Market Survey - Detection & Filtering Solutions to Identify File Transfer of Copyright Protected Content for Warner Bros
Total Page:16
File Type:pdf, Size:1020Kb
- Market Survey - Detection & Filtering Solutions to Identify File Transfer of Copyright Protected Content for Warner Bros. and movielabs Version 1.5 14.3.2011 Thomas Sladek, Eduard Bröse EANTC AG Copyright (C) 2011 EANTC European Advanced Networking Test Center Aktiengesellschaft This document is copyrighted by EANTC AG. It may not, in whole or in part, be repro- duced, transmitted by any means or stored in any web site or electronic retrieval sys- tem without the prior written permission of EANTC AG. EANTC AG grants the receiving party of this test plan a non-transferable right to use this document for internal purposes with regards to projects with EANTC. All copies must retain and reproduce this copyright notice and all other copyright notices contained within the original material. Einsteinufer 17 D–10587 Berlin Germany Tel. +49. (0)30. 318 05 95–0 Fax +49. (0)30. 318 05 95–10 E-Mail [email protected] WWW http://www.eantc.de/ Table of Contents Introduction ................................................................................................. 6 Motivation of this document ........................................................................ 6 Basic definitions ........................................................................................ 7 Terminology.........................................................................................7 Abbreviations ......................................................................................9 Contacts ................................................................................................. 12 Technology Overview ................................................................................. 13 File distribution techniques ........................................................................ 13 HTTP and FTP downloads ....................................................................13 Direct Downloads...............................................................................15 Centralized P2P Architecture................................................................15 P2P with Decentralized Architecture......................................................17 P2P-based Streaming ..........................................................................17 Anonymized Distributed Architectures ...................................................18 Steganographic Protocols....................................................................19 Detection Techniques................................................................................ 19 Payload-agnostic Filtering....................................................................19 DPI-based Protocol Detection................................................................20 DPI-based Content Detection ................................................................21 Content Analysis ................................................................................23 Blocking Techniques................................................................................. 23 Traffic throttling techniques........................................................................ 26 Solutions Based on HTTP Proxy.................................................................. 27 Device Classification...........................................................................27 Principle of Operation.........................................................................27 Network Connection...........................................................................28 Conventional Proxy ............................................................................28 Transparent Proxy...............................................................................30 Conclusion.............................................................................................. 30 Service Provider Challenges......................................................................... 32 3 Table of Contents Network Technology Perspective ............................................................... 32 Integration into Service Provide (SP) networks ........................................32 Resiliency ..........................................................................................33 Network performance considerations....................................................34 Network security considerations ...........................................................35 Copyright database handling ..............................................................37 Potential service provider design ..........................................................39 Encapsulation ....................................................................................40 Link Aggregation................................................................................41 Asymmetric Traffic ..............................................................................42 Monitoring in Impaired Traffic Flows.....................................................42 User Perspective ...................................................................................... 43 Protocol-oriented solutions............................................................................ 44 Procera PacketLogic ................................................................................. 44 Device classification ...........................................................................44 Hardware/software platform ...............................................................44 Principle of Operation.........................................................................45 Network Connection...........................................................................46 Supported Protocols............................................................................47 Additional potential advantages for the service provider .........................47 ipoque PRX ............................................................................................. 48 Purpose.............................................................................................48 Platform ............................................................................................48 Provider Network Integration ...............................................................48 Principle of Operation.........................................................................49 Additional potential advantages for the service provider .........................50 Content-Oriented Solutions .......................................................................... 51 Vedicis V-Content Smart Switch ................................................................. 51 Device Classification...........................................................................51 Platform ............................................................................................52 Provider Network Integration ...............................................................53 Principle of operation..........................................................................54 Advanced Features: Protocol Decryption ...............................................55 Additional potential advantages for the service provider .........................55 Web Content Filtering................................................................................. 57 Blue Coat ............................................................................................... 57 Device classification ...........................................................................57 Hardware/software platform ...............................................................58 Network connection............................................................................58 Principle of Operation.........................................................................58 Supported Protocols............................................................................59 Additional features .............................................................................59 Additional potential advantages for service provider ..............................59 Cisco IronPort.......................................................................................... 60 Device classification ...........................................................................60 Platform ............................................................................................60 Network Connection...........................................................................60 Principle of Operation.........................................................................60 Supported Protocols............................................................................61 4 Table of Contents Additional Capabilities .......................................................................61 Additional potential advantages for the service provider .........................61 SafeNet eSafe......................................................................................... 62 Device Classification...........................................................................62 Platform ............................................................................................62 Network Connection...........................................................................62 Performance ......................................................................................62 Supported Protocols............................................................................62