Download presentation
Presentation is loading. Please wait.
Published byBerniece Dorsey Modified over 9 years ago
1
www.audiblemagic.com Taming the P2P Leviathan with the CopySense™ Network Appliance Intelligent P2P Control for the Network Presented to Council for Christian Colleges and Universities Technology Conference 2006 Bridget Mercay Audible Magic Corporation www.audiblemagic.com/education 408.399.6405
2
Company Confidential About Audible Magic Based in Silicon Valley. Founded in 1999 with background in copyrighted content tracking and control CopySense based on patented technology 1. Content identification/filtering - 1993 2. Passive network monitoring and control – 1996 Supported by content industries 1. Over 5,000 pre-release digital format creative works registered each week 2. Approx. 5 Million fingerprints in the database
3
Company Confidential Risks Today With P2P File Sharing Copyright infringement lawsuits Record industry infringement lawsuits are front page press Copyright holders are seeking damages of up to $250,000 per infringement Allow non-registered works to be freely shared IT/Network security issues Viruses written specifically for P2P Spyware, Adware, Swarming Potential loss of personnel information/student records Internal sexual harassment lawsuits People who have been subjected to harmful work settings can sue for up to $300,000 in compensatory and punitive damages Potential enrollment dips, parental complaints
4
Company Confidential Segment 1 “It is a problem and we need to take proactive measures” Segment 2 “It is a problem and we are complying with the law” The University Approach To P2P
5
Company Confidential Audible Magic’s Approach To P2P P2P is a great technology! It is not the problem Sharing copyrighted and porn materials are the issue Most university policy allows the monitoring of content for virus and spam filtering. Treat offending P2P files like a computer virus 1. Build a registry of protected works 2. Match transmitted files to registry in real-time 3. Provide business rules for taking action Block registered works Allow non-registered works to be freely shared Ensure academic freedom and privacy by focusing on illegal transfers instead of on users
6
Company Confidential Current Pitfalls Swarming Packet shapers and firewalls deny connections to large files. P2P protocols break up 1 large file into multiple small files to get around this. The small files come from hundreds of sources and are compiled on the inside bypassing current security solutions. The student now has the movie, music or porn. Port 80 throughput Most P2P protocols are using port 80 or port 443. Blocking these ports is not a realistic option.
7
Company Confidential CopySense™ Appliance Flexibility Filter (block offending files) Copyrighted files Pornography Child pornography Block all P2P Limit P2P Throttle bandwidth Kill packet sent to both sides for TCP and UDP packets once threshold is met Schedule filtering periods, blocking periods or bandwidth allocations
8
Company Confidential Easy 30 minute or less setup and configuration control CopySense™ Appliance Internet Router or Switch monitor No software to install Operates as a ‘pass-by’ device Not inline No impact on normal traffic No effect on network reliability Uploads Downloads No training required 30 minute set up Web browser interface Automatic updates
9
Company Confidential Comprehensive Coverage of P2P Systems Aimster Amster Ares AudioGalaxy AutoNap Bearshare BeNapster BitchX BitTorrent Blazter Blubster Bodetella CLT Cooltella Crapster Console Napster DC++ DeWrapster DiaRRIA DietK DirectConnect DJnap Edonkey Emule Fanster File Navigator FiletopiaXfer FreeNet. Freewire FurtherNet. Furi FurtherClient Gnap Gnapster Gnome-Napster Gnewtella Gnewtella 2 GnOtella GnuCache Gnucleus Gnujatella Gnotella Gnumm Gnuspace Gnut Gnute Gnutmeg Gnutella Crawler Gnutella/Windows Gnutella/Mac Gnutella2UDP Gnutella.it Gnutella Web Gobobo GTK-Gnutella GTK- Napster Grokster Hackster Hagelslag iMesh iNapster IRC-DCC JNap J Napster Jnerve KaZaA KaZaA Lite KNapster Koog Epsilon Limewire Lopster Mactella Macstar Madster Morpheus Music City Mutella MyGnut MyNapster MyTella N-Tella NapAmp Napigator Napkin NapMan Napsack NapShare Napster Napster/2 Napster for Beos.htm Napsterminator Napster nban Napster-Linux Netstreak iAssimilator Newtella Pakster PeaGnut PEERanha Phex Pi Piolet Pygnut Qtella Rapigator Rapster Reflector Riscster RockitNet SeachLord Shareaza Shuban SongSpy SpinFrenzy Tellaseek Toadnode Twister ScourExchange Snap Spyster SwapNut Swapper TekNap TKNap ToadNode Unwrapper Webnap Wrapster XoloX
10
Company Confidential Before and After Shot
11
Company Confidential Screenshot: rules page Time of day rules Simple Control You Decide What Content To Block, If Any You Choose How Strong the Filter Will Be
12
Company Confidential Screenshot: what is being traded
13
Company Confidential Restricted Reports Version Comprehensive Reports Version
14
Company Confidential Screenshot: blocked p2p transfers
15
Company Confidential Green: Total traffic. Blue: p2p traffic
16
Company Confidential Restricted Reporting Protects Users’ Privacy
17
Company Confidential CopySense Appliance Pricing Product Purchase Based upon bandwidth Range from $5,000 (DSL) to $55,000 (OC3) Support OC12+ Technical Support and Software Updates Annual fee of 17% of hardware purchase Database Subscription Annual fee of 5% of hardware purchase Educational discounts up to 20%
18
Company Confidential CopySense™ Network Appliance Non in-line network appliance P2P control mapped to organization policies Manages P2P to/from Internet & among LAN users
19
Company Confidential CopySense™ Appliance Administration & Security Simple Internet browser user interface for the appliance Appliance administration only responds to IP addresses you designate No software to install (or be hacked) on any of your servers or clients
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.