Got it

Some opinions of Illegal business

Latest reply: Dec 27, 2018 00:41:34 1142 7 11 0 0

Illegal business

After years of broadband access network construction, for operators, access bandwidth is no longer the main problem. The first is to provide as many services as possible on the basis of the existing network, change the current profit-making mode only depending on access and bandwidth, and change the extensive business route; the other is to control the illegal business existing in the existing network. The so-called illegal business is to judge some data services existing on the network from the operator's point of view. Illegal business takes many forms. Here are just a few of them:

(1) P2P stream download. Peer-to-peer streaming can swallow up valuable network bandwidth and affect users'access to the Internet.

(2) VoIP. The existing public switched telephone network (PSTN) services of VoIP diversion operators may seriously damage their business income.

(3) Private connection on the user side. Broadband users apply for business as individuals, but use it for enterprises or black Internet cafes, or share it with other families, thus impairing the business income of operators.

Unlike the security problems in the preceding sections, illegal business has very complex business characteristics. It is impossible to determine whether a data message belongs to illegal business by simple feature extraction method. In order to detect whether a data stream is illegal, it is necessary to conduct in-depth intelligent analysis of the data stream. According to the predefined feature information database, data stream matching can be determined.

Private user chaos usually occurs when users use devices with network address translation (NAT) function and access nodes to dock. Upstream data messages appear from the surface as if they were sent from a user. To solve this problem, we need to collect all kinds of "clues": analysis of the number of TCP connections, network traffic, source TCP port range, which has certain reference value; analysis of some user-specific information that MSN, Windows Update can carry; user upstream data flow, such as OS version, IE version, user behavior habits and other useful user information. It is often necessary to combine some or all of the characteristics to make a comprehensive judgment, so as to reduce misjudgments and omissions. It is very difficult to detect illegal VoIP. There are many VoIP software. To cross firewalls or NATs and prevent detection, some VoIP software even starts private tunnels on special ports to carry VoIP-related data. All data streams of UDP/TCP need to be monitored, and data streams can be analyzed by VoIP registration, call and access.

P2P streams are easy to monitor, because the number of popular P2P software is limited, the characteristics of data messages sent by these software are relatively easy to define. Detection of illegal traffic can be carried out at all levels of broadband access network. The more the detection points move downstream, the stronger the feature of "distributed processing" is, the easier to improve the performance, but the price, cooperation and management of detection points are slightly weaker than centralized detection. The detection technology of illegal business has the trend of intellectualization. But the return is higher, because it can create higher value-added for operators. With the rise of various services in broadband access network in the future, illegal service detection will have a great potential, representing an important direction of broadband access network security research.

The more the detection points move downstream
View more
  • x
  • convention:

This post was last edited by xiaomumu at 2018-12-27 01:26. Private connection on the user side.Can you explain that in more detail?
View more
  • x
  • convention:

Different services have different service quality requirements, and how is transmission guaranteed?
View more
  • x
  • convention:

Private connection on the user side. Broadband users apply for business as individuals, but use it for enterprises or black Internet cafes, or share it with other families, thus impairing the business income of operators.
View more
  • x
  • convention:

I think this problem should be serious considered by ISPs.
View more
  • x
  • convention:

Good
View more
  • x
  • convention:

The existing public switched telephone network (PSTN) services of VoIP diversion operators may seriously damage their business income.Can you provide a more detailed explanation?
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.