2744.111 Apps.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

2744.111 Apps.Pdf 18/4/2017 Sophos Log Viewer Help admin Applications HOME MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics PROTECT Name * 111 Firewall Intrusion Prevention Description Web Applications Wireless Email Web Server Enable Micro App Discovery Advanced Threat CONFIGURE VPN Network Routing Authentication System Services Add Delete SYSTEM Application Application Filter Criteria Schedule Action Manage Profiles Hosts and Services Administration Category = Software Backup & Firmware Update Risk = 2-Low, 3-Medium Certificates Panda Antivirus Update, Kaspersky Antivirus Update, Antivir Antivirus Update, AVG Antivirus All the Update, Avast Antivirus Update Characteristics = Time Allow Excessive Bandwidth,... Technology = Client Server Category = Remote Access Risk = 3-Medium All the Windows Remote Desktop Characteristics = Time Allow Excessive Bandwidth,... Technology = Client Server Category = Software Update Risk = 1-Very Low All the Google Chrome Update, Microsoft Updates, Avira Updates, Norton Updates Characteristics = Widely Time Allow Used Technology = Client Server Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#4755 1/6 18/4/2017 Sophos Application Application Filter Criteria Schedule Action Manage Log Viewer Help admin Applications HOME Category = Streaming Media Risk = 3-Medium MONITOR & ANALYZE All the NetFlix Website Characteristics = Time Allow Control Center Application List Application Filter Excessive Bandwidth,... Traffic Shaping Default Current Activities Technology = Browser Reports Based Diagnostics PROTECT Category = Software Firewall Update, Gen... Intrusion Prevention Risk = 1-Very Low, 2- Web Chrome Remote Desktop, Google Chrome Update, Google Chrome Installer, Chrome Reduce Data Low, 5... All the Allow Applications Usage Characteristics = Time Excessive Bandwidth,... Wireless Technology = Client Email Server Web Server Advanced Threat CONFIGURE Category = Mobile Applications,... VPN Risk = 1-Very Low, 2- Network Apple Push Notification, Apple Support, Apple OTA Updates, Apple Appstore, Apple Store, Low, 3... All the Allow Routing AppleQTC, Apple FaceTime Characteristics = Time Excessive Bandwidth,... Authentication Technology = Browser System Services Based, Clien... SYSTEM Profiles Hosts and Services Category = Streaming Media, Sof... Administration Risk = 3-Medium Backup & Firmware All the iTunes Internet, Itunes Update Characteristics = Time Allow Certificates Excessive Bandwidth,... Technology = Browser Based, Clien... Category = Software Update, Gen... Risk = 1-Very Low, 4- Skype Update, Skype Services, Skype High, ... All the Allow Characteristics = Time Excessive Bandwidth,... Technology = Client Server, P2P Category = General Internet Risk = 2-Low All the OpenVPN Characteristics = Prone Time Allow to misuse, Tun... Technology = Client Server Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#4755 2/6 18/4/2017 Sophos Application Application Filter Criteria Schedule Action Manage Log Viewer Help admin Applications HOME Category = File Transfer, Confe... Risk = 3-Medium MONITOR & ANALYZE All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Control Center Application List Application Filter Excessive Bandwidth,... Traffic Shaping Default Current Activities Technology = Client Reports Server Diagnostics PROTECT Category = Social Firewall Networking Intrusion Prevention Risk = 1-Very Low, 2- Web Twitter Search, Twitter Website, Twitter Discover, Twitter Notifications, Twitter Message, Twitter Low, 3... All the Allow Applications Follow, Twitter Retweet, Twitter Status Update, Twitter Upload, Twitter Limited Access Characteristics = Time Excessive Bandwidth,... Wireless Technology = Browser Email Based Web Server Advanced Threat T-Online Webmail, Yahoo WebMail, AOL WebMail, NeverMail WebMail, Sohu WebMail, COX CONFIGURE WebMail, OCN Webmail, Myspace Web Mail, Way2SMS WebMail, Zenbe WebMail, Mail.com WebMail, GMX WebMail, Sina WebMail, Mail-ru WebMail, Gree.jp WebMail Login, Bebo Posting, VPN OpenWebMail, Squirrelmail WebMail, Boxcar, NateMail WebMail, Optimum WebMail, AOL Mail Network Attachment, Fastmail Webmail, Yandex Mail, Korea WebMail, Netease WebMail, Daum WebMail, Category = Web Mail All the Allow Routing Yahoo-Way2SMS WebMail, Rambler Mail, MSN-Way2SMS WebMail, Bebo WebMail, Orange Time Webmail, Web.De WebMail, SMTP Executable Attachment, Naver Mail, Telenet Webmail, Hush Authentication WebMail, Hotmail WebMail, QQ WebMail, 126 Mail, Excite Mail, Infoseek Webmail, Telenet.be Web System Services Mail, Goo Webmail, Gmail WebMail, Zimbra, Laposte Web Mail, Hyves WebMail, SquirrelMail Attachment, Gmail-Way2SMS WebMail, 1 & 1 Webmail SYSTEM Profiles Google Translate Android, Goober Messenger, Google Earth Application, Google Plus Web Chat, Hosts and Services Google Reader Android, Google Translate, Google Safebrowsing, Google Drive File Download, Category = File Transfer, Strea... Administration Tagoo.ru Music Streaming, Google Sky Android, Google Drive Base, Plugoo Widget, Google Drive Risk = 1-Very Low, 2- Backup & Firmware File Upload, Google Analytic, Goodreads Website, Google App Engine, Google Allo, Google Plus Website, Google Toolbar, Google Chrome Update, Google Chrome Installer, Google Duo, Tagoo Low, 3... All the Allow Certificates Website, iGoogle Applications, Google Location, Igoogle-Gtalk, Google Video Chat, Goodwizz Characteristics = Time Website, Google Video Website, Google Cache Search, Google Hangout Android App, Google Excessive Bandwidth,... Website, Goo Webmail, Google Video Streaming, Google wave Website, Google Desktop Technology = Browser Application, Google Street Android Based, Clien... Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#4755 3/6 18/4/2017 Sophos Application Application Filter Criteria Schedule Action Manage Log Viewer Help admin Applications HOME Imesh P2P, DC++ Connect P2P, PD Proxy, Soul Attempt P2P, Apple-Juice P2P, ProXPN Proxy, Napster P2P, Freegate Proxy, JAP Proxy, Ultrasurf Proxy, Your-Freedom Proxy, Ares P2P, Torrent Clients P2P, Hotspotshield Proxy, Securitykiss Proxy, MP3 Rocket Download, Morpheus P2P, MONITOR & ANALYZE Shareaza P2P, Manual Proxy Surfing, Bearshare P2P, TOR Proxy, Winny P2P, Invisible Surfing Proxy, Proxifier Proxy, Packetix Proxy, RealTunnel Proxy, Globosurf Proxy, HTTP-Tunnel Proxy, Control Center Kongshare PAropxplyic, aIttsioHni dLidset n Proxy, Dynapass Proxy, Hopster Proxy, GbridgAep VpPlicNa tPiorno Fxiylt, eHr ide-My- Traffic Shaping Default Current Activities IP Proxy, Hide-Your-IP Proxy, Proxyway Proxy, FreeVPN Proxy, CoralCDN Proxy, SOCK4 Proxy, Reports SOCK5 Proxy, Redirection Web-Proxy, Asproxy Web Proxy, Ghostsurf Proxy, Pingfu Proxy, Meebo Repeater Proxy, FreeU Proxy, Gtunnel Proxy, Klite Initiation P2P, Kugoo Playlist P2P, Launchwebs Diagnostics Proxy, DC++ Hub List P2P, Toonel, eMule P2P, NapMX Retrieve P2P, Vuze P2P, Pando P2P, Hide-IP Browser Proxy, Auto-Hide IP Proxy, Easy-Hide IP Proxy, Real-Hide IP Proxy, Proxy Switcher Proxy, PROTECT Max-Anonysurf Proxy, Flashget P2P, Piolet Initialization P2P, Piolet FileTransfer P2P, Ants IRC Firewall Connect P2P, Ants Initialization P2P, Phex P2P, Soulseek Retrieving P2P, Soulseek Download P2P, Tixati P2P, Hamachi VPN Streaming, MiddleSurf Proxy, Mute P2P, Ants P2P, DirectConnect Intrusion Prevention P2P, Miro P2P, RemoboVPN Proxy, Stealthnet P2P, Vedivi-VPN Proxy, VNN-VPN Proxy, WiFree Web Proxy, Expatshield Proxy, I2P Proxy, Spotflux Proxy, DC++ Download P2P, Peercast P2P, GoBoogy Applications Login P2P, Freenet P2P, HOS Proxy, 100BAO P2P, Fileguri P2P, Reduh Proxy, Socks2HTTP Proxy, Wireless PingTunnel Proxy, RPC over HTTP Proxy, Nateon Proxy, WinMX P2P, HTTPort Proxy, Zelune Proxy, K Proxy, Vtunnel Proxy, Circumventor Proxy, Glype Proxy, Surrogofier Proxy, Skydur Proxy, Email Camoproxy Proxy, Fly Proxy, Mega Proxy, PHProxy, Proxeasy Proxy, Proxeasy Web Proxy, Web Server Suresome Proxy, Njutrino Proxy, HTTP Tunnel Proxy, CyberGhost VPN Proxy, Psiphon Proxy, Advanced Threat Frozenway Proxy, Operamini Proxy, Simurgh Proxy, VPNium Proxy, SumRando, Cocoon, Gapp Proxy, CyberghostVPN Web Proxy, Tor2Web Proxy, Gnutella P2P, Manolito P2P Download, Manolito P2P Search, Manolito P2P Connect, Manolito P2P GetServer List, QQ Download P2P, AOL CONFIGURE Desktop, Telex, Air Proxy, OneClickVPN Proxy, SoMud, VPNMakers Proxy, Proxycap Proxy, Category = P2P, Proxy All the Deny VPN Wallcooler VPN Proxy, Tunnelbear Proxy Login, Tunnelbear Proxy Data, WebFreer Proxy, IP-Shield and Tunne... Time Network Proxy, Puff Proxy, Proxify-Tray Proxy, Avoidr Web Proxy, Aniscartujo Web Proxy, Proxyfree Web Proxy, Rxproxy Proxy, Proxmachine Proxy, Lok5 Proxy, Justproxy Proxy, Sslbrowser Proxy, Routing Sslpro.org Proxy, My-Addr(SSL) Proxy, Proxy-service.de Proxy, Proximize Proxy, Btunnel Proxy, Authentication Ctunnel Proxy, Mysslproxy Proxy, Ztunnel Proxy, Dtunnel Proxy, SSlunblock Proxy, Vpntunnel System Services Proxy, Netevader Proxy, Idhide Proxy, Hiddenvillage Proxy, Spinmyass Proxy, 4everproxy Proxy, Divavu Proxy, Bypassfw Proxy, Vpndirect Proxy, Kproxyagent Proxy, Privitize VPN Proxy, Kepard Proxy, CProxy Proxy, VeryCD, Classroom Spy, ZenMate, ShadeYouVPN, MediaGet P2P, Tunnel SYSTEM Guru, LimeWire, Tunnelier, SoftEther VPN, Hola, Onavo, Opera Off Road Mode, SurfEasy VPN, Profiles Cloud VPN, Anonymox, FinchVPN, Super VPN, Browsec VPN, DNSCrypt, Britishproxy.uk Proxy, Hosts and Services Chrome Reduce
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Antmonitor: a System for Monitoring from Mobile Devices
    AntMonitor: A System for Monitoring from Mobile Devices Anh Le Janus Varmarken Simon Langhoff CalIT2, UC Irvine IT Univ. of Copenhagen IT Univ. of Copenhagen [email protected] [email protected] [email protected] Anastasia Shuba Minas Gjoka Athina Markopoulou CalIT2, EECS, CPCC CalIT2, UC Irvine CalIT2, EECS, CPCC UC Irvine [email protected] UC Irvine [email protected] [email protected] ABSTRACT 1. INTRODUCTION We propose AntMonitor – a system for passive monitoring, Mobile devices, such as smart phones and tablets, have collection and analysis of fine-grained, large-scale packet become ubiquitous. With multiple wireless interfaces, in- measurements from Android devices. AntMonitor is the first cluding Wi-Fi and 3G/4G, these devices have persistent In- system of its kind that combines the following properties: (i) ternet connectivity throughout the day. In fact, the amount it provides participating users with fine-grained control of of traffic generated by these devices has grown rapidly in re- which data to contribute; (ii) it does not require administra- cent years and is expected to grow by 10 times in the next tive privileges; (iii) it supports client-side analysis of traffic; 5 years [1]. As a result, collecting and studying mobile net- and (iv) it supports collection of large-scale, fine-grained, work traffic has become a critical task in network infrastruc- and semantic-rich traffic. The first three properties benefit ture planning and Internet measurement research. mobile users, by giving them control over their privacy while There has been a rich body of literature that studies mo- also enabling a number of services to incentivize their par- bile network traffic [2, 3, 4, 5, 6].
    [Show full text]
  • Arxiv:1907.07120V1 [Cs.CY] 16 Jul 2019 1 Introduction That China Hindered Access to I2P by Poisoning DNS Resolu- Tions of the I2P Homepage and Three Reseed Servers
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • Implementation Single Account Pdc Vpn Based on Ldap
    IMPLEMENTATION SINGLE ACCOUNT PDC VPN BASED ON LDAP Gregorius Hendita Artha Kusuma Teknik Informatika, Fakultas Teknik Universitas Pancasila [email protected] Abstrak Data is an important for the company. Centralized data storage to facilitate users for accessing data in the company. Data will be stored centrally with PDC (Primary Domain Controller). Build communicate between head office and branch office requires high cost for each connection is not enough to ensure safety and security of data. Exchange data between head office and branch office should be kept confidential. VPN (Virtual Private Network) makes communication more efficient, not only the cost affordable that connection, security and safety will be the primary facility of VPN (Virtual Private Network). Service were established in the system will be integrated using LDAP (Lightweight Directory Access Protocol) to create a single account in each services such as PDC (Primary Domain Controller) and VPN (Virtual Private Network). The purposes of this final project to design and implementation a system centralized data storage and build communicate between head office and branch office are integrated with LDAP (Lighweight Active Directory Protocol). Hopefully this system can give more advantage to each network users. Keyword: PDC, VPN, LDAP, Single Account. I. Introduction previous workstations. To support the performance of the employees of the company of course has a Centralized data storage makes it easy for users variety of network services are formed in it such as to access data. many companies need a ftp, mail server, file sharing etc. These services of centralized storage system, because the data is course have their respective accounts.
    [Show full text]
  • Pentest-Report Tunnelbear VPN & Software 10.2020
    Dr.-Ing. Mario Heiderich, Cure53 Bielefelder Str. 14 D 10709 Berlin cure53.de · [email protected] Pentest-Report TunnelBear VPN & Software 10.2020 Cure53, Dr.-Ing. M. Heiderich, J. Larsson, M. Rupp, BSc. B. Walny, BSc. T.-C. “Filedescriptor” Hong, MSc. F. Fäßler, MSc. J. Hector, MSc. S. Moritz, MSc. N. Krein Index Introduction Scope Identified Vulnerabilities TB-08-001 API: Rate-limiting results in user-lockout (Medium) TB-08-007 FilterPods: Use of innerHTML leads to XSS in block page (Low) TB-08-010 FilterPods: Missing network restrictions allow access (High) TB-08-011 Web: Arbitrary redirect via Core2 route (Low) TB-08-019 Crypto: Known plain-text attack on sendLogs in AES (Medium) Miscellaneous Issues TB-08-002 Web: HTML injection in notification email via team name (Info) TB-08-003 Android: Secure flag missing on views (Info) TB-08-004 AWS: No KMS keys for SSE in SQS queues (Info) TB-08-005 Web: Error messages reveal internal information (Info) TB-08-006 Android: Unencrypted shared preferences and database (Info) TB-08-008 macOS : Hardening the Privileged Helper (Info) TB-08-009 Web: No HTTPS for data export link in emails (Low) TB-08-012 AWS: Expired ACM certificates (Info) TB-08-013 AWS: Insecure TLS Configuration Used (Medium) TB-08-014 AWS: DynamoDB encryption relies on AWS-owned keys (Medium) TB-08-015 AWS: Mutable ECR repositories (Info) TB-08-016 AWS: Insecure configuration on metadata instance (Medium) TB-08-017 AWS: Key-rotation process missing in IAM (Medium) TB-08-018 AWS: Stale and unused objects/roles in IAM (Info) Conclusions Cure53, Berlin · 11/12/20 1/28 Dr.-Ing.
    [Show full text]
  • Instant Messaging Market, 2009-2013 Executive Summary
    THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM 1900 EMBARCADERO ROAD, SUITE 206. • PALO ALTO, CA 94303 TEL. 650 322-8059 • FAX 650 322-8061 Instant Messaging Market, 2009-2013 Editor: Sara Radicati, Ph.D; Principal Analyst: Todd Yamasaki SCOPE This study examines the market for Instant Messaging (IM) solutions from 2009 to 2013. It provides extensive data regarding current installed base, broken out by region, business size, and other variables, including four year forecasts. This report also examines IM solution features, business strategies, plus product strengths and weaknesses. All market numbers, such as market size, forecasts, installed base, and any financial information presented in this study represent worldwide figures, unless otherwise indicated. All pricing numbers are expressed in $USD. METHODOLOGY The information and analysis in this report is based on primary research conducted by The Radicati Group, Inc. It consists of information collected from vendors, and users within global corporations via interviews and surveys. Secondary research sources have also been used, where appropriate, to cross-check the information collected. These include company annual reports and market size information from various market segments of the computer industry. EUROPE: 29E FITZJOHNS AVE • LONDON NW3 5JY • TEL. +44 (0)207 794 4298 • FAX. +44 (0)207 431 9375 e-mail: [email protected] http://www.radicati.com Instant Messaging Market, 2009-2013 – Executive Summary EXECUTIVE SUMMARY EXECUTIVE SUMMARY This study looks at the Instant Messaging market as comprising four different market segments: o Public IM networks – This segment includes free IM services which primarily target consumers, but are also prevalent amongst business users.
    [Show full text]
  • Survey of Instant Messaging Applications Encryption Methods
    Avrupa Bilim ve Teknoloji Dergisi European Journal of Science and Technology Cilt. 2, No. 4, S. 112-117, Haziran 2015 Vol. 2, No. 4, pp. 112-117, June 2015 © Telif hakkı EJOSAT’a aittir Copyright © 2014 EJOSAT Araştırma Makalesi www.ejosat.com ISSN:2148-2683 Research Article Survey of Instant Messaging Applications Encryption Methods Abdullah Talha Kabakus1*, Resul Kara2 1 Abant Izzet Baysal University, IT Center, 14280, Bolu, Turkey 2 Duzce University, Faculty of Engineering, Department of Computer Engineering, 81620, Duzce, Turkey (First received 15 February 2015 and in final form 29 May 2015) Abstract Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, and contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Realization (GSM), they are free to use and they only require internet connection which is the most common way of communication today. The critical point here is providing privacy of these messages in order to prevent any vulnerable points for hackers and cyber criminals. According to the latest research by PricewaterhouseCoopers, percentage of global cyber attacks is increased to 48% with 42.8 million detected incidents. Another report that is published by security company Postini indicates that 90% of instant messaging targeted threats are highly destructive worms. In this study, instant messaging applications encryption methods are comparatively presented.
    [Show full text]
  • Vysoké Učení Technické V Brně Detekcia Seedboxov V Sieti Bittorrent
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ FACULTY OF INFORMATION TECHNOLOGY ÚSTAV INFORMAČNÍCH SYSTÉMŮ DEPARTMENT OF INFORMATION SYSTEMS DETEKCIA SEEDBOXOV V SIETI BITTORRENT DETECTION OF SEEDBOXES INBITTORRENT NETWORK BAKALÁŘSKÁ PRÁCE BACHELOR’S THESIS AUTOR PRÁCE MARTIN GRNÁČ AUTHOR VEDOUCÍ PRÁCE Ing. LIBOR POLČÁK, Ph.D. SUPERVISOR BRNO 2018 Abstrakt Bakalárska práca sa venuje problematike sledovania a detekcie seedboxov v sieti BitTorrent za pomoci technológie netflow. V teoretickej časti je predstavená a popísaná architektúra P2P, základy a kľúčové pojmy architektúry BitTorrent a teoretická definícia seedboxu. Taktiež sú tu rozobrané metódy pomocou ktorých sa dá detekovať sieťová komunikácia a ďalej je uvedená analýza seedboxov v sieti a hľadanie ich charakteristík. Na základe týchto znalostí a sledovaní je navrhnutá sada nástrojov, ktoré napomáhajú ich detekcií. V praktickej časti je predstavená implementácia týchto nástrojov a výsledky ich testovania. Abstract Bachelor’s thesis is focused on issues with monitoring and detection of seedboxes in Bit- Torrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architec- ture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this kno- wledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools. Kľúčové slová BitTorrent, seedbox, detekcia, netflow, analýza, sieťová prevádzka, P2P, netflow Keywords BitTorrent, seedbox, detection, netflow, analysis, network traffic, P2P, netflow Citácia GRNÁČ, Martin.
    [Show full text]
  • Applications Log Viewer
    4/1/2017 Sophos Applications Log Viewer MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics Name * Mike App Filter PROTECT Description Based on Block filter avoidance apps Firewall Intrusion Prevention Web Enable Micro App Discovery Applications Wireless Email Web Server Advanced Threat CONFIGURE Application Application Filter Criteria Schedule Action VPN Network Category = Infrastructure, Netw... Routing Risk = 1-Very Low, 2- FTPS-Data, FTP-DataTransfer, FTP-Control, FTP Delete Request, FTP Upload Request, FTP Base, Low, 4... All the Allow Authentication FTPS, FTP Download Request Characteristics = Prone Time to misuse, Tra... System Services Technology = Client Server, Netwo... SYSTEM Profiles Category = File Transfer, Hosts and Services Confe... Risk = 3-Medium Administration All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Excessive Bandwidth,... Backup & Firmware Technology = Client Server Certificates Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#71826 1/4 4/1/2017 Sophos Application Application Filter Criteria Schedule Action Applications Log Viewer Facebook Applications, Docstoc Website, Facebook Plugin, MySpace Website, MySpace.cn Website, Twitter Website, Facebook Website, Bebo Website, Classmates Website, LinkedIN Compose Webmail, Digg Web Login, Flickr Website, Flickr Web Upload, Friendfeed Web Login, MONITOR & ANALYZE Hootsuite Web Login, Friendster Web Login, Hi5 Website, Facebook Video
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]