DOI QR코드

DOI QR Code

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin (ISAA Lab., Department of Computer Engineering Ajou University) ;
  • Kwak, Jin (Department of Cyber Security, Department of AI Convergence Network Ajou University)
  • 투고 : 2020.11.20
  • 심사 : 2020.11.26
  • 발행 : 2021.01.31

초록

Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

키워드

1. Introduction

Recently, with the improvement in communication speed and popularization of smartphones, a culture that streams music, movies, and videos in a short time has emerged as an environment irrespective of time and space; consequently, resulting in the diversification of online-based media services [1]. Subsequently, users have more opportunities to use digital content, and as the reach of the copyrighted works increases and expands into overseas markets, the size of the copyright market has also increased accordingly [2].

However, as the copyright market size increased, piracy sites that illegally distributed copyrighted works appeared. Piracy sites have many problems, mainly involving illegal copying and propagation of copyrighted works without the copyright holder’s permission. This leads to significant losses for the copyright holder [3]. Piracy sites generate revenue by illegally distributing content, such as movies, dramas, TV programs, and webtoons, and generate revenue for site operation by posting illegal advertisement banners on their site. Distributing malicious codes in such advertisement banners can lead to various types of damage, such as leakage of personal information [4].

To prevent this piracy, several public agencies use online surveillance to monitor piracy sites and diversify their piracy response strategies such as billing blocks and domain blocks. Additionally, copyright infringement is prevented through enforcement activities by imposing a fine for online service providers who violate copyright or by closing piracy sites [5].

Although efforts to block piracy sites has continued in the aforementioned manner, the rate of generation of new piracy sites is faster than the speed of detecting piracy sites, and it is difficult to prevent copyright infringement using this technique. Additionally, piracy sites are developing in the same way as legitimate sites, and it is difficult to determine whether they are involved in copyright infringement [3]. Therefore, in this study, we propose an intelligent piracy site detection technique with high accuracy that can respond to piracy site’s rapid creation speed and accurately determine whether the site is involved in copyright infringement. In the remaining sections of this paper is structured as follows: In Section 2, we analyze the features of piracy sites and legitimate sites as related research. Furthermore, we analyze the features of the illegal advertisement banner existing in the piracy site and analyze the F1 score to verify the accuracy of the proposed technique. In Section 3, we propose an intelligent detection technique that considers the infringement of a piracy site, and in Section 4 we describe the experimental setup in which the intelligent detection technique is tested. Additionally, the dataset derived from the link collection site, and the results of applying the dataset to the intelligent detection technique are described. Finally, we conclude with Section 5.

2. Related Work

2.1 Features of Piracy Sites and Legitimate Sites

We analyze the features of piracy sites that illegally distribute copyright works and legitimate sites that legally distribute copyright works.

2.1.1 Features of Piracy Sites

Types of piracy sites include torrent sites, video streaming sites, webtoon sites, and link collection sites, and we analyzed the features of each piracy site. Table 1 presents the types of copyright works infringed by piracy sites, and Fig. 1 represents the features of the piracy site.

Table 1. Type of content infringement exhibited by piracy sites

E1KOBZ_2021_v15n1_285_t0001.png 이미지

E1KOBZ_2021_v15n1_285_f0001.png 이미지

Fig. 1. Example of piracy sites

In general, a torrent site shows the type of content, such as a broadcast or movie, on the top menu, and a link to an illegal site and an advertisement banner. Furthermore, the magnet link and download link are provided for the users to download the content for free [3].

As torrent site, an video streaming site shows the type of content on the top menu, a link to the illegal site, and an advertisement banner. Additionally, external links can use the corresponding content, and it is generally configured to provide a link to another server to stream video [3].

Webtoon is a compound word of web and cartoon and refers to cartoons serialized on the web. Webtoon sites include various webtoon genres, links to illegal sites, and advertisement banners on the top menu. Furthermore, to prevent data leakage to other piracy sites, watermarks may be inserted into webtoon image files [3].

The link collection site is a site that lists piracy sites and provides them to clients. As a feature of a link collection site, an illegal advertisement banner is usually posted inside the site, and many piracy sites exist in the form of a banner in the frame inside the website. The link collection site provides torrents, video streaming, webtoons, and illegal sites, such as adult-rated and gambling sites, and posts links to sites reflecting domains that change periodically due to the short life cycle of the piracy site.

2.1.2 Features of Legitimate Sites

As legitimate site features, there are legitimate video streaming sites that provide broadcasting and movies and legitimate webtoon sites that provide webtoons. As a feature of a legitimate site, there is a business registration number, which implies that the site provides legitimate content services. This business registration number is the simplest way to determine whether the site is legitimate. Table 2 lists the types of works distributed on legitimate sites, and Fig. 2 shows the features of a legitimate site.

Table 2. Types of content featured on legitimate sites

E1KOBZ_2021_v15n1_285_t0002.png 이미지

E1KOBZ_2021_v15n1_285_f0002.png 이미지

Fig. 2. Example of a legitimate site

As a feature of a legitimate video streaming site, content types are listed on the menu at the top of the website, and there are contents in the form of images. A business registration number is provided by the business operator at the bottom of the website to indicate legal content services.

The types of works are listed at the top of the website in a legitimate webtoon site, and copyright works are shown in the form of images. Furthermore, a business registration number is available at the bottom of the website. Table 3 presents a comparison of piracy sites and legitimate sites.

Table 3. Comparison between a piracy site and legitimate site

E1KOBZ_2021_v15n1_285_t0003.png 이미지

2.2 Advertisement Banner in Piracy Sites

The piracy site distributes the work free of charge without permission from the copyright holder. However, it has a feature of posting advertisements for the site’s operation. Advertising forms within piracy sites exist as AD ads and Ad banners on the main page. Advertisement banners are posted within specific frames existing within the piracy site, and such Ads are most widely used within piracy sites. Additionally, to accurately determine the in-depth information of an Ad banner, and to determine the piracy site—it is necessary to analyze the text area and image area within the Ad banner. However, there are features, such as those shown in Fig. 3, that make it difficult to extract text because of the boundaries between the text area and the image area within the Ad banner are ambiguous [6,7].

E1KOBZ_2021_v15n1_285_f0003.png 이미지

Fig. 3. Example of an advertisement banner in a piracy site

2.3 F1 Score

To calculate the F1 score, a 2 × 2 confusion matrix is used as a method for accuracy verification. As per Table 4, the confusion matrix is divided into true positive (TP), true negative (TN), false positive (FP), and false negative (FN) [8].

Table 4. Format of the confusion matrix

E1KOBZ_2021_v15n1_285_t0004.png 이미지

Specifically, TP denotes the case of predicting true that is true in reality, and FP denotes the case of predicting true that is false in reality. Furthermore, FN denotes the case of predicting false that is true in reality, and TN denotes the case of predicting false that is false in reality.

The precision and recall to derive the F1 score can be derived using the confusion matrix in Table 5, and precision denotes the ratio of cases correctly predicted as true to those predicted as true. Hence, precision can be derived from (1). Additionally, recall is the ratio of cased predicted to be true to those that are true, and the recall can be derived through (2). The F1 score can be calculated using the derived precision and recall, and the F1 score can be derived as (3) through the harmonic average of (1) and (2) [8].

\(\text { Precision }=\frac{T P}{T P+F P}\)       (1)

\(\text { Recall }=\frac{T P}{T P+F N}\)       (2)

\(\text { F1 score }=2 \times \frac{\text { Precision } \times \text { Recall }}{\text { Precision }+\text { Recall }}\)       (3)

By using the F1 score derived using precision and recall, the accuracy of the proposed intelligent piracy site detection technique can be verified.

3. Intelligent piracy site detection technique

In this section, the intelligent piracy site detection technique is described. Furthermore, Fig. 4 illustrates the proposed technique.

E1KOBZ_2021_v15n1_285_f0004.png 이미지

Fig. 4. Overview of intelligent piracy site detection technique

Step 1. Calculation of Accessibility

This process determines whether the input site can be accessed normally and extracted from the page source. Furthermore, Fig. 5 illustrates the process for Step 1, and Table 5 presents the pseudo code for Step 1.

E1KOBZ_2021_v15n1_285_f0005.png 이미지

Fig. 5. Calculation for accessibility

Table 5. Pseudo code for calculation of accessibility

E1KOBZ_2021_v15n1_285_t0005.png 이미지

Step 1-1. Decision of Legitimate or Piracy Site

First, the input site is accessed, and it is determined in advance whether it is an illegal or harmful site by the government and agencies. If the input site is redirected to an illegal or harmful site, further analysis of the site is not required. If the input site is previously defined as an illegal or harmful site, the new site is analyzed. Otherwise, the analysis process moves on to Step 1-2.

Step 1-2. Check the Function of Traffic Detection

In browsing the input site, it is determined whether a technology capable for detecting and preventing abnormal traffic, such as 'DDoS CloudFlare', is used. If abnormal traffic detection technology is present, then analysis is impossible because the page cannot be accessed. If the site contains a URL that detects abnormal traffic, then the new site is analyzed. Otherwise, the analysis process moves on to Step 2-1.

Step 2. Inspection of Included Keywords

This process identifies keywords that exist in the piracy site page source, and if they exist, then they are judged as infringement. However, if they do not exist, then they are not judged as infringements. Furthermore, Fig. 6 illustrates the process for Step 2, and Table 6 presents the pseudo code for Step 2.

E1KOBZ_2021_v15n1_285_f0006.png 이미지

Fig. 6. Inspection of included keywords

Table 6. Pseudo code for inspection of included keywords

E1KOBZ_2021_v15n1_285_t0006.png 이미지

Step 2-1. Check Registration Number

By following Step 1, the proposed detection technique can determine whether the business registration number exists from the extracted page source. A business registration number exists on a legitimate site, and the existence of the business registration number is analyzed using features that are not present on the piracy site. If a business registration number exists, then the new site is analyzed. Otherwise, the analysis process moves on to Step 2-2.

Step 2-2. Insepection of Included Keyword about Infringement

It is determined whether there is a keyword for each piracy site in the input page source. The keywords for each piracy site used in this process are derived from each piracy site’s features. The list of keywords on the piracy site are shown in Table 7.

Table 7. List of keywords on piracy sites

E1KOBZ_2021_v15n1_285_t0007.png 이미지

Step 2-3. Analysis of Keyword-Included String

If a keyword exists in a page source, then a string containing that keyword is imported. The reason for importing a string that contains the keywords is to analyze the compound word. The compound word containing the keyword is judged to be an infringement keyword when determining whether the keyword exists. In separating compound words, the ‘segment’ module of Python is used. After separating the compound words, the existence of keywords is rechecked. If there is an infringement keyword, then the site is judged as a suspected infringement site. Otherwise, the analysis process moves on to Step 3-1.

Step 3. Ad Banner Internal Information Extraction Process

This process extracts the information inside the advertisement banner that exists on the piracy site to check for infringement. Furthermore, Fig. 7 illustrates the process for Step 3, and Table 8 presents the pseudo code for Step 3.

E1KOBZ_2021_v15n1_285_f0007.png 이미지

Fig. 7. Ad banner internal information extraction process

Table 8. Pseudo code for Ad banner internal information extraction process

E1KOBZ_2021_v15n1_285_t0008.png 이미지

Step 3-1. Extract Main Page Image

First, the input site is accessed to extract the main page image. And, the main page image is saved in the clipboard using the Python ‘Selenium’ module. The saved image is used to extract the text on the main page.

Step 3-2. Extract Text Using Google Vision API

In this step, the Google Vision API is used to extract text from the extracted main page image. The Google Vision API is trained with millions of images using deep learning algorithms and convolution neural networks and has various functions [9,10]. Among them, the optical character recognition (OCR) function can extract text within the main page image. This is used to extract the internal text of the advertisement banner that cannot be detected in the page source analysis.

Step 3-3. Inspection of Included Keyword about Advertisement

The extracted text is checked to verify if keywords are used in illegal advertisement banners and determine the existence of illegal advertisement banners for the input sites. If an ad banner keyword exists, then it is judged that illegal advertising exists on the site and that the site is suspected of infringement. Otherwise, the new site is analyzed. Table 9 presents the keywords that exist in illegal advertising banners.

Table 9. List of keywords used in advertisement banners

E1KOBZ_2021_v15n1_285_t0009.png 이미지

4. Experimental Analysis

4.1 Experimental Setup

The experiment on intelligent piracy site detection technique, proposed in this study, was performed on Windows 10 Pro 64-bit environment, and Python 3.8.5 was used as the programming language. Additionally, the Touch VPN application was used in the experimental environment’s operating system to bypass the access block of the piracy site. The input data used in the experiment was in the form of a.csv file, and the output data was also in the form of a .csv file. Table 10 presents the environment in which the experiment was conducted.

Table 10. Experimental setup

E1KOBZ_2021_v15n1_285_t0010.png 이미지

4.2 Experiments for Data Set

To verify the accuracy of the proposed technique, we proceeded with a 1:1 ratio of piracy sites to the legitimate sites.

The piracy site dataset was created by extracting the URL of the piracy site banner by using the feature that the piracy site exists in the form of a banner in the link collection site. During the extraction process, the Selenium Python module and web driver were used to crawl, and the data set was extracted by saving the piracy site as a.csv file. The link to the piracy site listed after the ‘href’ tag in the link collection site was extracted and saved as a csv file. Table 11 presents the pseudo code that was used to extract the piracy site from the link collection site.

Table 11. Pseudo code for extracting piracy site in the link collection site

E1KOBZ_2021_v15n1_285_t0011.png 이미지

Piracy sites in the extracted data set consisted of 157 sites, including 34 torrent sites, 71 video streaming sites, and 52 webtoon sites. The experiment was also conducted with a total of 314 datasets by adding 157 legitimate sites unrelated to copyright infringement. Furthermore, Fig. 8 illustrates the piracy site and data set of the legitimate site used in the proposed technique, and Table 12 lists the number of legitimate and piracy sites used in the proposed technique.

E1KOBZ_2021_v15n1_285_f0008.png 이미지

Fig. 8. Example of a piracy site data set

Table 12. Number of piracy sites and legitimate sites

E1KOBZ_2021_v15n1_285_t0012.png 이미지

4.3 Analysis of Accuracy

We used the F1 score to verify the accuracy of the proposed technique, and we derived the confusion matrix for each site to determine the F1 score.

4.3.1 Analysis of Torrent Sites

The proposed intelligent detection technique was applied to 68 sites with a 1:1 ratio of 34 torrent sites and 34 legitimate sites. In the experiment, 33 cases were judged as suspected piracy sites, and one case was judged as a legitimate site. There are two cases in which legitimate sites are suspected of piracy and 32 cases in which legitimate sites are judged as legitimate sites. The precision, recall, and F1 score determined using the aforementioned values are given in (4), (5), and (6). As calculated in (4), the precision is 94.2% and corresponds to the ratio of actual piracy sites to those that are determined as suspected of piracy. As calculated in (5), the recall is 97.0% and corresponds to the ratio of actual piracy sites to those that are determined as piracy sites. The F1 score calculated in (6) determines the accuracy of the proposed technique for the torrent site, which corresponds to 95.5%. Fig. 9 illustrates the torrent site’s experimental process. Table 13 presents the confusion matrix for the torrent site.

\(\text { Precision }=\frac{T P}{T P+F P}=\frac{33}{33+2}=0.942\)       (4)

\(\text { Recall }=\frac{T P}{T P+F N}=\frac{33}{33+1}=0.970\)       (5)

\(F 1 \text { score }=2 \times \frac{\text { Precision } \times \text { Recall }}{\text { Precision }+\text { Recall }}=2 \times \frac{0.942 \times 0.970}{0.942+0.970}=0.955\)       (6)

E1KOBZ_2021_v15n1_285_f0009.png 이미지

Fig. 9. Experimental process of the torrent site

Table 13. Confusion matrix of the torrent site

E1KOBZ_2021_v15n1_285_t0013.png 이미지

4.3.2 Analysis of Video Streaming Sites

The intelligent detection technique is applied to 142 sites in a 1:1 ratio of 71 video streaming sites and 71 legitimate sites, and 64 cases were judged as suspected piracy sites, and 7 cases were judged as legitimate sites. There are 5 cases in which legitimate sites are suspected of piracy and 66 cases in which legitimate sites are judged as legitimate sites. The precision, recall, and F1 score derived using the values are as shown in (7), (8), and (9). As calculated in (7), the precision is 92.7% and corresponds to the ratio of actual piracy sites relative to those determined to be suspected of piracy. As calculated in (8), the recall is 90.1% and corresponds to the ratio of the actual piracy sites to those determined as piracy sites. The F1 score calculated in (9) indicates the accuracy of the video streaming site’s proposed technique and corresponds to 91.3%. Fig. 10 illustrates the experimental process for the video streaming site. Table 14 presents the confusion matrix for the video streaming site.

\(\text { Precision }=\frac{T P}{T P+F P}=\frac{64}{64+5}=0.927\)       (7)

\(\text { Recall }=\frac{T P}{T P+F N}=\frac{64}{64+7}=0.901\)       (8)

\(F 1 \text { score }=2 \times \frac{\text { Precision } \times \text { Recall }}{\text { Precision }+\text { Recall }}=2 \times \frac{0.927 \times 0.901}{0.927+0.901}=0.913\)       (9)

E1KOBZ_2021_v15n1_285_f0010.png 이미지

Fig. 10. Experimental process of the video streaming site

Table 14. Confusion matrix of the video streaming site

E1KOBZ_2021_v15n1_285_t0014.png 이미지

4.3.3 Analysis of Webtoon Site

The intelligent detection technique was applied to 104 sites in a 1:1 ratio of 52 webtoon sites and 52 legitimate sites, and 47 cases were judged as suspected piracy sites, and 5 cases were judged as legitimate sites. Legitimate sites are suspected of piracy in 2 cases, and legitimate sites are judged as legitimate sites in 50 cases. The precision, recall, and F1 score derived using the values are given in (10), (11), and (12). As calculated in (10), the precision is 95.9% and corresponds to the ratio of actual piracy sites relative to those determined to be suspected of piracy. As calculated in (11), the recall is 90.3% and corresponds to the ratio of the actual piracy sites judged to be piracy sites. The F1 score calculated in (12) indicates the accuracy of the proposed technique for the webtoon site and corresponds to 93.0%. Fig. 11 illustrates the experimental process for the webtoon site. Table 15 presents the confusion matrix for the webtoon site.

\(\text { Precision }=\frac{T P}{T P+F P}=\frac{47}{47+2}=0.959\)       (10)

\(\text { Recall }=\frac{T P}{T P+F N}=\frac{47}{47+5}=0.903\)       (11)

\(F 1 \text { score }=2 \times \frac{\text { Precision } \times \text { Recall }}{\text { Precision }+\text { Recall }}=2 \times \frac{0.959 \times 0.903}{0.959+0.903}=0.930\)       (12)

E1KOBZ_2021_v15n1_285_f0011.png 이미지

Fig. 11. Experimental process of the webtoon site

Table 15. Confusion matrix of the webtoon site

E1KOBZ_2021_v15n1_285_t0015.png 이미지

4.3.4 Analysis of detection technique results

The F1 score for torrent sites derived from Table 13 and approximately corresponded to 95%. The precision was approximately 94%, and recall was approximately 97%. Piracy sites were not detected through the intelligent detection technique proposed in the study because infringement keywords and illegal advertisements do not exist in torrent sites and there are cases in the form of blogs.

The F1 score for the video streaming site derived from Table 14 and indicated an accuracy of approximately 91%. The precision approximately corresponded to 92%, and the recall approximately corresponded to 90%. Piracy sites were not detected through the intelligent detection technique because there were cases in which the service can be used only by logging in to the site and there were no infringement keywords or illegal advertisements. This was because there were cases where they were configured almost identically.

The F1 score for the webtoon site was derived from Table 15 and indicated an accuracy of approximately 93%. The result approximately corresponded to 96% for precision and approximately 90% for recall. The reason as to why the piracy site was not detected in the intelligent detection technique proposed in the study is that it was operated in the form of a blog rather than a general website, or the access to crawling was prevented by using a CAPTCHA in the form of a picture to distinguish users and bots. Although research on bypassing the picture-type CAPTCHA used in webtoon sites is ongoing, there are limitations and difficulties in bypassing them, and thus the proposed technique could not be verified in these cases [11]. Table 16 lists the precision, recall, and F1 score for each site derived from Table 13-15.

Table 16. F1 score for the proposed technique

E1KOBZ_2021_v15n1_285_t0016.png 이미지

5. Conclusion

In this study, the features of piracy sites were analyzed, and an intelligent piracy site detection technique was proposed based on the features of piracy sites. The proposed intelligent piracy site detection technique with high accuracy was applied to a total of 314 sites, with piracy sites and legitimate sites in a 1:1 ratio. The detection results were derived in the form of a confusion matrix for each site, and the F1 score was calculated for accuracy verification.

The F1 score results of the experiment indicated that the application of the intelligent detection technique to torrent sites resulted in an accuracy of 95%, 91% for the video streaming sites, and 93% for the webtoon sites. The results indicate the high accuracy of the proposed technique. Hence, the intelligent piracy site detection technique proposed in the study results in high accuracy and can be used to detect piracy sites. Furthermore, the technique contributes to decreasing the losses for copyright holders due to copyright infringement.

Acknowledgement

This research project was supported by Ministry of Culture, Sports and Tourism(MCST) and from Korea Copyright Commission in 2020(2019-PF-9500).

참고문헌

  1. D. H. Kim, H. S. Jeong, and J. Kwak, "Development of Lifecycle Model for Copyright Infringement Site," Journal of The Korea Institute of Information Security & Cryptology, vol. 30, no. 1, pp. 101-121, Feb. 2020. https://doi.org/10.13089/JKIISC.2020.30.1.101
  2. Korea Copyright Protection Agency, "English Version of C STORY 2016," KCOPA Report, Seoul, Korea, Dec. 2016.
  3. S. Choi and J. Kwak, "Feature Analysis and Detection Techniques for Piracy Sites", KSII Transactions on Internet and Information Systems, vol. 14, no. 5, pp. 2204-2220, May 2020. https://doi.org/10.3837/tiis.2020.05.019
  4. Department of Communications, "Online Copyright Infringement Research," A Marketing Report, Australia, June 2015.
  5. Korea Copyright Protection Agency, "2017 Annual Report on Copyright Protection in Korea," Korea Copyright Protection Agency, Seoul, Korea, June 2017.
  6. M. S. Shin, M. R. Yong, and Y. J. Lee, "Study on Preventing Copyright Infringement through Blocking Advertisements of Illegal Copyrighted Websites," The Journal of the Korea Contents Association, vol. 20, no. 7, pp. 331-341, July 2020. https://doi.org/10.5392/JKCA.2020.20.07.331
  7. M. Wieting and J. Seldeslachts, "Advertising in illegal markets evidence from online gambling in the Netherlands," M.S. thesis, Dept. Economics and English, University of Amsterdam, Amsterdam, Netherlands, Aug. 2019.
  8. J. H. Lee and H. K. Lee, "A Study on Korean Emotion Index Using F1_score," The Journal of Internet Electronic Commerce Research, vol. 20, no. 1, pp. 131-145, Feb. 2020.
  9. R. Girshick, J. Donahue, T. Darrell, and J. Malik, "Region-Based Convolutional Networks for Accurate Object Detection and Segmentation," 2016 IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 38, no. 1, pp. 142-158, Jan. 2016.
  10. Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, pp. 436-444, 2015. https://doi.org/10.1038/nature14539
  11. S. Sivakorn, I. Polakis, and A. D. Keromytis, "I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs," in Proc. of 2016 IEEE European Symposium on Security and Privacy, pp. 388-403, May 2016.