\u00e1fego, o que cria grandes problemas para qualquer m\u00e9todo de classifica\u00e7\u00e3o. <a href=\"\/br\/products\/stingray\/\">O sistema DPI<\/a> n\u00e3o pode examinar o interior de um pacote criptografado para analisar seu conte\u00fado, portanto, os principais m\u00e9todos para identificar esse tr\u00e1fego s\u00e3o a an\u00e1lise comportamental e heur\u00edstica, mas mesmo esses m\u00e9todos n\u00e3o conseguem identificar todos os aplicativos. O mecanismo mais recente, que usa esses dois m\u00e9todos simultaneamente, \u00e9 chamado de clustering e \u00e9 o \u00fanico que permite identificar o tr\u00e1fego criptografado.\r\n\r\n[important]Como nenhum dos m\u00e9todos descritos acima fornece 100% de classifica\u00e7\u00e3o de tr\u00e1fego por si s\u00f3, a melhor pr\u00e1tica \u00e9 usar todos eles simultaneamente.[\/important]\r\n\r\nA classifica\u00e7\u00e3o de tr\u00e1fego com a aplica\u00e7\u00e3o subsequente de pol\u00edticas de qualidade de servi\u00e7o \u00e9 uma das tarefas mais importantes para qualquer operadora de telecomunica\u00e7\u00f5es. O uso de sistemas DPI modernos permite que essa tarefa seja realizada com m\u00e1xima efici\u00eancia e produtividade.\r\n\r\n[subscription id=\u201d11987\u2033]Inscreva-se para receber atualiza\u00e7\u00f5es em nosso blog e ficar por dentro das \u00faltimas not\u00edcias do setor de telecomunica\u00e7\u00f5es.[\/subscription]","protected":false},"excerpt":{"rendered":"<p>O tr\u00e1fego de rede \u00e9 complexo, consistindo em uma infinidade de aplicativos, protocolos e servi\u00e7os. Muitos desses aplicativos t\u00eam requisitos exclusivos para caracter\u00edsticas de rede, como velocidade, lat\u00eancia e instabilidade. Atender a esses requisitos \u00e9 essencial para que os aplicativos sejam executados de forma r\u00e1pida e confi\u00e1vel e para que os usu\u00e1rios fiquem satisfeitos com a qualidade do servi\u00e7o.<\/p>\n","protected":false},"author":7,"featured_media":13064,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51],"tags":[],"class_list":["post-13062","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dpi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>(English) VASExperts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/\",\"url\":\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/\",\"name\":\"[:en]Traffic Classification and Deep Packet Inspection \u2014 VAS Experts[:es]Clasificaci\u00f3n del tr\u00e1fico e Deep Packet Inspection \u2014 VAS Experts[:fr]Classification du trafic et Deep Packet Inspection \u2014 VAS Experts[:br]Classifica\u00e7\u00e3o de tr\u00e1fego e Deep Packet Inspection \u2014 VAS Experts\",\"isPartOf\":{\"@id\":\"https:\/\/vasexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2025\/08\/dpi-prioritization.jpg\",\"datePublished\":\"2016-10-04T15:08:50+00:00\",\"dateModified\":\"2025-08-18T15:36:22+00:00\",\"author\":{\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\"},\"description\":\"[:en]Traffic classification is the first step in identifying the various applications and protocols transmitted over the network. The second step is to manage, optimize, and prioritize this traffic.[:es]La clasificaci\u00f3n del tr\u00e1fico es el primer paso para identificar las diversas aplicaciones y protocolos que se transmiten a trav\u00e9s de la red. El segundo paso consiste en gestionar, optimizar y priorizar este tr\u00e1fico.[:fr]La classification du trafic est la premi\u00e8re \u00e9tape pour identifier les diff\u00e9rentes applications et protocoles transmis sur le r\u00e9seau. La deuxi\u00e8me \u00e9tape consiste \u00e0 g\u00e9rer, optimiser et hi\u00e9rarchiser ce trafic.[:br]A classifica\u00e7\u00e3o do tr\u00e1fego \u00e9 o primeiro passo para identificar as v\u00e1rias aplica\u00e7\u00f5es e protocolos transmitidos pela rede. O segundo passo \u00e9 gerenciar, otimizar e priorizar esse tr\u00e1fego.\",\"breadcrumb\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#breadcrumb\"},\"inLanguage\":\"br-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"br-PT\",\"@id\":\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2025\/08\/dpi-prioritization.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2025\/08\/dpi-prioritization.jpg\",\"width\":1024,\"height\":531,\"caption\":\"DPI Traffic Prioritization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/vasexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Traffic Classification and Deep Packet Inspection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vasexperts.com\/#website\",\"url\":\"https:\/\/vasexperts.com\/\",\"name\":\"ITGLOBAL.COM\",\"description\":\"(English) VASExperts\",\"inLanguage\":\"br-PT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\",\"name\":\"Elena Rudich\",\"url\":\"https:\/\/vasexperts.com\/br\/blog\/author\/elena-rudich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"(English) VASExperts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/","url":"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/","name":"[:en]Traffic Classification and Deep Packet Inspection \u2014 VAS Experts[:es]Clasificaci\u00f3n del tr\u00e1fico e Deep Packet Inspection \u2014 VAS Experts[:fr]Classification du trafic et Deep Packet Inspection \u2014 VAS Experts[:br]Classifica\u00e7\u00e3o de tr\u00e1fego e Deep Packet Inspection \u2014 VAS Experts","isPartOf":{"@id":"https:\/\/vasexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#primaryimage"},"image":{"@id":"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/08\/dpi-prioritization.jpg","datePublished":"2016-10-04T15:08:50+00:00","dateModified":"2025-08-18T15:36:22+00:00","author":{"@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170"},"description":"[:en]Traffic classification is the first step in identifying the various applications and protocols transmitted over the network. The second step is to manage, optimize, and prioritize this traffic.[:es]La clasificaci\u00f3n del tr\u00e1fico es el primer paso para identificar las diversas aplicaciones y protocolos que se transmiten a trav\u00e9s de la red. El segundo paso consiste en gestionar, optimizar y priorizar este tr\u00e1fico.[:fr]La classification du trafic est la premi\u00e8re \u00e9tape pour identifier les diff\u00e9rentes applications et protocoles transmis sur le r\u00e9seau. La deuxi\u00e8me \u00e9tape consiste \u00e0 g\u00e9rer, optimiser et hi\u00e9rarchiser ce trafic.[:br]A classifica\u00e7\u00e3o do tr\u00e1fego \u00e9 o primeiro passo para identificar as v\u00e1rias aplica\u00e7\u00f5es e protocolos transmitidos pela rede. O segundo passo \u00e9 gerenciar, otimizar e priorizar esse tr\u00e1fego.","breadcrumb":{"@id":"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#breadcrumb"},"inLanguage":"br-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/"]}]},{"@type":"ImageObject","inLanguage":"br-PT","@id":"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#primaryimage","url":"\/wp-content\/uploads\/2025\/08\/dpi-prioritization.jpg","contentUrl":"\/wp-content\/uploads\/2025\/08\/dpi-prioritization.jpg","width":1024,"height":531,"caption":"DPI Traffic Prioritization"},{"@type":"BreadcrumbList","@id":"https:\/\/vasexperts.com\/blog\/dpi\/traffic-classification-and-deep-packet-inspection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/vasexperts.com\/"},{"@type":"ListItem","position":2,"name":"Traffic Classification and Deep Packet Inspection"}]},{"@type":"WebSite","@id":"https:\/\/vasexperts.com\/#website","url":"https:\/\/vasexperts.com\/","name":"ITGLOBAL.COM","description":"(English) VASExperts","inLanguage":"br-PT"},{"@type":"Person","@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170","name":"Elena Rudich","url":"https:\/\/vasexperts.com\/br\/blog\/author\/elena-rudich\/"}]}},"_links":{"self":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/13062"}],"collection":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/comments?post=13062"}],"version-history":[{"count":8,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/13062\/revisions"}],"predecessor-version":[{"id":13073,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/13062\/revisions\/13073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/media\/13064"}],"wp:attachment":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/media?parent=13062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/categories?post=13062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/tags?post=13062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}