Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

The feasibility study based on e-commerce

instructions–focuses on detection and


deletion of illegal content
Cite as: AIP Conference Proceedings 1955, 040129 (2018); https://doi.org/10.1063/1.5033793
Published Online: 18 April 2018

Tianze Guo, Siyu Bi, and Jiaming Liu

ARTICLES YOU MAY BE INTERESTED IN

Optofluidics of plants
APL Photonics 1, 020901 (2016); https://doi.org/10.1063/1.4947228

Invited Article: Generation of one-million-mode continuous-variable cluster state by


unlimited time-domain multiplexing
APL Photonics 1, 060801 (2016); https://doi.org/10.1063/1.4962732

Compact and high-resolution optical orbital angular momentum sorter


APL Photonics 2, 031302 (2017); https://doi.org/10.1063/1.4974824

AIP Conference Proceedings 1955, 040129 (2018); https://doi.org/10.1063/1.5033793 1955, 040129

© 2018 Author(s).
The Feasibility Study Based on E-commerce Instructions–
Focuses on Detection and Deletion of Illegal Content
Tianze Guoa), Siyu Bib) and Jiaming Liuc)

International School, Beijing University of Posts and Telecommunications, Beijing 100876, China.
a)
2015212974@bupt.edu.cn
b)
bisiyu@bupt.edu.cn
c)
Corresponding author: liujiaming@bupt.edu.cn

Abstract. This essay legally restrains the illegal content based on the e-commerce directive and introduces that the
European countries detect and notify illegal content through the instructions of competent authorities, notification of
credible flaggers, user reports and technical tools. The illegal content should be deleted through the service terms and
transparency report basing on prevent excessive deletions system. At the same time, use filters to detect and filter to against
the recurrence of illegal content. By analyzing the advantages of China under the environment of cracking down on illegal
content, this essay concludes that the success of China in cracking down on illegal content lies in all-round collaborative
management model of countries, governments, enterprises and individuals. At the end of the essay, one is to build a training
corpus that can automatically update the ability to identify the illegal content. And it proposes an optimization scheme that
establish a complete set of address resolution procedures and classify IP address data according to big data analysis and
DNS protection module to prevent hackers from spreading illegal content by tampering with DNS segments.

Key words: illegal content; e-commerce instruction; technical interface; filter; database; DNS.

INTRODUCTION
The current network technology are well developed. It brings people not only convenience but disadvantages. They
will exposure to unhealthy and illegal content such as smuggling, illegal speech, and terrorism. To strengthen controls
over these content on the Internet, the European Parliament urged these platforms "to strengthen measures to tackle
illegal and harmful content" [1]. This article studies how online platforms detect and remove illegal content on the
network and prevent criminals or others involved in network infringement activities from using their services. The
first part is the introduction of the legal background and specific methods of detecting and removing illegal contents.
The second part optimizes the clampdown on online illegal contents activities according to Chinese law and interface
technology.

BACKGROUND

Legal Support of Tacking Illegal Content Online


The provider does not initiate the transmission, does not select the receiver of the transmission nor select or modify
the information.
The provider does not modify the information, complies with conditions on access to the information, complies
with rules regarding the updating of the information, does not interfere with the lawful use of technology to obtain
data on the use of the information, and remover or disable access expeditiously to the information ordered removal or
disablement by an administrative authority.

Advances in Materials, Machinery, Electronics II


AIP Conf. Proc. 1955, 040129-1–040129-5; https://doi.org/10.1063/1.5033793
Published by AIP Publishing. 978-0-7354-1654-3/$30.00

040129-1
The provider does not know the illegal activity or information, but remove or disable access to the information
expeditiously after obtaining such knowledge.
Member States shall not impose a general obligation on provider to monitor the information nor to seek facts
indicating illegal activity. Member States may establish obligations for the provider to inform alleged illegal activities
undertaken or to offer the information that can identify their recipients. [2]

Detecting and Notifying of Illegal Content

FIGURE 1. Instance of administration authority FIGURE 2. Notices by trusted flaggers

FIGURE 3. Notices by users FIGURE 4. Using technology to detect illegal content

Removing Illegal Content and Preventing the Re-appearance of Illegal Content


The online platforms should remove illegal content expeditiously if they want to exempt from the liability, but
such removal should not impede the prosecution of any underlying breach of law. Automated removal should be
applied where the illegality of the content leave little doubt. At the same time, the removal of the content notified by
the trusted flagger should be more expeditiously. Online platform should improve transparency of the content removal
policy and notice-and action procedures by service terms and transparency report, prevent over removal and abuse of
the system and the content provider to contest a notice.
On the other hands, he online platform should take measure to prevent re-appearance of illegal activities, dissuade
users from uploading illegal content repeatedly, and update the filters promptly to ensure expeditious inspection and
removal of illegal content.

040129-2
Feasibility of the Proposal
According to article 13 in the directive, if the provider wants to exempt from the liability, it should not interfere
the obtaining of data of the information, and remove the content required removal by the competent authority.
Therefore, the use of filter is practical since it is a kind of technology that obtain data from the information, and the
requirement to remove illegal content from competent authority is acceptable.
According to article 14 in the directive, the provider should remove or disable access to illegal content after they
obtain knowledge of such illegal activities or information. Therefore, it is feasible for the proposal to require the online
platform to delete illegal content promptly.
According to article 15 in the directive, the Member States should not impose obligation on the provider to monitor
the information they transmit or store, but they can establish obligation for the provider to notify illegal activities and
offer the information that can identify their recipients. In terms of the proposal, the detecting of illegal content is
mainly executed by administration authority, trusted flaggers, users and technical tools. The platform itself is not
involve in this activity. Therefore, the measure of detecting and notifying of illegal content and the requirement to
report illegal content provided in the proposal is practical.

OPTIMIZATION PLAN TO FIGHT ILLEGAL CONTENT

China's Advantage in Cracking down Illegal Content


TABLE 1. The advantages of China [6-9]
Types of: Name: Advantages:
The law of Electronic signature of the People's Increasing the reliability of
Legal
Republic of China e-commerce platform
Promoting the healthy development
Legal People's Republic of China Network Security Law
of economic and social information
The General Office of the state council put forward Increasing the contact between the
National policy several opinions of accelerating the E-commerce network economy and the real
development economy
Government The center of China Internet lawbreak and bad
Playing the role of public supervision
department information reporting
Government Protecting children and maintaining
China Internet censorship
Action social security
Private Investigating the responsibility of
Weibo real-name certification
Enterprise speaker

As the result of social relations with Chinese characteristics, more than 60 Internet-related laws and regulations
have been launched through 14 departments including the National People's Congress, the State Council Information
Office, the Ministry of Public Security, the Ministry of Information Industry and the Publication Administration [10].
China has become one of the countries in the world with the most laws and regulations in this field. Among them,
there are at least 14 important laws and regulations concerning the content regulation. The state has formulated laws
and policies to provide the measures of illegal content control for government departments. Government departments
use government actions to influence the behaviors of enterprises and individuals, and jointly resist illegal content on
the Internet.

How to draw lessons from China's advantages


The biggest advantage of China is to control Internet content in the all-dimensional coordinated management mode
of the state, government, enterprises and individuals. And the European governments can gradually improve their
supervision. Since the Internet entered China, the Chinese government has been constantly improving the laws of
Internet content supervision. European countries should constantly absorb the advantage laws of relevant directions
from other countries, which base on their original laws. For example: Due to the vague wording of these criteria, the
question left for the courts to decide is the circumstances under which “a host provider can be assumed to know or be

040129-3
aware of the unlawfulness of the indicated content” [11].The European countries are vague about the legal boundary
of determining illegal content, and they can absorb the method of the illegal content definition from People's Republic
of China Network Security Law.

Optimize the filtering method


Corpus Training Model

The OCAT algorithm is used to get the normalized training set that can accept all the illegal content. The KNN
classifier is used to determine the formal type of the corpus. Then form the prototype of training corpus, during the
following continuous practice, in the face of constantly updates of the form of expression of illegal content, the corpus
will also continue to adapt and accept these samples for automatic updates, and gradually improve corpus training
model which is used for identify and screen constantly changing the cover of illegal information. This model can carry
out dynamic learning in future training, it can always be able to identify all the illegal content. Besides, regarding for
leakage judgment and misjudgment, the rules and discriminatory forms will be adjusted in constant practice feedback
to form a relatively precise model.

Creating DNS Blacklist

Protecting the security of the DNS message segment play an important role in Internet content regulation. Hacker
company can tamper the message segment and make the originally web page jumping to the web page which include
illegal content (such as: illegal dark net). Therefore, the filtration of information is important, and the following is
based on the big data to optimize the IP address filtration.

6WDUWWRUHFHLYH
'16UHTXHVW
SDFNHWV

7KHXQLWRI'16
UHTXHVWPHVVDJH
UHFHLYLQJ

7KHXQLWRI'16
UHTXHVWSDFNHW
ILOWHULQJDQG
GHWHFWLRQ

7KHXQLWRI'16 $GGWRWKH
UHTXHVWSDFNHW %ODFNOLVWRI,3
IRUZDUGLQJ DGGUHVV

FIGURE 5. The method of optimization process

Through the traversal of process, Collect DNS data, that is, a large number of resolution requests and domain name
registration records. Store these data, then analyze the characteristics of illegal content. Establish a set of IP white list
and IP black list to ensure that the IP address does not contain illegal content. Query and filter the data that has been
generated and stored, and mark the domain name appearing in the blacklist [12]. If the IP address is accessed for the
first time and without any record is stored in the database, the DNS protection module is used to filter and check the
DNS message. The keywords in the database and the stored illegal instances are used to check the content in the web
page. After the successful check, the IP address is forwarded to the process to do a further content check. Then add
the illegal IP address to the blacklist and bring up the registration information to closure and censor them.

040129-4
CONCLUSION
Web platforms can effectively handle illegal content by detecting, removing and forbidding access. These deleted
content should be made sure to prevent it from appearing again. In the first part, the detection and notification of
illegal content can be implemented by online platforms, competent departments and users. The online platform can
use automatic detection and filtering technology, establish convenient channels for illegal content announcers, and
establish good relationships with third parties that specialize in online detection and identification of illicit content.
The competent authorities can directly request online platforms to delete or block illegal content according to the law.
Users can report illegal contents on the net platforms. After deleting illegal contents, the platform also needs
safeguards to prevent the content from being accidentally deleted. Detailed information on platform management
should be involved in the transparency report. In the second part, EU can draw experiences on China's all-round
collaborative management model of countries, governments, enterprises and individuals to improve its monitoring of
illicit content. This essay presented an approach to strengthen the control of online content. Firstly, using some rule
algorithms and classifier to construct a training model that can identify and filter illegal content, in a large number of
examples of practice, it constantly updates and improves, plays the role of illegal information filter. Secondly, filtering
IP addresses based on big data, the security of DNS message segment is effectively protected thereby avoiding the
original page automatically jump to pages containing illegal content.

REFERENCES
1. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 3.
2. EU ISP liability. Directive 2000/31/EC of the European Parliament; page7
3. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 6.
4. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 13.
5. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 18.
6. The standing committee of the National People's Congress. November 7, 2016. Available online at
http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.html [EB\OL].
7. China Internet illegal and adverse information reporting center. Available online at http://www.12377.cn/
8. The comparison between China and the US, available online at http://www.geekpark.net/zhuanti/wtf/ [EB\OL].
9. CNR. The user of Sina Microblog without real name authentication will be banned from blogging and
commenting, available online at http://china.cnr.cn/yaowen/20170915/t20170915_523950041.shtml [EB\OL].
10. Yi Dejun. We will start a new future of internet ecological. 21st issue of 2017. Available online at
http://paper.people.com.cn/mszk/html/2017-11/13/content_1817510.html [EB\OL].
11. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 7.
12. Zhao Lei. Design and Development of the Malicious Domain Identification System based on DNS [D].
SHANDONG UNIVERSITY, 2013.

040129-5

You might also like