Browse > Article
http://dx.doi.org/10.3837/tiis.2022.06.018

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments  

Kim, Jin-gang (Department of Information Security, Hoseo University)
Lim, Sueng-bum (Department of Information Security, Hoseo University)
Lee, Tae-jin (Department of Information Security, Hoseo University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.6, 2022 , pp. 2115-2130 More about this Journal
Abstract
With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.
Keywords
Bloom Filter; Profiling; Heavy Uploader; OSP; Illegal Content;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 H. Son, K. Kim, Y, Lee, "A File Name Identification Method for P2P and Web Hard Applications through Traffic Monitoring," Journal of KIISE, vol. 37, no. 6, pp. 477-482, 2010.
2 Y. Suh, W. Yoo, Y. Kim, W. Kim, "A Study of Copyright Infringement and Technology Measures in a Mobile Environment," Korea Institute of Information Technology Magazine, vol. 13, no. 1, pp. 19-25, 2015.   DOI
3 C. Hwang, J. Ha, T. Lee, "Modified File Title Normalization Techniques for Copyright Protection," journal of Information and Security, vol. 19, no. 4, pp. 133-142, Oct. 2019.   DOI
4 S. Kim, J. Kim, "An Analysis on the Error Probability of A Bloom Filter," Journal of The Korea Institute of Information Security & Cryptology, vol. 24, no. 5, pp. 809-815, Oct. 2014.   DOI
5 C. Hwang, J. Kim, Y. Lee, H. Kim, T. Lee, "High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology," Journal of the Korea Institute of Information Security & Crypthlogy, vol. 30, no. 6, pp. 1067-1078, 2020.
6 S. Son, "Copyright Protection on Artificial Intelligence generated Content," Journal of the Korea Association For Informedia Law, vol. 20, No. 3, pp. 83-110, 2017.
7 Y. Oh, G. Jang, H. Kwon, J. Lim, "A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure," Journal of the Korea Institute of Information Security & Cryptology, vol. 20, no. 6, pp. 97-109, 2010.   DOI
8 Y. Kim, "Improvement Plan for Special Types of Online Service Provider Responsibility System - Focusing on Technical Measures and Corrective Order and Correction Recommendation System -," Dankook Law Review, vol. 40, no. 1, pp. 213-236, 2016.   DOI
9 S. Oh, "A Study on the Copyright New Service Model Using Block-chain Technology," Korea Copyright Commission, pp. 1-174, Jan. 04. 2018.
10 J. Hwang, H. Kim, "Block-chain-based Copyright Management System Capable of Registering Creative Ideas," The Korea Society of Science & Art, vol. 20, no. 5, pp. 57-65, Oct. 2019.
11 J. Kim, J. Nam, "Analysis of illegal content filtering technology trends," Broadcasting and Media Magazine, vol. 12, no. 4, pp. 53-63, 2007.
12 C. Li, J. Lu, Y. Lu, "Efficient Merging and Filtering Algorithms for Approximate String Searches," in Proc. of IEEE 24th International Conference on Data Engineering, pp. 257-266, Apr. 2008.
13 J. Kim, J. Kim, J. Kim, Y. Chin, "Development of the filtering technology of illegal IPTV contents," Korea Institute of Information & Telecommunication Facilities Engineering, pp. 108-111, Aug. 2009.
14 J. Lee, "A Study on Music Copyright Management Model Using Block Chain Technology," The Korea Society of Science & Art, no. 35, pp. 341-351, Sep. 2018.
15 J. Kim, C. Hwang, and T. Lee, "Research on heavy uploader profiling technology for illegal content," Journal of Internet Computing and Services, vol. 22, no. 3, pp. 75-83, 2021.   DOI
16 B. Kim, H. Oh, "A Feature-Based Retrieval Technique for Image Database," The Transactions of the Korea Information Processing Society, vol. 5, no. 11, pp. 2776-2785, 1998.
17 Y. Kim, D. Shin, "Feature-Based Filtering Technology Performance Evaluation Trend," Korea Institute of Information Technology Magazine, vol. 11, no. 2, pp. 1-7, 2013.