Breaking the DSL Speed Barrier打破的DSL速度障礙_第1頁
Breaking the DSL Speed Barrier打破的DSL速度障礙_第2頁
Breaking the DSL Speed Barrier打破的DSL速度障礙_第3頁
Breaking the DSL Speed Barrier打破的DSL速度障礙_第4頁
Breaking the DSL Speed Barrier打破的DSL速度障礙_第5頁
已閱讀5頁,還剩12頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

1、Internet Filtering,What it is and isnt,Paul Brooks .au,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,2,Problem,Or is it a problem?,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,3,Agenda,The Internet The InterWeb Not-the-InterWeb,in 15 minutes,10th March 2008,TCCM Cyber Sa

2、vvy - March 2008 - (c) Layer10,4,The Internet filtering points,Network (ISP) Filtering User-side Filtering User Filtering,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,5,ISP Network Filtering,Typical ISP Network Diagram for end-user connection,10th March 2008,TCCM Cyber Savvy - March 2

3、008 - (c) Layer10,6,The Interweb WWW requests,User asks for .ru/pornpics,Block DNS request ISP first has to know .ru is to be blocked needs prior notification Thousands of names can point to same address User can bypass DNS request by just using the IP address in the browser Blocks every website on

4、that machine name ? Massive collateral damage,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,7,The Interweb WWW requests,User asks for .ru/pornpics,Block IP address ISP first has to know is to be blocked needs prior notification Thousands of sites can be hosted on the same

5、IP address massive collateral damage HTTP can use any port number, not just port 80 under control of the site so have to block all connectivity for all applications Golden opportunity for Denial of Service deliberately host inappropriate content on ,10th March 2008,TCCM Cyber Savvy - March 2008 - (c

6、) Layer10,8,The Interweb WWW requests,User asks for .ru/pornpics,Deep Packet Inspection Attempts to look deep into packet contents to identify application, try to classify packets in real time and identify signatures of bad stuff e.g. reconstruct images on the fly look for excessive flesh tones,Howe

7、ver Doesnt scale bandwidth required and number of images to be analysed increasing faster than Moores Law Still images being surpassed by streaming movies impossible to analyse all movies/videos streaming in real time Forces all content through a gatekeeper box poor reliability Indiscriminate Blocks

8、 medical sites, school swimming carnivals, baby photos. Defeated by Secure HTTP encrypted webpages, identical to online banking,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,9,Network Filter where?,Upstream Provider Link? Most ISPs have 3 30 upstream providers Peering Points no provide

9、r In the ISPs Core? Single point of failure Poor performance of trombone traffic paths Huge traffic increase multiply cost of longhaul transmission Misses content generated by other users of the same ISP At the PoP Most ISPs will need 5 - 30 gatekeeper boxes! great idea if you sell gatekeeper boxes,

10、 not practical in real networks,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,10,Fundamental Issues,ISP-level filters cant tell if you are accessing photos of your own kids, or someone elses ISP-level filters cant tell the age of the user requesting the photo can only be used for verif

11、ied illegal content, not for inappropriate content Easily circumvented using public anonymous proxy sites the URL the ISP sees is completely different from the eventual URL being accessed Easily circumvented by encrypted webpages HTTPS, SSL encryption,10th March 2008,TCCM Cyber Savvy - March 2008 -

12、(c) Layer10,11,User-side Filtering,Software filter on a users PC Can be customised per user Mums level of filtering can be different from children Mum must remember to log out, or the next person to the keyboard uses her permissions Lists of inappropriate sites needs to be kept up to date Relatively

13、 easy to work around public proxies, admin user can disable Generally complicated for an unsophisticated user to install and keep up to date,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,12,Not-the-InterWeb,The Internet, and inappropriate content, is not just exchanged using HTTP (WWW)

14、 Email USENET aka Network News Peer-to-peer e.g. bittorrent RSS - Podcasts Instant Messenger MSN, Yahoo, etc Skype .and many others,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,13,USENET News,Message boards, Predates WWW 50,000 newsgroups active,10th March 2008,TCCM Cyber Savvy - Marc

15、h 2008 - (c) Layer10,14,USENET news,Messages are like Email text encoded attachments Images split into dozens or hundreds of messages Messages can be distributed across multiple newsgroups Until all parts of a binary document (image, program, zip-file, movie) are received, the binary document cannot

16、 be reconstructed and analysed Even if it is inappropriate content, no way to block it until it has already been distributed,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,15,Files broken into hundreds of small pieces Central torrent servers only have lists of peers with pieces, no cont

17、ent themselves Collect pieces from hundreds of PCs while serving your pieces to hundreds that need them Looks to the ISP network like hundreds of random connections to other random IP addresses Can be encrypted - no way of knowing what is inside the files No way to analyse files until all pieces are downloaded Cannot be blocked once started the swarm of active sharers is self-sustaining,Peer-to-peer transfers,10th March 2008,TCCM Cyber Savvy - March 2008 - (c) Layer10,16,What it isnt,ISP-level filtering is not very effective too easy to go too far,

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論