版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Internet Filtering,What it is and isnt,Paul Brooks .au,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,2,Problem,Or is it a problem?,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,3,Agenda,The Internet The InterWeb Not-the-InterWeb,in 15 minutes,10th March 2008,TCCM Cyber Sa
2、vvy - March 2008 - (c) Layer10,4,The Internet filtering points,Network (ISP) Filtering User-side Filtering User Filtering,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,5,ISP Network Filtering,Typical ISP Network Diagram for end-user connection,10th March 2008,TCCM Cyber Savvy - March 2
3、008 - (c) Layer10,6,The Interweb WWW requests,User asks for .ru/pornpics,Block DNS request ISP first has to know .ru is to be blocked needs prior notification Thousands of names can point to same address User can bypass DNS request by just using the IP address in the browser Blocks every website on
4、that machine name ? Massive collateral damage,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,7,The Interweb WWW requests,User asks for .ru/pornpics,Block IP address ISP first has to know is to be blocked needs prior notification Thousands of sites can be hosted on the same
5、IP address massive collateral damage HTTP can use any port number, not just port 80 under control of the site so have to block all connectivity for all applications Golden opportunity for Denial of Service deliberately host inappropriate content on ,10th March 2008,TCCM Cyber Savvy - March 2008 - (c
6、) Layer10,8,The Interweb WWW requests,User asks for .ru/pornpics,Deep Packet Inspection Attempts to look deep into packet contents to identify application, try to classify packets in real time and identify signatures of bad stuff e.g. reconstruct images on the fly look for excessive flesh tones,Howe
7、ver Doesnt scale bandwidth required and number of images to be analysed increasing faster than Moores Law Still images being surpassed by streaming movies impossible to analyse all movies/videos streaming in real time Forces all content through a gatekeeper box poor reliability Indiscriminate Blocks
8、 medical sites, school swimming carnivals, baby photos. Defeated by Secure HTTP encrypted webpages, identical to online banking,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,9,Network Filter where?,Upstream Provider Link? Most ISPs have 3 30 upstream providers Peering Points no provide
9、r In the ISPs Core? Single point of failure Poor performance of trombone traffic paths Huge traffic increase multiply cost of longhaul transmission Misses content generated by other users of the same ISP At the PoP Most ISPs will need 5 - 30 gatekeeper boxes! great idea if you sell gatekeeper boxes,
10、 not practical in real networks,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,10,Fundamental Issues,ISP-level filters cant tell if you are accessing photos of your own kids, or someone elses ISP-level filters cant tell the age of the user requesting the photo can only be used for verif
11、ied illegal content, not for inappropriate content Easily circumvented using public anonymous proxy sites the URL the ISP sees is completely different from the eventual URL being accessed Easily circumvented by encrypted webpages HTTPS, SSL encryption,10th March 2008,TCCM Cyber Savvy - March 2008 -
12、(c) Layer10,11,User-side Filtering,Software filter on a users PC Can be customised per user Mums level of filtering can be different from children Mum must remember to log out, or the next person to the keyboard uses her permissions Lists of inappropriate sites needs to be kept up to date Relatively
13、 easy to work around public proxies, admin user can disable Generally complicated for an unsophisticated user to install and keep up to date,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,12,Not-the-InterWeb,The Internet, and inappropriate content, is not just exchanged using HTTP (WWW)
14、 Email USENET aka Network News Peer-to-peer e.g. bittorrent RSS - Podcasts Instant Messenger MSN, Yahoo, etc Skype .and many others,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,13,USENET News,Message boards, Predates WWW 50,000 newsgroups active,10th March 2008,TCCM Cyber Savvy - Marc
15、h 2008 - (c) Layer10,14,USENET news,Messages are like Email text encoded attachments Images split into dozens or hundreds of messages Messages can be distributed across multiple newsgroups Until all parts of a binary document (image, program, zip-file, movie) are received, the binary document cannot
16、 be reconstructed and analysed Even if it is inappropriate content, no way to block it until it has already been distributed,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,15,Files broken into hundreds of small pieces Central torrent servers only have lists of peers with pieces, no cont
17、ent themselves Collect pieces from hundreds of PCs while serving your pieces to hundreds that need them Looks to the ISP network like hundreds of random connections to other random IP addresses Can be encrypted - no way of knowing what is inside the files No way to analyse files until all pieces are downloaded Cannot be blocked once started the swarm of active sharers is self-sustaining,Peer-to-peer transfers,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,16,What it isnt,ISP-level filtering is not very effective too easy to go too far,
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 五年级二十年后的家乡单元作文
- 安全工作演讲稿汇编15篇
- 2023年幼儿园安全工作计划10篇
- 财务会计个人辞职报告集合8篇
- 一次有趣的游戏初一日记400字5篇
- 北京市通州区2024-2025学年八年级上学期期末考试道德与法治试卷(含答案)
- 2025年工程瑞雷波仪项目合作计划书
- 国培计划心得体会
- 汽车三方租赁合同
- 商铺租房协议范本
- 文化创意合作战略协议
- 国家开放大学法学本科《商法》历年期末考试试题及答案题库
- 金匮要略知到智慧树章节测试课后答案2024年秋浙江中医药大学
- 【MOOC】有机化学实验-南京工业大学 中国大学慕课MOOC答案
- 2024年妇保科工作总结及计划
- 北京理工大学《数据结构与算法设计》2022-2023学年第一学期期末试卷
- 锚杆(索)支护工技能理论考试题库200题(含答案)
- 影视后期制作团队薪酬激励方案
- 2024年公安机关理论考试题库500道
- 2024年中国主题公园竞争力评价报告-中国主题公园研究院
- 2024年有限合伙股权代持
评论
0/150
提交评论