Upload
daniel-shaw
View
214
Download
0
Embed Size (px)
Citation preview
1
Automated Copyright Notice System (ACNS)
September 2003
UNIVERSAL MUSIC GROUP
UNIVERSAL STUDIOS
2
ACNS Proposal
• Contact Information:
– Aaron MarkhamUniversal [email protected]
– Christopher BellUniversal Music [email protected]
3
ACNS Proposal
• Background:
– Universal has submitted the ACNS proposal to the RFI from the Technology Task Force of the “Colleges Joint Committee of the Higher Education and Entertainment Communities”.
– Universal is arranging tests and pilots with technology vendors and interested parties.
– Universal has incorporated XML into our Infringement notices since summer 2003
4
Current Notice Process
MONITORING SERVICE
1. Infringement Located
COPYRIGHT AGENT
2. Infringement Data Reported
Many Internet protocols and P2P networks are
scanned by the monitoring service.
Infringement reports are checked by the agent and a copyright infringement
notice is generated.
ISP/University DMCA or Abuse agent
3. Notice Sent to ISP
Agent takes actions to block access to file
reported in the notice.
5
Current Notice Process
DisableAccess
Action ComplianceResponse
20 - 120minutes
1 - 3days
3 - 10days
4 - 14days
Infringing Content Still Available
Typical Timeline
Identify User
6
ACNS Architecture
• Design Goals:
– Capable of rapid development and deployment: take advantage of the popularity of traffic management devices
– Use established concept of copyright notice.
– Resistant to P2P evolutionary measures like encryption
7
P2P NETWORK
ROUTER
TRAFFIC SHAPER
FIREWALL
REMOTEP2P NODES
DATA CENTER
MONITORING STATION (operated by content owner)
P2P NODEIP: 123.45.67.89
CONTROL STATION
STEP 1: An external Monitoring Station continuously monitors P2P network for illegitimate content distribution by logging onto P2P network and searching or downloading.
UNIVERSITY or ISP
ACNS PROCESS (STEP 1)
8
P2P NETWORK
ROUTER
TRAFFIC SHAPER
FIREWALL
REMOTEP2P NODES
DATA CENTER
MONITORING STATION
P2P NODEIP: 123.45.67.89
CONTROL STATION
STEP 2: Monitoring Station locates illegitimate content distribution from a P2P node within university or ISP’s network
UNIVERSITY or ISP
ACNS PROCESS (STEP 2)
9
P2P NETWORK
ROUTER
TRAFFIC SHAPER
FIREWALL
REMOTEP2P NODES
DATA CENTER
MONITORING STATION
P2P NODEIP: 123.45.67.89
CONTROL STATION
STEP 3: Monitoring Station automatically sends Electronic Notice with information on content, IP address, P2P network type, etc. to Control Station in Data Center
Electronic Notice
UNIVERSITY or ISP
ACNS PROCESS (STEP 3)
10
P2P NETWORK
ROUTER
TRAFFIC SHAPER
FIREWALL
REMOTEP2P NODES
DATA CENTER
MONITORING STATION
P2P NODEIP: 123.45.67.89
CONTROL STATION
STEP 4: Control Station updates Traffic Shaper to enforce rules. Example rules: block node’s outgoing P2P traffic for specified time, lowering traffic priority, etc.
STOP
UNIVERSITY or ISP
ACNS PROCESS (STEP 4)
11
P2P NETWORK
ROUTER
TRAFFIC SHAPER
FIREWALL
REMOTEP2P NODES
DATA CENTER
MONITORING STATION
P2P NODEIP: 123.45.67.89
CONTROL STATION
Other Internet services, such as Web and e-mail, can remain unaffected.
STOP
OTHER INTERNET USES
UNIVERSITY or ISP
ACNS PROCESS (STEP 4 continued)
12
P2P NETWORK
ROUTER
TRAFFIC SHAPER
FIREWALL
REMOTEP2P NODES
DATA CENTER
MONITORING STATION
P2P NODEIP: 123.45.67.89
CONTROL STATION
Other P2P network users (which may or may not be distributing illegitimate content) are not affected.
OTHER P2P NODES
UNIVERSITY or ISP
ACNS PROCESS (STEP 4 continued)
13
P2P NETWORK
ROUTER
TRAFFIC SHAPER
FIREWALL
REMOTEP2P NODES
DATA CENTER
MONITORING STATION
P2P NODEIP: 123.45.67.89
CONTROL STATION
System can be easily modified to address concerns over loss of network control or spurious notices by inserting manual control points.
UNIVERSITY or ISP
Manual approval point can be inserted before rules are enforced at the Traffic Shaper.
ACNS PROCESS
14
ACNS Architecture
• System Elements:
– Monitoring Station: Identify illegitimate content distribution by joining the P2P network and searching for specific content.
– Traffic Shaper: Identify network traffic based on packets and enforce “penalty box” rules such as blocking traffic, bandwidth limits, or lower priorities.
• Example Vendors: Ellacoya, P-Cube, Cisco, Akonix
• Devices already deployed at many universities (800+) for cost savings.
• Moving into ISP market -- cable ISPs use “penalty box” to control bandwidth hogs.
15
ACNS Architecture
• System Elements:
– “Penalty-Box”: Traffic-shapers already support very flexible rules such as: (i) block infringer’s P2P traffic for X hours; (ii) block outgoing P2P traffic; (iii) assign lower priority and bandwidth limit to infringer; etc.
– Resistant to Encryption: Only need to identify the type of traffic, not the content.
• For example, existing traffic shapers are able to identify encrypted Freenet traffic.
– Applicable to other distribution methods: FTP, IRC, HTTP, etc.
16
Standardized Notice Format
• Standardized Notice Format:
– Service providers complain about the lack of a standardized copyright notice across movie, music, and software industries.
– Universal has developed a standard XML format to append to copyright notices.
– Schema has been finalized incorporating RIAA, MPAA, and IFPI feedback. In process of broadening to vendors (BayTSP, MediaSentry, Ranger, etc.) and other industries (BSA, etc.).
– Universal Studios and other studios are now using the XML in their notices.
– Many other copyright holders such as software and music companies are in the process of implementing the standard XML notice.
17
Standardized Notice Format
XML Example:...
<Source> <TimeStamp>2003-04-08T12:34:53Z</TimeStamp> <IP_Address>168.1.1.145</IP_Address> <Port>21</Port> <DNS_Name>pcp574.nshville.tn.isp.net</DNS_Name> <Type>FTP</Type> <URL_Base>ftp://168.1.1.14/8Mile/</URL_Base> <UserName>guest</UserName> <Login Username="guest" Password=“password" /></Source>
<Content> <Content_Item> <Title>8 Mile</Title> <FileName>8Mile.mpg</FileName> <FileSize>702453789</FileSize> <URL>ftp://guest:[email protected]/8Mile/8mile.mpg</URL> <TYPE>Movie</TYPE> <Hash TYPE="SHA1">EKR94KF985873KD930ER4</Hash> </Content_Item></Content>
</Infringement>
<Infringement>
<Case> <ID>A1234567</ID> </Case>
<Complainant> <Entity>Content Owner Inc.</Entity> <Contact>John Doe</Contact> <Address>Anywhere St, L.A., CA 90000</Address> <Phone>555-555-1212</Phone> <Email>[email protected]</Email></Complainant>
<Service_Provider> <Entity>ISP Broadband Inc.</Name> <Contact>Jane Doe</Contact> <Address>Nowhere St, L.A., CA 90000</Address> <Phone>555-555-1212</Phone> <Email>[email protected]</Email></Service_Provider>
.
.
.
18
Advantages of ACNS
• Advantages:
– Required staff resources for responding to copyright notices are greatly reduced.
– Copyright notices are more efficiently handled and compliance tracking is improved, thus reducing potential liability.
– Service provider’s own network policies are efficiently enforced.
– Flexible, limited response via “penalty-box”.
19
Advantages of ACNS
DisableAccess
0 - 5minutes
5 - 10minutes
Infringing content available much shorter time
Timeline with ACNS
Identify User
DisciplinaryAction
5 - 10minutes
20
Advantages of ACNS
• Advantages for content owners:
– Reduces time required to get infringing content off the network, and avoid waiting until “business hours” for removal.
– Containment: faster response means viral replication of content is limited.