• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

Vol. 16, No. 6, June 30, 2022
10.3837/tiis.2022.06.018, Download Paper (Free):

Abstract

With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
J. Kim, S. Lim and T. Lee, "Efficient Illegal Contents Detection and Attacker Profiling in Real Environments," KSII Transactions on Internet and Information Systems, vol. 16, no. 6, pp. 2115-2130, 2022. DOI: 10.3837/tiis.2022.06.018.

[ACM Style]
Jin-gang Kim, Sueng-bum Lim, and Tae-jin Lee. 2022. Efficient Illegal Contents Detection and Attacker Profiling in Real Environments. KSII Transactions on Internet and Information Systems, 16, 6, (2022), 2115-2130. DOI: 10.3837/tiis.2022.06.018.

[BibTeX Style]
@article{tiis:25771, title="Efficient Illegal Contents Detection and Attacker Profiling in Real Environments", author="Jin-gang Kim and Sueng-bum Lim and Tae-jin Lee and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2022.06.018}, volume={16}, number={6}, year="2022", month={June}, pages={2115-2130}}