Professional Documents
Culture Documents
The Feasibility Study Based On E-Commerce Instructions-Focuses On Detection and Deletion of Illegal Content
The Feasibility Study Based On E-Commerce Instructions-Focuses On Detection and Deletion of Illegal Content
Optofluidics of plants
APL Photonics 1, 020901 (2016); https://doi.org/10.1063/1.4947228
© 2018 Author(s).
The Feasibility Study Based on E-commerce Instructions–
Focuses on Detection and Deletion of Illegal Content
Tianze Guoa), Siyu Bib) and Jiaming Liuc)
International School, Beijing University of Posts and Telecommunications, Beijing 100876, China.
a)
2015212974@bupt.edu.cn
b)
bisiyu@bupt.edu.cn
c)
Corresponding author: liujiaming@bupt.edu.cn
Abstract. This essay legally restrains the illegal content based on the e-commerce directive and introduces that the
European countries detect and notify illegal content through the instructions of competent authorities, notification of
credible flaggers, user reports and technical tools. The illegal content should be deleted through the service terms and
transparency report basing on prevent excessive deletions system. At the same time, use filters to detect and filter to against
the recurrence of illegal content. By analyzing the advantages of China under the environment of cracking down on illegal
content, this essay concludes that the success of China in cracking down on illegal content lies in all-round collaborative
management model of countries, governments, enterprises and individuals. At the end of the essay, one is to build a training
corpus that can automatically update the ability to identify the illegal content. And it proposes an optimization scheme that
establish a complete set of address resolution procedures and classify IP address data according to big data analysis and
DNS protection module to prevent hackers from spreading illegal content by tampering with DNS segments.
Key words: illegal content; e-commerce instruction; technical interface; filter; database; DNS.
INTRODUCTION
The current network technology are well developed. It brings people not only convenience but disadvantages. They
will exposure to unhealthy and illegal content such as smuggling, illegal speech, and terrorism. To strengthen controls
over these content on the Internet, the European Parliament urged these platforms "to strengthen measures to tackle
illegal and harmful content" [1]. This article studies how online platforms detect and remove illegal content on the
network and prevent criminals or others involved in network infringement activities from using their services. The
first part is the introduction of the legal background and specific methods of detecting and removing illegal contents.
The second part optimizes the clampdown on online illegal contents activities according to Chinese law and interface
technology.
BACKGROUND
040129-1
The provider does not know the illegal activity or information, but remove or disable access to the information
expeditiously after obtaining such knowledge.
Member States shall not impose a general obligation on provider to monitor the information nor to seek facts
indicating illegal activity. Member States may establish obligations for the provider to inform alleged illegal activities
undertaken or to offer the information that can identify their recipients. [2]
040129-2
Feasibility of the Proposal
According to article 13 in the directive, if the provider wants to exempt from the liability, it should not interfere
the obtaining of data of the information, and remove the content required removal by the competent authority.
Therefore, the use of filter is practical since it is a kind of technology that obtain data from the information, and the
requirement to remove illegal content from competent authority is acceptable.
According to article 14 in the directive, the provider should remove or disable access to illegal content after they
obtain knowledge of such illegal activities or information. Therefore, it is feasible for the proposal to require the online
platform to delete illegal content promptly.
According to article 15 in the directive, the Member States should not impose obligation on the provider to monitor
the information they transmit or store, but they can establish obligation for the provider to notify illegal activities and
offer the information that can identify their recipients. In terms of the proposal, the detecting of illegal content is
mainly executed by administration authority, trusted flaggers, users and technical tools. The platform itself is not
involve in this activity. Therefore, the measure of detecting and notifying of illegal content and the requirement to
report illegal content provided in the proposal is practical.
As the result of social relations with Chinese characteristics, more than 60 Internet-related laws and regulations
have been launched through 14 departments including the National People's Congress, the State Council Information
Office, the Ministry of Public Security, the Ministry of Information Industry and the Publication Administration [10].
China has become one of the countries in the world with the most laws and regulations in this field. Among them,
there are at least 14 important laws and regulations concerning the content regulation. The state has formulated laws
and policies to provide the measures of illegal content control for government departments. Government departments
use government actions to influence the behaviors of enterprises and individuals, and jointly resist illegal content on
the Internet.
040129-3
aware of the unlawfulness of the indicated content” [11].The European countries are vague about the legal boundary
of determining illegal content, and they can absorb the method of the illegal content definition from People's Republic
of China Network Security Law.
The OCAT algorithm is used to get the normalized training set that can accept all the illegal content. The KNN
classifier is used to determine the formal type of the corpus. Then form the prototype of training corpus, during the
following continuous practice, in the face of constantly updates of the form of expression of illegal content, the corpus
will also continue to adapt and accept these samples for automatic updates, and gradually improve corpus training
model which is used for identify and screen constantly changing the cover of illegal information. This model can carry
out dynamic learning in future training, it can always be able to identify all the illegal content. Besides, regarding for
leakage judgment and misjudgment, the rules and discriminatory forms will be adjusted in constant practice feedback
to form a relatively precise model.
Protecting the security of the DNS message segment play an important role in Internet content regulation. Hacker
company can tamper the message segment and make the originally web page jumping to the web page which include
illegal content (such as: illegal dark net). Therefore, the filtration of information is important, and the following is
based on the big data to optimize the IP address filtration.
6WDUWWRUHFHLYH
'16UHTXHVW
SDFNHWV
7KHXQLWRI'16
UHTXHVWPHVVDJH
UHFHLYLQJ
7KHXQLWRI'16
UHTXHVWSDFNHW
ILOWHULQJDQG
GHWHFWLRQ
7KHXQLWRI'16 $GGWRWKH
UHTXHVWSDFNHW %ODFNOLVWRI,3
IRUZDUGLQJ DGGUHVV
Through the traversal of process, Collect DNS data, that is, a large number of resolution requests and domain name
registration records. Store these data, then analyze the characteristics of illegal content. Establish a set of IP white list
and IP black list to ensure that the IP address does not contain illegal content. Query and filter the data that has been
generated and stored, and mark the domain name appearing in the blacklist [12]. If the IP address is accessed for the
first time and without any record is stored in the database, the DNS protection module is used to filter and check the
DNS message. The keywords in the database and the stored illegal instances are used to check the content in the web
page. After the successful check, the IP address is forwarded to the process to do a further content check. Then add
the illegal IP address to the blacklist and bring up the registration information to closure and censor them.
040129-4
CONCLUSION
Web platforms can effectively handle illegal content by detecting, removing and forbidding access. These deleted
content should be made sure to prevent it from appearing again. In the first part, the detection and notification of
illegal content can be implemented by online platforms, competent departments and users. The online platform can
use automatic detection and filtering technology, establish convenient channels for illegal content announcers, and
establish good relationships with third parties that specialize in online detection and identification of illicit content.
The competent authorities can directly request online platforms to delete or block illegal content according to the law.
Users can report illegal contents on the net platforms. After deleting illegal contents, the platform also needs
safeguards to prevent the content from being accidentally deleted. Detailed information on platform management
should be involved in the transparency report. In the second part, EU can draw experiences on China's all-round
collaborative management model of countries, governments, enterprises and individuals to improve its monitoring of
illicit content. This essay presented an approach to strengthen the control of online content. Firstly, using some rule
algorithms and classifier to construct a training model that can identify and filter illegal content, in a large number of
examples of practice, it constantly updates and improves, plays the role of illegal information filter. Secondly, filtering
IP addresses based on big data, the security of DNS message segment is effectively protected thereby avoiding the
original page automatically jump to pages containing illegal content.
REFERENCES
1. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 3.
2. EU ISP liability. Directive 2000/31/EC of the European Parliament; page7
3. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 6.
4. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 13.
5. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 18.
6. The standing committee of the National People's Congress. November 7, 2016. Available online at
http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.html [EB\OL].
7. China Internet illegal and adverse information reporting center. Available online at http://www.12377.cn/
8. The comparison between China and the US, available online at http://www.geekpark.net/zhuanti/wtf/ [EB\OL].
9. CNR. The user of Sina Microblog without real name authentication will be banned from blogging and
commenting, available online at http://china.cnr.cn/yaowen/20170915/t20170915_523950041.shtml [EB\OL].
10. Yi Dejun. We will start a new future of internet ecological. 21st issue of 2017. Available online at
http://paper.people.com.cn/mszk/html/2017-11/13/content_1817510.html [EB\OL].
11. Brussels. September 28th, 2017. “Tackling Illegal Content Online”, page 7.
12. Zhao Lei. Design and Development of the Malicious Domain Identification System based on DNS [D].
SHANDONG UNIVERSITY, 2013.
040129-5