Market Survey - Detection & Filtering Solutions to Identify File Transfer of Copyright Protected Content for Warner Bros

Total Page:16

File Type:pdf, Size:1020Kb

Market Survey - Detection & Filtering Solutions to Identify File Transfer of Copyright Protected Content for Warner Bros - Market Survey - Detection & Filtering Solutions to Identify File Transfer of Copyright Protected Content for Warner Bros. and movielabs Version 1.5 14.3.2011 Thomas Sladek, Eduard Bröse EANTC AG Copyright (C) 2011 EANTC European Advanced Networking Test Center Aktiengesellschaft This document is copyrighted by EANTC AG. It may not, in whole or in part, be repro- duced, transmitted by any means or stored in any web site or electronic retrieval sys- tem without the prior written permission of EANTC AG. EANTC AG grants the receiving party of this test plan a non-transferable right to use this document for internal purposes with regards to projects with EANTC. All copies must retain and reproduce this copyright notice and all other copyright notices contained within the original material. Einsteinufer 17 D–10587 Berlin Germany Tel. +49. (0)30. 318 05 95–0 Fax +49. (0)30. 318 05 95–10 E-Mail [email protected] WWW http://www.eantc.de/ Table of Contents Introduction ................................................................................................. 6 Motivation of this document ........................................................................ 6 Basic definitions ........................................................................................ 7 Terminology.........................................................................................7 Abbreviations ......................................................................................9 Contacts ................................................................................................. 12 Technology Overview ................................................................................. 13 File distribution techniques ........................................................................ 13 HTTP and FTP downloads ....................................................................13 Direct Downloads...............................................................................15 Centralized P2P Architecture................................................................15 P2P with Decentralized Architecture......................................................17 P2P-based Streaming ..........................................................................17 Anonymized Distributed Architectures ...................................................18 Steganographic Protocols....................................................................19 Detection Techniques................................................................................ 19 Payload-agnostic Filtering....................................................................19 DPI-based Protocol Detection................................................................20 DPI-based Content Detection ................................................................21 Content Analysis ................................................................................23 Blocking Techniques................................................................................. 23 Traffic throttling techniques........................................................................ 26 Solutions Based on HTTP Proxy.................................................................. 27 Device Classification...........................................................................27 Principle of Operation.........................................................................27 Network Connection...........................................................................28 Conventional Proxy ............................................................................28 Transparent Proxy...............................................................................30 Conclusion.............................................................................................. 30 Service Provider Challenges......................................................................... 32 3 Table of Contents Network Technology Perspective ............................................................... 32 Integration into Service Provide (SP) networks ........................................32 Resiliency ..........................................................................................33 Network performance considerations....................................................34 Network security considerations ...........................................................35 Copyright database handling ..............................................................37 Potential service provider design ..........................................................39 Encapsulation ....................................................................................40 Link Aggregation................................................................................41 Asymmetric Traffic ..............................................................................42 Monitoring in Impaired Traffic Flows.....................................................42 User Perspective ...................................................................................... 43 Protocol-oriented solutions............................................................................ 44 Procera PacketLogic ................................................................................. 44 Device classification ...........................................................................44 Hardware/software platform ...............................................................44 Principle of Operation.........................................................................45 Network Connection...........................................................................46 Supported Protocols............................................................................47 Additional potential advantages for the service provider .........................47 ipoque PRX ............................................................................................. 48 Purpose.............................................................................................48 Platform ............................................................................................48 Provider Network Integration ...............................................................48 Principle of Operation.........................................................................49 Additional potential advantages for the service provider .........................50 Content-Oriented Solutions .......................................................................... 51 Vedicis V-Content Smart Switch ................................................................. 51 Device Classification...........................................................................51 Platform ............................................................................................52 Provider Network Integration ...............................................................53 Principle of operation..........................................................................54 Advanced Features: Protocol Decryption ...............................................55 Additional potential advantages for the service provider .........................55 Web Content Filtering................................................................................. 57 Blue Coat ............................................................................................... 57 Device classification ...........................................................................57 Hardware/software platform ...............................................................58 Network connection............................................................................58 Principle of Operation.........................................................................58 Supported Protocols............................................................................59 Additional features .............................................................................59 Additional potential advantages for service provider ..............................59 Cisco IronPort.......................................................................................... 60 Device classification ...........................................................................60 Platform ............................................................................................60 Network Connection...........................................................................60 Principle of Operation.........................................................................60 Supported Protocols............................................................................61 4 Table of Contents Additional Capabilities .......................................................................61 Additional potential advantages for the service provider .........................61 SafeNet eSafe......................................................................................... 62 Device Classification...........................................................................62 Platform ............................................................................................62 Network Connection...........................................................................62 Performance ......................................................................................62 Supported Protocols............................................................................62
Recommended publications
  • Anonsocialmix: Anonymous P2P File Sharing Over Social Networks
    AnonSocialMix: Anonymous P2P File Sharing Over Social Networks Student Name: Rajdeep Mukherjee IIIT-D-MTech-CS-GEN-MT15051 July, 2017 Indraprastha Institute of Information Technology New Delhi Thesis Committee Dr. Sambuddho Chakravarty, IIIT Delhi (Advisor) Dr. Tanmoy Chakraborty, IIIT Delhi (Internal Examiner) Dr. Vinay Joseph Ribeiro, IIT Delhi (External Examiner) Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, in Information Security Category ©2017 IIIT-D MTech-CS-GEN-17-MT15051 All rights reserved Certificate This is to certify that the thesis titled “AnonSocialMix: Anonymous P2P File Sharing Over Social Networks" submitted by Rajdeep Mukherjee for the partial fulfillment of the requirements for the degree of Master of Technology in Computer Science & Engineering is a record of the bonafide work carried out by him under my guidance and supervision in the Security and Privacy group at Indraprastha Institute of Information Technology, Delhi. This work has not been submitted anywhere else for the reward of any other degree. Dr.Sambuddho Chakravarty Indraprastha Institute of Information Technology, New Delhi 2 Abstract Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveil- lance, more and more Internet users are getting attracted towards the facilities for anonymous communication. Extensive research has been conducted over the years towards the design and development of several anonymous P2P file sharing protocols and systems. Size of the Anonymity Set plays a crucial role in determining the degree of anonymity being provided by such networks.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • View the Dichotomies in Computer Game Studies in More Detail
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2008 A Burkean Analysis on the Relationship of the Image to Player Motivation in First- Person Shooter Games Toby McCall Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES A BURKEAN ANALYSIS ON THE RELATIONSHIP OF THE IMAGE TO PLAYER MOTIVATION IN FIRST-PERSON SHOOTER GAMES By TOBY MCCALL A Thesis submitted to the Department of English in partial fulfillment of the requirements for the degree of Master of Arts Degree Awarded: Summer, 2008 Copyright © 2008 Toby McCall All Rights Reserved The members of the Committee approve the thesis of Toby McCall defended on March 26, 2008. _______________________________ Kathleen Yancey Professor Directing Thesis _______________________________ Phil Steinberg Outside Committee Member _______________________________ Kristie Fleckenstein Committee Member _______________________________ Michael Neal Committee Member Approved: _______________________________ Ralph Berry Chair, Department of English The Office of Graduate Studies has verified and approved the above named committee members. ii I dedicate this work to my mother Joseyvette Jackson, who sacrificed much of her own life so that I might have opportunities she did not. Thanks Mom. iii ACKNOWLEDGMENTS I would like to thank my committee for their feedback and encouragement during this process, especially Kathleen Blake-Yancey who kept me sane and on track despite her own busy schedule; Ian Bogost, Steffen P. Walz and Noah Wardrip-Fruin for their input and time; my brother for his unending support; and my friends Chris Findeisen (Knuckles Malloy), Brianna Noll (Icechest Jones) and Dustin Atkinson (KGB Fontenot) for reminding me to relax, have fun, and play Rock Band; to Kelly Powers for his friendship and guidance.
    [Show full text]
  • Experiences of Internet Traffic Monitoring with Tstat
    1 Experiences of Internet Traffic Monitoring with Tstat A. Finamore M. Mellia M. Meo M. M. Munaf`o D. Rossi 1Politecnico di Torino 2TELECOM ParisTech email: {[email protected]} email: [email protected] Abstract—Since the early days of the Internet, network traffic Internet monitoring tools are based on active probing, ranging monitoring has always played a strategic role in understanding from simple operation management or network tomography and characterize users’ activities. In this paper, we present our via ping or traceroute, to more complex delay and capac- experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten ity estimation via capprobe or pathchar. Finally, large and years. Started as a scalable tool to continuously monitor packets controlled testbeds can be easily setup using tools like netem that flow on a link, Tstat has evolved into a complex application or dummynet. For the passive approach pure observations are that gives to network researchers and operators the possibility to performed by means of dedicated tools, named sniffers by derive extended and complex measurements thanks to advanced the Internet metrology community, that simply observe and traffic classifiers. After discussing Tstat capabilities and internal design, we analyze the traffic that flows on links. Several passive mea- present some examples of measurements collected deploying surement tools are available. Some tools, such as tcpdump or Tstat at the edge of several ISP networks in the past years. Wireshark, are designed to let researchers interactively analyze While other works report a continuous decline of P2P traffic the captured packets.
    [Show full text]
  • Pure Software in an Impure World? WINNY, Japan's First P2P Case
    20 U. OF PENNSYLVANIA EAST ASIA LAW REVIEW [Vol. 8 ! ! ! ! [This Page Intentionally Left Blank.] ! Pure Software in an Impure World? WINNY, Japan’s First P2P Case Ridwan Khan* “Even the purest technology has to live in an impure world.”1 In 2011, Japan’s Supreme Court decided its first contributory infringement peer-to-peer case, involving Isamu Kaneko and his popular file-sharing program, Winny. This program was used in Japan to distribute many copyrighted works, including movies, video games, and music. At the district court level, Kaneko was found guilty of contributory infringement, fined 1.5 million yen, and sentenced to one year in prison. However, the Osaka High Court reversed the district court and found for Kaneko. The High Court decision was then affirmed by the Supreme Court, which settled on a contributory infringement standard based on fault, similar to the standard announced by the United States Supreme Court in MGM Studios * The author would like to thank Professor David Shipley of the University of Georgia for his guidance in preparing this article. He would also like to thank Professor Paul Heald of the University of Illinois College of Law for additional help. Finally, the author expresses gratitude to Shinya Nochioka of the Ministry of Finance and Yuuka Kawazoe of Osaka Jogakuin for their friendship and advice on Japanese legal matters and language through the two years spent researching and writing this article. All mistakes, however, are the responsibility of the author. All translations of Japanese language materials into English are by the author. 1 Benjamin Wallace, The Rise and Fall of Bitcoin, WIRED MAGAZINE (Nov.
    [Show full text]
  • BIS Volume 21 Numero 1
    Boletim do Instituto de Saúde Volume 21 – n.0 1 – Julho 2020 ISSN 1518-1812 / On-line: 1809-7529 1 | Julho 2020 1 | Julho o Boletim do Instituto de Saúde | BIS | Volume 21 | n. Volume | BIS de Saúde Boletim do Instituto Valentina Massens, influenciadora digital. Comunicação em Saúde na Era Digital Instituto de Saúde Boletim do Instituto de Saúde – BIS Rua Santo Antônio, 590 – Bela Vista Volume 21 – n.0 1 – Julho 2020 São Paulo-SP – CEP 01314-000 ISSN 1518-1812 / On-line: 1809-7529 Tel: (11) 3116-8500 / Fax: (11) 3105-2772 Publicação semestral do Instituto de Saúde www.isaude.sp.gov.br [email protected] Tiragem: 2000 exemplares Rua Santo Antônio, 590 – Bela Vista Secretaria de Estado da Saúde de São Paulo São Paulo-SP – CEP 01314-000 Secretário de Estado da Saúde de São Paulo Tel: (11) 3116-8500 / Fax: (11) 3105-2772 Dr. José Henrique Germann Ferreira [email protected] Instituto de Saúde Diretora do Instituto de Saúde Instituto de Saúde – www.isaude.sp.gov.br Luiza Sterman Heimann Portal de Revistas da SES-SP – http://periodicos.ses.sp.bvs.br Vice-diretora do Instituto de Saúde Editor Sônia I. Venâncio Márcio Derbli Diretora do Centro de Pesquisa e Desenvolvimento para o SUS-SP Editores científicos Tereza Etsuko da Costa Rosa Maria Thereza Bonilha Dubugras (Instituto de Saúde); Peter Rembischevski (Agência Nacional de Vigilância Sanitária); Vidal Augusto Zapparoli Diretora do Centro de Tecnologias de Saúde para o SUS-SP Castro Melo (Escola Politécnica da Universidade de São Paulo); Rogerio Tereza Setsuko Toma Venturineli
    [Show full text]
  • Copyright Infringement on Music, Movie and Software in the Internet (Illegal File Sharing and Fair Use Practices in Indonesia, Japan and United States of America)
    Copyright Infringement on Music, Movie and Software in the Internet (Illegal File Sharing and Fair Use Practices in Indonesia, Japan and United States of America) A thesis submitted for the degree of Doctor Philosophy in Law Bayu Sujadmiko 1221072013 Kanazawa University Graduate School of Human and Socio-Environmental Studies 2015/2016 要旨 インターネット技術は、インドネシア、日本、米国を含む世界中で広く利用され ている。発展につれて、それら応用技術は人類の福祉にとって不法な行為を誘発 する「両刃の剣」となった。デジタル化可能なほとんどの著作物は、インターネ ットを介した複製及び物理的侵害の蓋然性にさらされることとなった。違法ダウ ンロード、アップロード、ファイル共有が市民の間に広がったが、インドネシア の立法は、インターネット技術の進歩への反応が鈍かった。その結果、著作権産 業がフラッシュ・ドライバ、スマートフォン、タブレットなどの高度モバイル技 術というデジタル著作権侵害の新しい成長の問題に直面しているのにもかかわら ず、対策は、違法コンテンツや海賊製品の普及に対してのみ行われている。いく つかの国では、これらのデバイスは、それらが販売される前から違法なコンテン ツをインストールされている。政府によれば、彼らは物理的及びオンラインの海 賊行為を停止するための解決法を探している。本論文は、日本、米国、インドネ シアにおける著作権法のシステムを比較する。また、国際的な規制が、刑事罰と 罰金の執行においてこれら各国にどのような影響を与えるかを説明する。著作権 法に関する立法のみではインターネット上の課題には答えられないことを示す点 でも有益である。技術的、手続的、社会的、制度的に効率的な執行システムの具 体的な調和が必要とされている。 Abstract The utilization of Internet technology is widely practiced by the entire population of the globe, including Indonesia, Japan and United States. During its development, applied technology became a “double-edged sword”, in addition to the mankind welfare; it is used for unlawful acts. Most copyrighted works that can be reformed to digitize have big probability to duplicate over the Internet and physical piracy. Illegal downloading, uploading and file sharing became common activities among the citizenry. Indonesian legislation was low respond to follow the advance of Internet technology. Consequently, legal enforcement is performed only among the spread of illegal contents and pirate products. While, copyright industries face new growing problems with digital piracy; flash drivers, smartphones, tablets and other high mobile technologies. In some countries, these devices are preloaded with illegal content even before they are sold. Accompanied by the government, they try to find the solutions to stop the physical and online piracy.
    [Show full text]
  • Seadrive Peter Haro1,2 and Otto Anshus2 1SINTEF ICT, Trondheim, Norway 2Department of Computer Science, University of Tromsø, Norway
    Seadrive Peter Haro1,2 and Otto Anshus2 1SINTEF ICT, Trondheim, Norway 2Department of Computer Science, University of Tromsø, Norway Abstract Seadrive is a novel file synchronizations framework and file hosting service for offshore naval fleets. Offshore vessels outside the range of cellular networks employ volatile satellite-based networks unsuited for file synchronization. Seadrive aspires to provide naval fleets with usable file hosting services over low bandwidth, high latency network links with high loss rate and large variability in the overall network stability. We provide the rationale for Seadrive; present the architecture, and design of the framework. We present an initial evaluation of the correctness and performance, preliminary results shows that Seadrive outperforms existing system in the test environment. Introduction Modern naval- and fishing fleets utilize a multitude of information systems from different sources when planning and executing offshore operations. These vessels are equipped with several sensors and instruments, which provide a constant stream of information regarding various on-board systems, of which some are readily available to the crew and actively employed during an operation. The governing bodies of large naval-, fishing-, and oil- fleets requires information to flow from their management system(s) to their fleet in a robust manner, likewise the fleets have information required by the governing entity. The information flow in today’s systems is primarily based on using e-mail. However, end-users report these systems as unsatisfactory for the following reasons. • Important information is lost in the copious amount of other e-mails • Documents arriving during shift A are often not read by shift B • The systems are slow • The files sent through these systems are constrained not only by file-type, but also their size When important information is lost, the results can vary from small trifles to disasters, such as overfishing, not following updated safety regulations or monetary losses.
    [Show full text]
  • Joint Report on Publicly Available Hacking Tools (NCSC)
    Page 2 Joint report on publicly available hacking tools Joint report on publicly available hacking tools Page 3 Contents Introduction .............................................................................................................................................. 4 Nature of the tools ............................................................................................................................................. 4 Report structure.................................................................................................................................................. 4 Remote access trojans: JBiFrost ........................................................................................................... 5 In use .................................................................................................................................................................... 5 Capabilities .......................................................................................................................................................... 5 Examples ............................................................................................................................................................. 5 Detection and protection .................................................................................................................................. 6 Web shells: China Chopper ...................................................................................................................
    [Show full text]
  • The Application Usage and Threat Report
    The Application Usage and Threat Report An Analysis of Application Usage and Related Threats – Regional Findings Americas and Canada (Latin and South America, Canada, U.S.A.) Europe, Africa, Middle East Asia Pacific Japan March 2013 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Key Findings: The Americas and Canada ........................................................................ 4 Data Sources and Additional Facts: The Americas and Canada................................................................ 8 Key Findings: Europe, Middle East and Africa .............................................................. 10 Data Sources and Additional Facts: Europe, Middle East and Africa ...................................................... 14 Key Findings: Asia Pacific ............................................................................................. 16 Data Sources and Additional Facts: Asia Pacific ..................................................................................... 20 Key Findings: Japan ...................................................................................................... 22 Data Sources and Additional Facts: Japan .............................................................................................. 26 Demographics and Methodology ..................................................................................
    [Show full text]
  • Online File-Hosting Service
    ISSN XXXX XXXX © 2017 IJESC Research Article Volume 7 Issue No.3 Online File-Hosting Service Khaja Viqar Uddin1, MD Daniyal Raza2, Faheem Uddin3, Abdul Rais4 B.Tech Students 1,2,3, Assistant Professor4 Department of Computer Science Engineering Lords Institute of Engineering and Technology,Hyderabad, India Abstract: It is a type of file hosting application. Which is used for storing multimedia files in a Database or a server which can be a ccessed from any remote location by the user if he or she has the hardware and software requirements. In this we are trying to improve or counter the drawbacks of the existing system and possibly add few new features.It creates a special folder on user’s device. The content of which are then synchronized to the application server and to other devices that has installed the application. This application uses a freemium business model, users are offered a free account with a set storage size. Keywords:Multimedia, Synchronized, Remote Location.Freemium Business Model. I.INTRODUCTION: II.EXPLANATION A file hosting service, cloud storage service, online file Personal file storage storage provider, or cyberlocker is an Internet hosting Personal file storage services are aimed at private individuals, service specifically designed to host user files. It allows users offering a sort of "network storage" for personal backup, file to upload files that could then be accessed over the internet access, or file distribution. Users can upload their files and from a different computer, tablet, s mart phone or other share them publicly or keep them password-protected. networked device, by the same user or possibly by other users, Document-sharing services allow users to share and after a password or other authentication is provided.
    [Show full text]
  • Characterizing the File Hosting Service Ecosystem
    Characterizing the File Hosting Service Ecosystem Aniket Mahanti, Niklas Carlsson~, and Carey Williamson University of Calgary, Canada ~ Linköping University, Sweden ABSTRACT et al. [1] who studied traffic, usage, and performance File Hosting Services (FHS) such as Rapidshare and Mega- characteristics of a single FHS, namely Rapidshare. upload have recently become popular. The decline of P2P We propose a comprehensive characterization study file sharing has prompted various services including FHS to of FHS workloads. We study four popular FHS: Rapid- replace it. We propose a comprehensive multi-level charac- share, Megaupload, Hotfile, and Mediafire. Using a terization of the FHS ecosystem. We devise a measurement year-long dataset of HTTP transaction summaries col- framework to collect datasets from multiple vantage points. lected from a large university edge network, we charac- To the best of our knowledge, this work is the first to char- terize usage behaviour, content properties, service in- acterize the FHS ecosystem. The work will highlight the frastructure, and performance of these services. To get content, usage, performance, infrastructure, and quality of a global picture, we use a large crawl dataset and com- service characteristics of FHS. FHS can have significant im- pare and contrast the content properties of the services plications on Internet traffic, if these services were to sup- with locally observed characteristics. plant P2P as the dominant content sharing technology. A distinguishing feature of our work is the use of de- tailed Web transactions that allowed us to distinguish free and premium services based on user clickstreams. 1. INTRODUCTION We present a case study comparing FHS with P2P, and File Hosting Services (FHS) were originally designed show preliminary results highlighting content properties for file backup purposes and for uploading files that were and performance of FHS.
    [Show full text]