Be Aware You’re Uploading - BAYU Alok Vimawala Sr. Network Administrator University Housing University of Michigan

Slides:



Advertisements
Similar presentations
IM May 23-25, 2000 Evolution of IP Based Presence Services Evolution of IP-Based Presence Services Jonathan Rosenberg Chief.
Advertisements

Professional Development Management System (PDMS) A tutorial for professional development cluster Vendors, Providers and Instructors Charlie Michels PSB.
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
UCF Valencia West UCF Valencia Osceola
A walk through the world of Help Desk. When you realize you need help with your computer, phone, or printer, and your supervisor can not help, please.
If you want to meet someone you met online in person which should you do to stay safe? Meet at your school or church so you can get help if you need it.
Video Streaming and Online Classes Information and Instructions for Students University of Central Florida Regional Campuses.
Online Access to Grades at Serra High School
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
CareCentrix Direct Training.
The Registration Process REFERRING. Students are referred to Cyber School a number of different ways including: School Based Administration School Based.
Strengthening Password Policy via Outlook Features Password Policy and How-To Guide Richard Steiner December 16, 2003
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
What do I need to know?.   Instant Messages  Social Networking.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
UConn ECE is your opportunity to take UConn courses while still in high school. The UConn ECE courses you will take are equivalent to the same course at.
Your Website Chat & Live Customer Support Solution "Instant Customer GratificationSM" Brought to you by: Affordable Business Productivity and Communications.
Online Instruction Information and Instructions for Students UCF Valencia West UCF Valencia Osceola.
How to Apply for On-Campus Jobs Through MonsterTRAK Career Center.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
Alpha Media, Inc. Presents PinkNotes™ Plus “ Business Instant Messaging Software” Presented by, Mark S. Goldberg President Alpha Media, Inc.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
Created by Amber Craddock, Kylee Stone & Caleb Truette.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Help Desk A walk through the world of Help Desk. Realizing you need help When you realize you need help with your computer, phone, or printer, and your.
CS105 Lab 1 – Introduction Section: ??? TA: ??? ??? Announcements CITES Accounts Compass Netfiles Other Administrative Information CS105 Fall
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
How to Stop the Copier from Falling Off the Network.
Testing New Approaches Delivering CIS through Social Media Channels Martin Ledwick Cancer Research - UK.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Provided as a service to Indiana students and families by ISM Education Loans, in partnership with the Indiana Commission for Higher Education and Indiana.
Safety! Jessica Brown. What Is the Point of Having an Online Space? It needs to be Safe Clean And Efficient.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Skype A multimedia tool to use in and outside your classroom.
How to be an online student. How does it work? An online course follows a schedule and syllabus with due dates for assignments (just like an on-campus.
 Facebook  Twitter  MySpace  Windows LiveSpace.
©2007 Napa Valley College This presentation will help you: Collect necessary information Get your computer set up in 10 steps Ensure you are ready to.
Parent Guide for staying connected. To Begin using Skyward Family Access you will need:  A computer connected to the internet  A web browser (Windows.
Sonia Kalwaney My Wiki site s.com.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
SMARTworks ® EffectiveResponse Training: Call Center National Park Medical Center November 20, 2014.
1. Go to 2. Complete the requested information.
A Day of technology Improving upon your technology skills Giving every child the opportunity to learn in a robust digital environment everyday. making.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
1 EDUCAUSE live! November 23, 2009 Jack Bernard University of Michigan HEoA’s P2P pill: Wutza U ta do?
Welcome to Human Behavior and the Social Environment Dawn Burgess, Ed. D.
Put the EZ in eZ-Audit Ti Baker Session What is eZ-Audit? eZ-Audit is a web-based application that allows you to submit your financial statements.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
PMIS Introduction to Request New Catalog Item Training Presentation US Department of Health and Human Services.
Section 3 Opportunities Applicant Registration Instructions.
All Outreach Training Cards Requests will be submitted via the NEW ONLINE OUTREACH TRAINER PORTAL
Career Spot Videos The Menu Bar Easily update your information through these quick links Click on the icons to join us on Facebook & Twitter and get immediate.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
INTE 290 Summer 2015.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
TechKnowlogy Conference August 2, 2011 Using GoogleDocs for Collaboration.
POC Open House Welcome to the POC Open House. My name is _____ and today we will learn about the iPad Courses for the Month of September. If you have any.
Social Network Website for USEP
New Employee Orientation
ICOTS Helpdesk Training
The Social Networking revolution
Internet Safety – Social Media
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

Be Aware You’re Uploading - BAYU Alok Vimawala Sr. Network Administrator University Housing University of Michigan Alok Vimawala Sr. Network Administrator University Housing University of Michigan

What is BAYU? BAYU is a new program started by the University of Michigan It s students, that live in residence halls, when they are detected engaging in peer-to-peer (p2p) uploading

When did BAYU start? BAYU was introduced on October 30, 2007 University officials were discussing putting something in place to make students more aware of their online activities for some time

Who is affected by BAYU? BAYU is targeted towards students living in on-campus housing 15 residence halls and 1 apartment community The program covers approximately 10,000 individual that live on campus

How does BAYU work?

1. Student uploads data using a p2p protocol (bittorrent, gnutella, etc.) 2. The upload is detected by the PacketShaper ® 3. Every 10 minutes, a computer program connects to the PacketShaper ® and retrieves data about uploads detected by the PacketShaper ®

How does BAYU work? 4. The computer program determines the user responsible for the upload by checking with network registration systems in place at the University of Michigan 5. The program notifies the responsible user via

What technologies are used by BAYU? Linux Perl Oracle

Do I really need all of them? The technologies BAYU depends on are not set in stone. It just needs the following: A way to detect p2p uploads A way to relate uploaders to users A way to notify users that they were seen uploading

How often are users ed? Notifications are limited to once every 24 hours If a user was detected and ed 5 hours ago, he will not be ed now The 24 hour window is customizable per user and can be as small as 10 minutes long (every time the program is executed)

What does the say?

Help! I received a BAYU notification What avenues do students have for support? -Web based support - support -Phone support -In-person support

BAYU home page

BAYU help page

What if I don’t want to receive these s? Users can opt-out of receiving the s via a website Users can opt-out only if they have received a BAYU notification to ensure that users don’t “preemptively” opt-out The user will not be notified for the remainder of the term

BAYU opt-out page

support Students can reply to the BAYU notification and the reply goes to real people Another avenue for contact It seemed “natural” for students to want to reply directly to the address that sent the instead of visiting a link in the

Phone support Two different help-desks answer BAYU related calls Help-desks provide a basic level of support Common questions or complaints are addressed by the help-desks

Common questions Turning off notifications I am not sure what these notifications mean Please stop ing me! What triggered the notification -IP Address -Protocol

Common solutions False positive -World of Warcraft -Electric sheep screen saver Command-control traffic Inadvertently registered someone else -Rogue wireless access point -Registered a friend’s machine

In-person support One (soon to be two) walk-up computer support center for students residing on- campus Disabling p2p uploading Uninstallation of p2p applications

Privacy concerns How much does BAYU know? How long does BAYU keep that information?

What does BAYU know? Whether the user was ed within the past 24 hours How often to the user Whether the user has opted-out of receiving s

How much information does BAYU store? One week worth of notification and detection data One term worth of opt-out information One term worth of information about detected users Aggregate data about the program

How much information does BAYU store? Every time the program is executes it also stores the following aggregate data: -Number of users detected -Number of messages sent -Number of messages not sent due to users opting- out and also due to notification frequency -Total number of users detected to date -Total number of users that opted-out to date

Does BAYU work? How does one measure the effectiveness of the program? -Decrease in number of uploads detected? -Decrease in number of copyright take-down notices? -Criteria still evolving

Student response

Outside response

Future work Better detection of protocols Increasing the number of protocols that trigger a notification Widening the scope of the service to possibly cover wireless users Better tools for administrators of the program

Questions? Comments?