IDS mailing list archives

Re: Bittorrent - utorrent


From: "Yan Zhai" <yanzhai () gmail com>
Date: Thu, 22 Mar 2007 15:57:45 -0400

If it's not based on protocol interpretation and file type look up, maybe it's some technology similar to this paper( "Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type" http://isis.poly.edu/kulesh/research/pubs/acsac-2004.pdf)?

On Thu, 22 Mar 2007 00:57:40 -0400, scott <redhowlingwolves () bellsouth net> wrote:

Joshua_barnes wrote:We have a way in our system to check the source <server for copyrighted <material. This way, Lord of The Rings won't be downloaded, but RedHat <could
<be. Don't kill bit torrent, it just get's mad....and then even.


Would you care to clue us in as to what software,or hardware,this could be? Sounds like it could possibly used in other ways as well.No more IPod,Zune,possibly others downloaded across your network,also?

Very intriguing,
                Scott

PS: How large is your network,by the way?

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more.
------------------------------------------------------------------------




--
Yan Zhai
Ph.D.
Cyber-defense Lab
Dept. of Computer Science
North Carolina State University

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------


Current thread: