+ All Categories
Home > Documents > Technologies for achieving common functions essential to ... · Telecoms systemsTTelecoms...

Technologies for achieving common functions essential to ... · Telecoms systemsTTelecoms...

Date post: 18-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
6
Technologies for achieving common functions essential to content sharing business and electronic commerce such as copyright management, electronic settlement, and information delivery. OSGi Service-aggregation Platform (OSAP) Remote Replication System for File Servers (Flexible IP Storage System) Scalable, Secure File-sharing System (SSS) Countermeasure Technologies against "Botnets" Blog-based Community Analyzer Innovative Recommendation to Users
Transcript

Technologies for achieving common functions essential to content sharing business and electronic commerce such as copyright management, electronic settlement, and information delivery.

■ OSGi Service-aggregation Platform (OSAP)

■ Remote Replication System for File Servers (Flexible IP Storage System)

■ Scalable, Secure File-sharing System (SSS)

■ Countermeasure Technologies against "Botnets"

■ Blog-based Community Analyzer ーInnovative Recommendation to Usersー

Home network Ubiquitous Pervasive computing

NTT Cyber Solutions Laboratories

OSGi Service-aggregation Platform (OSAP)

H-PF-1 copyright©2007NTT

With the explosive growth in “always-on” broadband services like optical-fiber access, various objects around the home are

becoming connected to networks. Unsurprisingly including types of PCs that have become mainstream up till now, these

objects also include audio-visual (AV) equipment, information devises, household appliances, and various sensors. Moreover,

reflecting these circumstances, service providers proposing to provide services using such devices connected to a network have

become more varied.

OSAP is a platform technology on which multiple service providers can share a gateway device, called a service gateway

(SGW), and a center system for managing the SGW and, thereby, provide services to users (see figure). The software for

implementing services is composed as a software module called a “bundle”— based on OSGi* standard technology. The

bundle, which is configured according to the service provider, is downloaded to the SGW of a user using a service through the

OSAP and executed. The bundle on the SGW executes, for example, monitoring of in-home sensors, control of home

appliances, and control for integrating these devices and realizes applications. For example, in the case that an intruder is

discovered by a break-in sensor, a home-security service connected to your mobile phone sounds an alarm to inform your

mobile phone that a break-in has happened at home.

By applying OSGi and an expanded OSAP, it is easy, for example, to add new services, customize services for each user,

and promptly deal with bugs. In addition to these features, on the OSAP, a security function of executed bundles, a monitoring

function to check whether bundles are correctly executed, an interface on the service-provider side, and so on can be provided.

In doing so, it is a platform that is easy to use, safely and securely, from either the user side or the service-provider side.

From now onwards, as well as applying OSAP to life-support services for households, NTT Laboratories will continue to take

the lead in applying OSAP in various business fields already using OSGi and in laying down new standardization for OSGi.

* OSGi: Open Services Gateway Initiative (www.osgi.org)

Overview of OSAP

Service provider(SP)

Network

BB NTT expandedportion

OSGiframework

B B

B B BB

PC systems PC systems PC systems

AV systems AV systems AV systems

Home-information Home-information appliances appliances Home-information appliances

Sensor systemsSensor systemsSensor systems

Telecoms systemsTelecoms systemsTelecoms systems

Control

OSAP centersystem

(OSAP-CS)

Service gateway(SGW)

Bundle B B

B B

B B

OSGi Service-aggregation Platform(OSAP)

Business continuity plan Storage Replication Data center

NTT Service Integration Laboratories, NTT Cyber Solutions Laboratories

Remote Replication System for File Servers (Flexible IP Storage System)

H-PF-2 copyright©2007NTT

Companies are increasingly interested in the business continuity plan (BCP) for large disasters. For example, some recent

earthquakes adversely influenced business or even led to the closure of companies and offices. In addition, companies in the

same supply chains are increasingly placing demands to establish BCPs and the Japanese government has issued guidelines

related to BCPs. Companies are especially interested in backups of their information systems. However, disaster recovery

(DR) solutions in large disasters are very expensive, and their users are mainly large companies.

NTT Laboratories have developed a flexible IP storage (FIS) system, to provide inexpensive DR solutions for small and

medium-scale companies. With the FIS, using the iSCSI*1 protocol, companies can inexpensively replicate their data on their

file servers in real time and store it, for example, in a data center at a remote site.

The FIS uses an inexpensive virtual private network such as the FLET’S network and group access optional service, instead

of expensive dedicated lines. As the bandwidth of the FLET’S network is not guaranteed, data transfer may be unstable.

However, we make it possible to transfer data stably with a technology for stabilizing an iSCSI environment. In addition, the FIS

equipment is inexpensive because it uses inexpensive storage with open source software (OSS) such as the iSCSI target,

instead of using an expensive Fibre Channel. Furthermore, by using an iSNS*2 server, we can efficiently operate and manage

the storage system.

We are planning to test the system in a commercial environment and commercialize it.

*1 iSCSI: Internet Small Computer System Interface (RFC3720. Specification that uses SCSI protocols over TCP/IP)*2 iSNS: Internet Storage Name Server (RFC4171. iSCSI Name Server)

FLET'S is a registered trademark of Nippon Telegraph and Telephone East Corporation and Nippon Telegraph and Telephone West Corporation.

Remote replication system for file servers (Flexible IP storage system)

Office

Windowsclients

File server

LAN

Main disk(buffer)

Data center etc.

iSNSserver

Sub disk

Application

Linux kernel

Samba Mirroring

File system layer

Disk virtualization layer

iSCSI initiator driver

Buffered data size(image)

Day/time

Remote replication(iSCSI)

FLET’S network etc. (w/Group access)

Bulk file transfer Encryption Delivery certificate Express delivery

NTT Information Sharing Platform Laboratories

Scalable, Secure File-sharing System (SSS)

H-PF-3 copyright©2007NTT

The volume of electronic mail (e-mail, for short) dealing with work flows in the business world, such as graphic advertising,

design data, medical data, image data, and software, is increasing from the megabyte range to the gigabyte range day-by-day.

Along with this trend, it is becoming indispensable to ensure that bulk transfer of files exceeding the capacity limits allotted to e-

mail are transmitted safely without fail. In the meantime, recently, owing to leakage of personal information, secret information,

and such, security consciousness regarding transfer of files externally by means of free file transfer services, various memory

media, and so on is growing even in the general business world. With these circumstances in mind, NTT Laboratories is

pushing ahead with development of a Scalable Secure File-sharing System called SSS.

SSS realizes several key functions: file transfer/reception unconscious of file capacity, secrecy assurance by “Camellia*1”

encryption of transferred data, personal authentication by electronic certificate, issuance of delivery certificates by a third party

at a delivery agency to prove receival of files, a transfer restriction function for restricting the authorized domain of transmissions/

receivals in order to prevent wrong shipments. With these functions this system, safe and reliable file transfer with business

contacts in the business world is possible. Moreover, relaxing the limits on TCP*2 transmission speed to remote locations by

means of TCP multi-session technology enables delivery services at higher speeds than conventional speeds, thereby

increasing the convenience regarding transfer on the eve of deadlines. In addition, a client lineup split into three types was

developed, and the type is selected according to intended application ranging from industrial corporations to general business.

Through the above-described features, it is possible to provide new added-value postal services—such as registration, express

delivery, and delivery certification—on a network.

This system has been in trial service—in which about 3,000 people at NTT-The Holding Company (including 20 NTT Group

companies) participated—since October 2006. From this trial, know-how concerning settlement and operation of encrypted

transmission of secret information has been accumulated. From now onwards, we will push ahead with upgrading and

expanding of the system in terms of further usability improvement and provision of common file transfer services among NTT

Group companies.

*1 Camellia: A symmetric key block cipher developed in 2000 by NTT and Mitsubishi Electric Corporation.*2 TCP: Transmission Control Protocol

Camellia is a registered trademark of Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation.

Overview of SSS

Overview of SSS functions Client lineupDedicated

application type

Browser type

Command type

P.S. “⇒” Typical application user

Electronic certificate authority/time stamp authority

SSSserver

Certification of receipt

SSSclient

SSSclient

Delivery certificateIssuing of delivery certificate

Interruption and restartInterrupt transfer during network failure and resumetransfer after recovery

Transfer of large filesUp to 100 GB at a time

Encryption of transferdata(Camellia)Data not readable by third parties

User certification(ID/PW, electronic certification)Authentication of receiver identity

Transfer restrictionPrevention of data transfer to wrong address

ExpresstransferShort data transfer time Various

usescenes

*1 GUI: Graphical User Interface  *2 CUI: Character-based User Interface

Mailer like GUI*1

⇒In-house user Industry user

Web-browser GUI⇒Outside user

Script-based CUI*2 for workflow and application collaboration⇒Industry user

Botnet Bot Malware Honeypot

NTT Information Sharing Platform Laboratories

Countermeasure Technologies against “Botnets”

H-PF-4 copyright©2007NTT

Computer viruses of recent years have evolved from a conformation aimed simply at independent proliferation of the virus

into a conformation referred to as “bots”—that is, a virus that carries out actions in accordance with the commands of an

attacker. By connecting to a central management server relaying attack commands and creating a “botnet” of several hundred

to several ten thousand computers, the bots secretly work as DDoS* attacks and infrastructure systems for spam-mail

distribution and proliferation services provided on the black market.

With this state of affairs in mind, at NTT Laboratories we have developed technologies that will become indispensable in

deterring such threats from botnets. These technologies include a decoy terminal called a “honeypot”, a bot analysis system for

ascertaining bot behavior in a short time, and an integrated management system for presenting information ranging from trends

and invasion routes of attacks to bot behavior in an easy-to-understand fashion. Hooked up to the Internet like a vulnerable

terminal, the honeypot is a mechanism that sucks in bots for analysis. This mechanism incorporates technologies, such as

technology for detecting and sucking in all bots and technology for hiding the honeypot from the attacker, developed in-house at

NTT Laboratories. Moreover, as regards the bot-analysis system, by setting up a virtual Internet space and moving the bots in

it, it is possible to ascertain the behavior of bots on a network of bots in a short time. With these technologies, it has become

possible to provide notifications of infected instructions for users unaware of bot infection and promote countermeasures as well

as to promptly grasp the influence of bots on networks and relay servers connecting bots and dispense countermeasures.

From now onwards, while continuing our combined efforts to implement concrete bot countermeasures through cooperation

with outside organizations, we will continue research and development on collection technology for handling multiple infection

routes of successive bots as well as on analysis and countermeasure technologies that can keep pace with the increasing

sophistication of bots.

* DDoS: Distributed Denial of Service

Countermeasures against botnet

Management systemInformation covering trends of attacks against the honeypot to invasion routes and behavior of bots is presented in an easy-to-understand manner on a web user interface(UI).

Is placed on the Internetand collects bots

HoneypotAnlysis of the botin a short time

Dynamic analysis system

Analysisreport Attack log

Bot program

Bot program

Bot

Bot

BotInternetInfection

CGM Blog Mood analysis Semantic web Recommendation

NTT Network Service Systems Laboratories

Blog-based Community Analyzer – Innovative Recommendation to Users –

まったりした音楽A

今日の音楽B さん

Teenage fanclub

・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・

・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・

・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・

C さん

H-PF-5 copyright©2007NTT

“Blogs” and social-network services (SNSs)—allowing a user’s topics of interest to be transmitted on the Internet and

supporting discussions between users—are rapidly gaining in popularity. By using such blogs and analyzing all areas of users’

interests and identifying what kind of mood expressions are used by a user to describe their topics of interest, it is anticipated

that extremely detailed information can be recommended to users and exploited for “contents marketing”.

“The blog-based community analyzer” extracts general ideas that users are interested in from blog descriptions of users and

selects a “user community” for sharing interests according to the closeness of their interests. Furthermore, in contrast to

existing “recommendation mechanisms” like that used by Amazon Japan Co. Ltd., the analyzer recommends information with a

big “gap” between ideas already expressing a user’s interests and ideas a user might be interested in as “information for

bringing about innovation”. In particular, in correspondence with topics of interest, it is possible to finely discriminate information

right down to “mood information”, that is, whether a user feels “positive” or “negative” towards a certain piece of information.

From August to December 2006, a trial service called “DoblogMusic”—for recommending music-related topics on the “Doblog”

service of NTT DATA—was carried out. According to the frequency of access and comments of actual users during the trial, the

usefulness of community selection and recommendation was confirmed.

Moreover, during the “BRAND COLLECTION” trial service of NTT Communications (carried out from February to March

2007), a trial “mood search” for mobile phones—which allows searching for fashion brands according to “mood phrases” such

as “sweet line”—was performed, and a questionnaire evaluation, gathering comments like “an interesting approach showing

innovation”, was done.

After consulting the trial results from 2006, in 2007, we at NTT Network Service Systems Laboratories plan to practically

apply the analyzer for applications in categories other than books, dining out, movies, music, and fashion and for marketing of

consumer-generated-media (CGM) analysis results through, for example, a service for comparing positive and negative

information concerning and purchased goods.

Doblog is a registered trademark of NTT DATA Corporation.

Our trial service “DoblogMusic” and “BRAND COLLECTION”

Blog site of user A

Recommendation display page shown to user A

Latest fashion-related blogs

1. Ambiguous words are made specific

2. Navigate to fashion boutiques

Searchinput

Mood search results

〈Sweet line! 〉(Brand B)

Window-shoppingJeans of youngwomen

Substantiation

CGM

Click

I feel the start of autumn by wearing the brouse woven by cotton of fine quality.

Mr.AMr.BMr.C

Music diaryMusic diary

DoblogMusic

Recommendations Sweet line!

Search

やさしい音楽

[comments]

[23:14]

最近やさしい音楽をもとめているのか,今日はまたAIRとelf powerをききました.elf powerはやさしいねえ.ほっとする.Death Cab For Cutieもそうだね. AIRはそうでもないかな.

Topical brands unknown to person in question

Discovery ofunpredictability

Typical representative phrases presently making the news related to brands

Looking overpopular contents

By clicking the “recommendations” information that appears beside the blog, user A can view a list of recommended artists.

List of recommended artists

Degree of innovationSmall(0)

Large(3)

List of users with similar interests

Blog-body

Jimmy Eat World (Emo)

Jessica Simpson (Teen Beat)Entries of Neighbours

Van Dyke Parks (Adult Alternative)Entries of Neighbours

List of user blog entries close to the user’s interests

Genre: Alternative/punk rock, British pop, British rockArtist: Teenage fanclub

Genre: Alternative/punk rock, British pop, British rockArtist: Teenage fanclub

Innovative Artists

Neighbours


Recommended