breaking the dsl speed barrier打破的dsl速度障碍_第1页
breaking the dsl speed barrier打破的dsl速度障碍_第2页
breaking the dsl speed barrier打破的dsl速度障碍_第3页
breaking the dsl speed barrier打破的dsl速度障碍_第4页
breaking the dsl speed barrier打破的dsl速度障碍_第5页
已阅读5页,还剩12页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Internet Filtering,What it is and isnt,Paul B.au,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,2,Problem,Or is it a problem?,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,3,Agenda,The InternetThe InterWebNot-the-InterWeb,in 15 minutes,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,4,The Internet filtering points,Network (ISP) FilteringUser-side FilteringUser Filtering,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,5,ISP Network Filtering,Typical ISP Network Diagram for end-user connection,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,6,The Interweb WWW requests,User asks for .ru/pornpics,Block DNS requestISP first has to know .ru is to be blocked needs prior notificationThousands of names can point to same addressUser can bypass DNS request by just using the IP address in the browserBlocks every website on that machine name ? Massive collateral damage,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,7,The Interweb WWW requests,User asks for .ru/pornpics,Block IP addressISP first has to know is to be blocked needs prior notificationThousands of sites can be hosted on the same IP address massive collateral damageHTTP can use any port number, not just port 80 under control of the site so have to block all connectivity for all applicationsGolden opportunity for Denial of Service deliberately host inappropriate content on /user/fakename,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,8,The Interweb WWW requests,User asks for .ru/pornpics,Deep Packet InspectionAttempts to look deep into packet contents to identify application, try to classify packets in real time and identify signatures of bad stuffe.g. reconstruct images on the fly look for excessive flesh tones,HoweverDoesnt scale bandwidth required and number of images to be analysed increasing faster than Moores LawStill images being surpassed by streaming movies impossible to analyse all movies/videos streaming in real timeForces all content through a gatekeeper box poor reliabilityIndiscriminate Blocks medical sites, school swimming carnivals, baby photos.Defeated by Secure HTTP encrypted webpages, identical to online banking,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,9,Network Filter where?,Upstream Provider Link?Most ISPs have 3 30 upstream providersPeering Points no providerIn the ISPs Core?Single point of failurePoor performance of trombone traffic pathsHuge traffic increase multiply cost of longhaul transmissionMisses content generated by other users of the same ISPAt the PoPMost ISPs will need 5 - 30 gatekeeper boxes!great idea if you sell gatekeeper boxes, not practical in real networks,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,10,Fundamental Issues,ISP-level filters cant tell if you are accessing photos of your own kids, or someone elsesISP-level filters cant tell the age of the user requesting the photo can only be used for verified illegal content, not for inappropriate contentEasily circumvented using public anonymous proxy sites the URL the ISP sees is completely different from the eventual URL being accessedEasily circumvented by encrypted webpages HTTPS, SSL encryption,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,11,User-side Filtering,Software filter on a users PCCan be customised per user Mums level of filtering can be different from childrenMum must remember to log out, or the next person to the keyboard uses her permissionsLists of inappropriate sites needs to be kept up to dateRelatively easy to work around public proxies, admin user can disableGenerally complicated for an unsophisticated user to install and keep up to date,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,12,Not-the-InterWeb,The Internet, and inappropriate content, is not just exchanged using HTTP (WWW)EmailUSENET aka Network NewsPeer-to-peer e.g. bittorrentRSS - PodcastsInstant Messenger MSN, Yahoo, etcSkype.and many others,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,13,USENET News,Message boards, Predates WWW50,000 newsgroups active,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,14,USENET news,Messages are like Email text encoded attachmentsImages split into dozens or hundreds of messagesMessages can be distributed across multiple newsgroupsUntil all parts of a binary document (image, program, zip-file, movie) are received, the binary document cannot be reconstructed and analysedEven if it is inappropriate content, no way to block it until it has already been distributed,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,15,Files broken into hundreds of small piecesCentral torrent servers only have lists of peers with pieces, no content themselvesCollect pieces from hundreds of PCs while serving your pieces to hundreds that need themLooks to the ISP network like hundreds of random connections to other random IP addressesCan be encrypted - no way of knowing what is inside the filesNo way to analyse files until all pieces are downloadedCannot be blocked once started the swarm of active sharers is self-sustaining,Peer-to-peer transfers,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,16,What it isnt,ISP-level filtering is not very effective too easy to go too far, and doesnt solve the

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论