Information and Communication Systems

Total Page:16

File Type:pdf, Size:1020Kb

Information and Communication Systems Systems Development Laboratory Information and Communication Systems Information Service Laboratory Hitachi, Ltd., Web site【1st July 2010 News Release】 http://www.hitachi.co.jp/New/cnews/month/2010/07/0701.html 99.78% detection accuracy in 7 types of P2P file-sharing software including Winny ■ Sponsored research from the Ministry of Characteristics Internal Affairs and Communications. 1. High-speed detection of P2P communication Instead of analyzing every packet in a Detection accuracy of 99.78% for P2P file sharing software Script files for defining communication, the developed software inspects Packet on a broadband link detection procedures only the first packet showing characteristics of P2P packet PerfectDark (10Gbit/s) Winny WinMX packet … communication, thereby achieving high-speed processing. Flow First Filtering Detection <①First-Packet-Pass-filter technology> analyzing packet process Decoding Detection results process process process 2. High-accuracy detection of encrypted P2P communication Public key The developed decryption technology detects packet RSA DSA ECDSA cryptography encrypted P2P communication with high accuracy. Symmetric key RCx xDES AES Flow cryptography <②High-accuracy detection technology> information Hash function MD-x SHA-x CRC-x code module samples ■File sharing software detected Winny, Winnyp, Perfect Dark, Bit torrent, Lime Wire, ①First Packet ②High-accuracy Pass filter technology detection technology WinMX, share * 90% of domestic P2P file sharing software users covered Experiment done on the Internet simulator of NICT Hokuriku Research Center「StarBED」 ■A word from the development team P2P (Peer to Peer) file sharing software, such as Winny, while enabling users to easily and directly share music and movie files, also carries with it the risk of virus We will work towards the practical use of the contamination resulting in socially damaging information leaks. Hitachi has developed a software, covering detection and control of P2P high-speed software for detecting P2P file sharing software. Evaluation tests communications and contribute to resolving demonstrated that seven types of file sharing software were detected with an accuracy of problems with network security. 99.78% on a 10Gbit/s broadband link. ©2010 Hitachi, Ltd., Research & Development Group. All rights reserved. Issued by R&D Group, Hitachi, Ltd. NRD 10-0701.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • View the Dichotomies in Computer Game Studies in More Detail
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2008 A Burkean Analysis on the Relationship of the Image to Player Motivation in First- Person Shooter Games Toby McCall Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES A BURKEAN ANALYSIS ON THE RELATIONSHIP OF THE IMAGE TO PLAYER MOTIVATION IN FIRST-PERSON SHOOTER GAMES By TOBY MCCALL A Thesis submitted to the Department of English in partial fulfillment of the requirements for the degree of Master of Arts Degree Awarded: Summer, 2008 Copyright © 2008 Toby McCall All Rights Reserved The members of the Committee approve the thesis of Toby McCall defended on March 26, 2008. _______________________________ Kathleen Yancey Professor Directing Thesis _______________________________ Phil Steinberg Outside Committee Member _______________________________ Kristie Fleckenstein Committee Member _______________________________ Michael Neal Committee Member Approved: _______________________________ Ralph Berry Chair, Department of English The Office of Graduate Studies has verified and approved the above named committee members. ii I dedicate this work to my mother Joseyvette Jackson, who sacrificed much of her own life so that I might have opportunities she did not. Thanks Mom. iii ACKNOWLEDGMENTS I would like to thank my committee for their feedback and encouragement during this process, especially Kathleen Blake-Yancey who kept me sane and on track despite her own busy schedule; Ian Bogost, Steffen P. Walz and Noah Wardrip-Fruin for their input and time; my brother for his unending support; and my friends Chris Findeisen (Knuckles Malloy), Brianna Noll (Icechest Jones) and Dustin Atkinson (KGB Fontenot) for reminding me to relax, have fun, and play Rock Band; to Kelly Powers for his friendship and guidance.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Vysoké Učení Technické V Brně Detekcia Seedboxov V Sieti Bittorrent
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ FACULTY OF INFORMATION TECHNOLOGY ÚSTAV INFORMAČNÍCH SYSTÉMŮ DEPARTMENT OF INFORMATION SYSTEMS DETEKCIA SEEDBOXOV V SIETI BITTORRENT DETECTION OF SEEDBOXES INBITTORRENT NETWORK BAKALÁŘSKÁ PRÁCE BACHELOR’S THESIS AUTOR PRÁCE MARTIN GRNÁČ AUTHOR VEDOUCÍ PRÁCE Ing. LIBOR POLČÁK, Ph.D. SUPERVISOR BRNO 2018 Abstrakt Bakalárska práca sa venuje problematike sledovania a detekcie seedboxov v sieti BitTorrent za pomoci technológie netflow. V teoretickej časti je predstavená a popísaná architektúra P2P, základy a kľúčové pojmy architektúry BitTorrent a teoretická definícia seedboxu. Taktiež sú tu rozobrané metódy pomocou ktorých sa dá detekovať sieťová komunikácia a ďalej je uvedená analýza seedboxov v sieti a hľadanie ich charakteristík. Na základe týchto znalostí a sledovaní je navrhnutá sada nástrojov, ktoré napomáhajú ich detekcií. V praktickej časti je predstavená implementácia týchto nástrojov a výsledky ich testovania. Abstract Bachelor’s thesis is focused on issues with monitoring and detection of seedboxes in Bit- Torrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architec- ture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this kno- wledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools. Kľúčové slová BitTorrent, seedbox, detekcia, netflow, analýza, sieťová prevádzka, P2P, netflow Keywords BitTorrent, seedbox, detection, netflow, analysis, network traffic, P2P, netflow Citácia GRNÁČ, Martin.
    [Show full text]
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Beat the Heat! Come Inside! Cool
    PAGE TWENTY-FOUR F R ID A Y , J U L Y 18, 1989 Manrbt'Btipr lEtic^rnttg iimlb ATHRge Dait)r N et P raw Run Var The Week Ended June M, IMk The Weather Fair, .(Cooler, less humid to­ >15,459 day. Low In the 6(>s. High Sun­ day 80 to 85. ■ ManeheUer— 4 City of ViUofe Charm 1 VOL. LXXXVin. NO. 246 (SIXTEEN PAGES—TV SECnON) MANCHESTER, CONN., SA-TURDAY, JULY 19, 1969 (TMeatned AdvertWng on Page 1 8 ) PRICE TEN CENTS 8'V*-' A 'v\ V: \*/ On Tarfret ^ r ^ C \ O f ^ r i ( .............................f l l ( / 0........................................ \ .... ................................................ ........... BEAT THE HEAT! COME INSIDE! COOL OFR Moon Blots Out Sun Apollo ]^ears Goal; V SAVE WITH THESE VALUABLE COUPONS TONIGHT and SATURDAY ■sS' By HOWARD BENEDICT two days of g r ^ t human ad­ He also reported a brilliant AP Aerospace Writer DON'T FORGET TO CHECK ALL STORES — IF YOU FIND YOUR venture. solar corona as the moon ec­ SPACE CENTER, Houshm As they darted Into an arejs lipsed all but the halo of gases (A P ) — Apollo U’b explorers where the moon blotted out the surrounding the stki. NAME POSTED — YOU'RE A LUCKY WINNER! raced Into the shadow of the sunUght at 8:60 a.m. EOT, com­ “ It. looks like an eerie sight," moon today and reported a mander Nell A. Armstrong re­ the Apollo H commander said. spectacular final sighting of ported picking out lunar fea­ Armstrong, Edwin E. Aldrln their tatget as they prepared tures Illuminated by light re­ Jr.
    [Show full text]
  • ISP Liability in the Field of Copyright
    Internet Service Providers’ Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law WIPO International Seminar on Copyright Jointly organized by WIPO and the Ministry of Culture of Brazil 26 November 2008 A/Prof Daniel Seng Faculty of Law, National University of Singapore 1 Internet Intermediaries • Who is an Internet “service provider”? – Infrastructure intermediaries e.g. Internet Access Service Providers, proxies, DNS – Services intermediaries e.g. search engines, archives – Software developers of networks and connectivity tools e.g. FreeNet, Kazaa, Morpheus – Operators and hosting companies e.g. content hosts, exchange platforms, forums – Diverse types of intermediaries with different roles offering different services • Are intermediaries liable for: – Direct liability e.g. reproductions, communication of works on their infrastructure? – Indirect/secondary liability e.g. authorising or facilitating the infringement of their users/subscribers? 2 Developments Worldwide • Legislative Developments to Protect Internet Service Providers – WIPO Copyright and Performances and Phonograms Treaties 1996 – US Digital Millennium Copyright Act 1998 – Australian Copyright Amendment (Digital Agenda) Act 2000 – EU Information Society and E-Commerce Directives 2001 – Singapore Copyright Amendment Act 2005 – HK Copyright (Amendment) Bill (proposed, 2007) – New Zealand Copyright (New Technologies) Amendment Act 2008 – France, “Three-Strikes” Law (4 Nov 2008); cf: U.K.’s “Graduated Response” Law 3 Litigation Worldwide • Exposure of
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow
    Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow To cite this version: Ricci Ieong, Kam-Pui Chow. Validation Rules for Enhanced Foxy P2P Network Investigations. 10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73- 83, 10.1007/978-3-662-44952-3_6. hal-01393761 HAL Id: hal-01393761 https://hal.inria.fr/hal-01393761 Submitted on 8 Nov 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Chapter 6 VALIDATION RULES FOR ENHANCED FOXY P2P NETWORK INVESTIGATIONS Ricci Ieong and Kam-Pui Chow Abstract Experiments with the Foxy P2P network have demonstrated that the first uploader of a file can be identified when search queries are sub- mitted to all the network nodes during initial file sharing. However, in real Foxy networks, file search queries are not transmitted to the entire Foxy network and this process may not identify the first uploader. This paper presents a set of validation rules that validate the observed first uploader. The validation rules define the seeder curve that consistently describes the number of uploaders over time.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]