!" #$%&'%& ()*+,"-,%.,% /,&0$11'%& 2+&1),"&,3 $1 (1$!&4D1,6'%7
|
|
|
- MargaretMargaret Davidson
- 9 years ago
- Views:
Transcription
1 !" #$%&'%& ()*+,"-,%.,% /,&0$11'%& 2+&1),"&,3 $1 (1$!&4D1,6'%7!"#$% &"$'() U%+'$,)+-(- &(,./) III -$ 4("%$ A(# BU D(,C)8( (. 4,5267( I%)8+8"8$ I1D:; <$8=/,7) (%- U%+'$,)+-(- &(,./) III -$ &(,C$% D"$,,$,/ U%+'$,)+-(- &(,./) III -$ ;%>$. &"$'() U%+'$,)+-(- &(,./) III -$ U%+'$,)+85 ABSTRACT BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serious legal implications for users who publish the material (or publishers). This raises a question that whether (at least major) content publishers behave in an altruistic fashion or have other incentives such as!nancial. In this study, we identify the content publishers of more than 55K torrents in two major BitTorrent portals and examine their behavior. We demonstrate that a small fraction of publishers is responsible for 67% of the published content and 75% of the downloads. Our investigations reveal that these major publishers respond to two different pro!les. On the one hand, antipiracy agencies and malicious publishers publish a large amount of fake!les to protect copyrighted content and spread malware respectively. On the other hand, content publishing in BitTorrent is largely driven by companies with!nancial incentives. Therefore, if these companies lose their interest or are unable to publish content, BitTorrent traf!c/portals may disappear or at least their associated traf!c will be signi!cantly reduced. Reza Rejaie was Visiting Researcher at Institute IMDEA Networks, September August 2010, while this study was performed. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro!t or commercial advantage and that copies bear this notice and the full citation on the!rst page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior speci!c permission and/or a fee. ACM CoNEXT 2010, November 30 December , Philadelphia, USA. Copyright 2010 ACM /10/11...$ Categories and Subject Descriptors C.2.4 [Computer Communication Networks]: Distributed Systems Distributed Applications General Terms Measurement, Economics Keywords BitTorrent, Content Publishing, Business Model 1. INTRODUCTION Peer to Peer (P2P) file-sharing applications, and more specifically BitTorrent, are a clear example of killer Internet applications in the last decade. BitTorrent is currently used by hundreds of millions of users and is responsible for a large portion of the Internet traffic [4]. This in turn has attracted the research community to examine various aspects of swarming mechanism in BitTorrent [10, 16, 13] and propose different techniques to improve its performance [19, 15]. Furthermore, other aspects of BitTorrent such as demography of users [22, 12, 20] along with the security [21] and privacy [6, 7] issues have also been studied. However, the socio-economic aspects of BitTorrent in particular, and other P2P file sharing systems in general, have received little attention. In particular, the availability of popular and often copyrighted content (e.g. recent TV shows and Hollywood movies) to millions of interested users at no cost is the key factor in the popularity of BitTorrent. This raises an important question about the incentive of publishers who make these content available through BitTorrent portals. Despite its importance to properly understand the popularity of BitTorrent, to our knowledge prior studies on BitTorrent have not tackled this critical question. In this paper, we study content publishing in Bit-
2 Torrent from a socio-economic point of view by unravelling who publishes content in BitTorrent, and why. Toward this end, we conduct a large scale measurement over two major BitTorrent portals, namely Mininova and the Pirate Bay, to capture more than 55K published content that involve more than 35M IP addresses. Using this dataset, we first examine the contribution of the individual content publishers and illustrate that a small fraction of publishers ( 100) are responsible of uploading 67% of the content that serve 75% of the downloads in our major dataset. Furthermore, most of these major publishers dedicate their resources for publishing content and consume few or no published content by others, i.e. their level of content publication and consumption is very imbalanced. In addition to allocating a significant amount of resources for publishing content, these users often publish copyrighted material, which has legal implications for them [1, 2]. These observations raise the following question: what are the main incentives of (major) content publishers in BitTorrent?. To answer this important question, we conduct a systematic study on the major publishers in BitTorrent. We show that these publishers can be broadly divided into two different groups: fake publishers who publish a large number of fake content and top publishers who publish a large number of often copyrighted content. We also identify the main characteristics (i.e. signature) of publishers in each group such as their seeding behavior and the popularity of their published content. We investigate the main incentives of major (non-fake) publishers and classify them into three categories (i) Private BitTorrent Portals that offer certain services and receive financial gain through ads, donations and fees, (ii) Promoting web sites that leverage published content at BitTorrent portals to attract users to their own web site for financial gain, and (iii) Altruistic Major Publishers. We characterize these three groups of publishers and present the estimated value (income) of the associated web sites to support our claims about their incentives. The main contributions of this paper can be summarized as follows: We present a simple measurement methodology to monitor the content publishing activity in major BitTorrent portals. This methodology has been used to implement a system that continuously monitors and reports the content publishing activity in the Pirate Bay portal. The collected data is made publicly available through a web site. The distribution of the number of published content by each publisher is very skewed, i.e. a very small fraction of publishers ( 100) is responsible for a significant fraction of the published content (67%) and even more significant fraction of the downloads (75%). These major publishers can be further divided into three groups based on their incentives as follows: fake publishers, altruistic top publishers and profit-driven publishers. Fake publishers are either antipiracy agencies or malicious users who are responsible for 30% of the content and 25% of the downloads. These publishers sustain a continuous poisoning-like index attack [17] against BitTorrent portals that affects millions of downloaders. Profit-driven top publishers own fairly profitable web sites. They use major BitTorrent portals such as the Pirate Bay as a platform to advertise their web sites to millions of users. For this purpose they publish popular torrents where they attach the URL of their web sites in various manners. The publishers that pursue this approach are responsible for roughly 30% of the content and 40% of the downloads in BitTorrent. The rest of the paper is organized as follows. Section 2 describes our measurement methodology. Sections 3 and 4 are dedicated to the identification of major publishers and their main characteristics (i.e. signature) respectively. In Section 5, we study the incentives that major publishers have to perform this activity. Section 6 presents other players that also benefit from content publishing. In Section 7 we describe our publicly available application to monitor content publishing activity in the Pirate Bay portal. Finally Section 8 discusses related work and Section 9 concludes the paper.. 2. MEASUREMENT METHODOLOGY This section describes our methodology to identify the initial publisher of a file that is distributed through a BitTorrent swarm. Towards this end, we first briefly describe the required background on how a user joins a BitTorrent swarm. Background: A BitTorrent client takes the following steps to join the swarm associated with file X. First, the client obtains the.torrent file associated to the desired swarm. The.torrent file contains contact information for the tracker that manages the swarm and the number of pieces of file X. Second, the client connects to the tracker and obtains the following information: (i) the number of seeders and leechers that are currently connected to the swarm, and (ii) N (typically 50) random IP addresses of participating peers in the swarm. Furthermore, if the number of neighbors is eventually lower than a given threshold (typically 20), the client contacts the tracker again to learn about other peers in the swarm. To facilitate the bootstrapping process, the.torrent files are typically indexed at BitTorrent portals. Some
3 Portal Start End #Torrents #IP addresses mn08 Mininova 09-Dec Jan-09 - /20.8K 8.2M pb09 Pirate Bay 28-Nov Dec K/10.4K 52.9K pb10 Pirate Bay 06-Apr May K/14.6K 27.3M Table 1: Datasets Description. of the major portals (e.g. the Pirate Bay or Mininova 1 ) index millions of.torrent files [22], classify them into different categories and provide a web page with detailed information (content category, publisher s username, file size, and file description) for each file. These portals also offer an RSS feed to announce a newly published file. The RSS feed provides some information such as content category, content size and publisher s username for a new file. Identifying Initial Publisher: The objective of our measurement study is to determine the identity of the initial publishers of a large number of torrents and to assess the popularity of each published file (i.e. the number and identity of peers who download the file). Toward this end, we leverage the RSS feed to detect the availability of a new file on major BitTorrent portals and retrieve the publisher s username. In order to obtain the publisher s IP address, we immediately download the.torrent file and connect to the associated tracker. This implies that we often contact the tracker shortly after the birth of the associated swarm when the number of participating peers is likely to be small and the initial publisher (i.e. seeder) is one of them. We retrieve the IP address of all participating peers as well as the current number of seeders in the swarm. If there is only one seeder in the swarm and the number of participating peers is not too large (i.e. < 20), we obtain the bitfield of available pieces at individual peers to identify the seeder. Otherwise, reliably identifying the initial seeder is difficult because there are more than one seeder or the number of participating peers is large 2. Furthermore, we cannot directly contact the initial seeder that is behind a NAT box and thus we are unable to identify the initial publisher s IP address in such cases. Using this technique we were able to reliably identify the publisher s username for all the torrents and the publisher s IP address in at least 40% of the torrents. Once we identify a publisher, we periodically query the tracker in order to obtain the IP addresses of the participants in the associated swarm and always solicit the maximum number of IP addresses (i.e. 200) from Our investigations revealed two interesting scenarios for which we could not identify the initial publisher s IP address: (i) swarms that have a large number of peers shortly after they are added to the portal. We discovered that these swarms have already been published in other portals. (ii) swarms for which the tracker did not report any seeder for a while or did not report a seeder at all. the tracker. To avoid being blacklisted by the tracker, we issue our queries at the maximum rate that is allowed by the tracker (i.e. 1 query every 10 to 15 minutes depending on the tracker load). Given this constraint, we query the tracker from several geographically-distributed machines so that the aggregated information by all these machines provides an adequately high resolution view of participating peers and their evolution over time. We continue to monitor a target swarm until we receive 10 consecutive empty replies from the tracker. We use the MaxMind Database [3] to map all the IP addresses (for both publishers and downloaders) to their corresponding ISPs and geographical locations. 2.1 Dataset Using the described methodology, we identify a large number of BitTorrent swarms at two major BitTorrent portals, namely Mininova and the Pirate Bay. Each one of these portals was the most popular BitTorrent portal at the time of the corresponding measurement according to Alexa ranking 3. It is worth noting that the Pirate Bay is in particular interesting for our study since it is the only main BitTorrent portal where all the published content is contributed by users [22] (as opposed to being retrieved from other portals). Table 1 shows the main features of our three datasets (1 from Mininova and 2 from the Pirate Bay) including the start and end dates of our measurement, the number of torrents for which we identified the initial publisher (username/ip address), and the total number of discovered IP addresses associated for all the monitored swarms. We refer to these datasets as mn08, pb09 and pb10 throughout this paper. We note that dataset mn08 does not contain the username of initial publishers, and we use a single query to identify initial publishers in dataset pb09 after detecting a new swarm through the RSS feed. We use all three datasets for our general analysis but focused on pb10 for our detailed analysis. 3. IDENTIFYING MAJOR PUBLISHERS A publisher can be identified by its username and/or IP address. In our analysis, we identify individual publishers primarily by their username since the username is expected to remain consistent across different torrents. The only exceptions are publishers in mn08 since we do not have their usernames and fake publishers as we describe in the next subsections. 3.1 Skewness of Contribution First, we examine the level of contribution (i.e. the number of published files) by the identified content publishers in each dataset. Figure 1 depicts the percentage of files that are published by the top x% of the publishers in our three datasets. We observe that the top 3% of 3
4 mn08 pb09 pb10 ISP Type % ISP Type % ISP Type % OVH Hosting Provider OVH Hosting Provider OVH Hosting Provider Comcast Commercial ISP 4.69 Comcast Commercial ISP 3.67 SoftLayer Tech. Hosting Provider 4.52 Keyweb Hosting Provider 3.18 Road Runner Commercial ISP 2.3 FDCservers Hosting Provider 3.64 Road Runner Commercial ISP 3.03 Romania DS Commercial ISP 2.27 Open Computer Network Commercial ISP 3.59 NetDirect Hosting Provider 2.44 MTT Network Commercial ISP 1.95 tzulo Hosting Provider 3.36 Virgin Media Commercial ISP 2.42 Verizon Commercial ISP 1.64 Comcast Commercial ISP 2.86 NetWork Operations Center Hosting Provider 2.39 Virgin Media Commercial ISP 1.49 Cosema Commercial ISP 2.25 SBC Commercial ISP 2.38 SBC Commercial ISP 1.41 Telefonica Commercial ISP 2.22 Comcor-TV Commercial ISP 2.33 NIB Commercial ISP 1.26 Jazz Telecom. Commercial ISP 2.07 Telecom Italia Commercial ISP 2.02 tzulo Hosting Provider RWEB Hosting Provider 2.06 Table 2: Content Publishers Distribution per ISP. M$,2$%8(>$N/FNO"#.+)3$-N2/%8$%8 1GG KG JG IG 2G C%GK O#GP O#1G G N G 2G IG JG KG 1GG M$,2$%8(>$N/FNNO"#.+)3$,) Figure 1: Percentage of content published by the top x% publishers. the BitTorrent publishers contribute roughly 40% of the published content. Moreover, a careful examination of IP addresses for the top-100 (i.e. 3%) publishers in our pb10 dataset reveals that a significant fraction of them either do not download any content (40%) or download less than 5 files (80%). This large contribution of resources (bandwidth and content) by major publishers coupled with the significant imbalance between their publishing and consumption rates seems non-altruistic and rather difficult to justify for two simple reasons: - Required Resources/Cost: publishing a large number of content requires a significant amount of processing and bandwidth. For example, a major content publisher named eztv recommends in its private BitTorrent portal web page ( to allocate at least 10Mbps in order to sustain the seeding of few (around 5) files in parallel. - Legal Implications: As other studies have reported [6] and we confirm in our datasets, a large fraction of content published by major publishers is copyrighted material (recent movies or TV series). Thus, publishing these files is likely to have serious legal consequences for these publishers [1, 2]. This raises the question that why this small fraction of publishers allocate a great deal of (costly) resources to contribute many files into BitTorrent swarms despite potential legal implications?. We answer this central question in Section 5. N 3.2 Publishers ISPs To help identify content publishers in our dataset, we determine the ISP that hosts each major publisher and use that information to assess the type of service (and available resources) that a publisher is likely to have. Toward this end, we map the IP address for a publisher in each dataset to its corresponding ISP using the Max- Mind database [3]. We then examine publicly available information about each ISP (e.g. its web page) to determine whether it is a commercial ISP or a hosting provider. We perform this analysis only for the top- 100 (roughly 3%) publishers since these publishers are mostly of interest and collecting the required information for all publishers is a tedious task. Since we do not have publishers username for mn08, we examine the top-100 publishers based on their IP addresses in this dataset. For these publishers, we cannot assess the aggregated contribution of a publisher through different IP addresses (i.e. under-estimating the contribution of each publisher). We observe that 42% of the top-100 publishers in pb10, 35% of the top-100 in pb09 and 77% of the top- 100 publishers in mn08 are located at hosting services. Moreover 22%, 20% and 45% of these top-100 publishers are located at a particular hosting services, namely OVH, in pb10, pb09 and mn08 respectively. In short, our analysis reveals that a significant fraction of major publishers are located at a few hosting services and a large percentage of them at OVH. We also examine the contribution of BitTorrent publishers at the ISP-level by mapping all the publishers to their ISPs and identify the top-10 ISPs based on their aggregate published content for each dataset as shown in Table 2. This table confirms that content publishers who are located at a particular hosting provider, namely OVH, have consistently contributed a significant fraction of published content at major BitTorrent portals. There are also several commercial ISPs (e.g. Comcast) in Table 2 with a much smaller contribution. To assess the difference between users from hosting providers and commercial ISPs, we compare and contrast the characteristics of all publishers that are located at OVH and Comcast as representative ISPs for each class of publishers in Table 3. This table demonstrates the following two important differences: first,
5 Published # IP addr # /16 IP # Geo torrents Pref. Loc. OVH (mn08) Comcast (mn08) OVH (pb09) Comcast (pb09) OVH (pb10) Comcast (pb10) Table 3: Characteristics of all OVH and Comcast publishers in mn08, pb09 and pb10. the aggregate contribution of each publisher at OVH is on average a few times larger than Comcast publishers. Second, Comcast publishers are sparsely scattered across many /16 IP prefixes and many geographical locations in the US whereas OVH publishers are concentrated in a few /16 IP prefixes and a handful of different locations in Europe (i.e. the location of OVH s data centers). In essence, the published content by Comcast publishers comes from a large number of typical altruistic users where each one publishes a small number of files from their home or work. In contrast, OVH publishers appear to be paying for a well provisioned service to be able to publish a much larger number of files. We have also examined consumer peers in captured torrents and did not observe the presence of OVH users among the consuming peers. In summary, the examination of ISPs that host major BitTorrent publishers suggests that these publishers are located either at a few hosting providers (with a large concentration at OVH) or at commercial ISPs. These publishers contribute a significantly larger number of files than average publishers. Furthermore, publishers who are located at hosting providers do not consume published content by other publishers. 3.3 A Closer Look at Major Publishers We now examine the mapping between username and IP address of the top-100 content publishers in the pb10 dataset to gain some insight about major publishers behavior. Our examination reveals the following interesting points: First, if we focus on the top-100 IP addresses that have published the largest number of files, only 55% of them are used by a unique username. The remaining 45% of the IP addresses of major publishers are mapped to a large number of usernames. We have carefully investigated this set of IP addresses and discovered that they use either hacked or manually created accounts (with a random username) to inject fake content. These publishers appear to be associated with antipiracy agencies or malicious users. The former group tries to avoid the distribution of copyrighted content whereas the latter attempts to disseminate malware. We refer to these publishers as fake publishers. Surprisingly, fake publishers are responsible for around 25% of the usernames, 30% of the published content and 25% of the downloads in our pb10 dataset. This suggests that major BitTorrent portals are suffering from a systematic poisoning index attack [17] that affects 30% of the published content. The portals fight this phenomenon by removing the fake content as well as the user accounts used to publish them. However, contrary to what has been reported in previous studies [20], this technique does not seem to be sufficiently effective since millions of users initiate the download of fake content. Finally, it is worth noting that most of the fake publishers perform their activity from three specific hosting providers named tzulo, FDC Servers and 4RWEB. Due to the relevant activity of these fake publishers, we study them as a separate group in the rest of the paper. Second, the inspection of the top-100 usernames who publish the largest number of files shows that only 25% of them operate from a single IP. The remaining 75% of top usernames utilize multiple IPs and can be classified into the following common cases: (i) 34% of the usernames with multiple IP addresses (5.7 IP addresses on average) at a hosting provider in order to obtain the required resources for seeding a large number of files. (ii) 24% of the usernames with multiple IP addresses (13.8 IP addresses on average) located at a single commercial ISP. Their mapping to multiple IP addresses must be due to the periodical change of their assigned IP addresses by their ISPs. (iii) The other 17% of these usernames are mapped to multiple IP addresses (7.7 IP addresses on average) at different commercial ISPs. These are users who inject content from various locations (e.g. home and work computer). To properly characterize different types of publishers, we exclude the 16 usernames who publish fake content from the top-100 usernames. We refer to the remaining top-100 usernames (non-fake publishers) as Top publishers who are responsible of 37% of the published content and 50% of the total downloads in our pb10 dataset. In summary, the major portion of the content comes from two reduced group of publishers: Top publishers and Fake publishers that collectively are responsible of 67% of the published content and 75% of the downloads. In the rest of the paper we devote our effort to characterize these two groups. 4. SIGNATURE OF MAJOR PUBLISHERS Before we investigate the incentives of major Bit- Torrent publishers, we examine whether they exhibit any other distinguishing features, i.e. whether major publishers have a distinguishing signature. Any such distinguishing features could shed some light on the underlying incentives of these publishers. Toward this end, in the next few subsections, we examine the following characteristics of major publishers in our datasets: (i) the type of published content, (ii) the popularity of published content, and (iii) the availability and seeding
6 (a) mn08 (b) pb10 Figure 2: Type of published content distribution for the different classes of publishers: All, Fake, Top, Top-HP and Top-CI. behavior of a publisher. To identify distinguishing features, we examine the above characteristics across the following three target groups in each dataset: all publishers (labeled as All ), all fake publishers (labeled as Fake ) and all top-100 (non-fake) publishers regardless of their ISPs (labeled as Top ). We also examine the break down of Top publishers based on their ISPs into hosting providers and commercial ISPs, labeled as Top-HP and Top- CI, respectively. 4.1 Content Type We leverage the reported content type by each publisher to classify the published content across different target groups. Figure 2 depicts the break down of published content across different content type for all publishers in each target group for our Mininova and our major Pirate Bay datasets. We recall that without username information for each publisher in mn08 dataset, we cannot identify fake publishers. Figure 2 reveals a few interesting trends as follows: First, Video files (which mainly include movies, TVshows and porn content) constitute a significant fraction of published files across most groups with some important differences. The percentage of published video across all publishers is around 37%-51% but it is slightly larger among top publishers. However, video is clearly a larger fraction of published content by the top publishers located at hosting providers in our pb10 dataset. Fake publishers primarily focus on Videos (recent movies and TV shows) and Software content. This supports our earlier observation that these publishers consist of antipiracy agencies and malicious users because the former group publishes a fake version of recent movies while the latter provides software that contains malware. 4.2 Content Popularity The number of published files by a publisher shows only one dimension of its contribution to BitTorrent. The other equally important issue is the popularity of each published content (i.e. the number of download- ;'>N<"CND/=%./(-$,)NO$,NB/,,$%8NO$,NM"#.+)3$, 1G I 1G 3 1G 2 1G 1 ;.. Q(7$ B/O B/O!RM B/O!&I Figure 3: Avg Num of Downloaders per torrent per publisher for the different classes of publishers: All, Fake, Top, Top-HP, Top-CI. ers regardless of their download progress) by individual publishers. Figure 3 shows the box plot of the distribution of average downloaders per torrent per publisher across all publishers in each target group where each box presents the 25th, 50th and 75th percentiles. On the one hand, the median popularity of top publishers torrents is 7 times higher than a typical user (represented by All). A closer examination of the Top publishers shows that the content published by users at hosting providers is on average 1.5 times more popular than those published by users at commercial ISPs. On the other hand, fake publishers content is the most unpopular among the target groups. This is because the portals actively monitor the torrents and immediately remove the content identified as fake to avoid users from downloading it. Furthermore, users quickly realize the fake nature of these content and report this info on forums that inform others and limit their popularity. In summary, top publishers are responsible for a larger fraction of popular torrents. This in turn magnifies the contribution of the 37% of the injected files by the top publishers to be responsible for 50% of all the downloads. The low popularity of fake publishers content has the opposite effect and limits their contribution to the number of downloads to 25%. 4.3 Seeding Behavior We characterize the seeding behavior of individual publishers in our target groups using the following metrics: (i) average seeding time of a publisher for its published content, (ii) average number of parallel seeded torrents, and (iii) aggregated session time of a publisher across all its torrents. Since calculating these properties requires detailed analysis of our dataset that are computationally expensive, we are unable to derive these values for all publishers. We use 400 randomly selected publishers to represent the normal behaviour of all publishers and refer to this group as All in our analysis. In order to compute these metrics we need to estimate
7 ;'>TN?$$-+%>NB+C$NM$,NB/,,$%8NM$,NM"#.+)3$,NU3/",)V 1GG KG JG IG 2G G ;.. Q(7$ B/O B/O!RM B/O!&I (a) Average Seeding Time per Content per Publisher ;'>N<"CN/FNB/,,$%8)N?$$-N+%NM(,(..$.NO$,NM"#.+)3$, IG 3W 3G 2W 2G 1W 1G W G ;.. Q(7$ B/O B/O!RM B/O!&I (b) Average Number of Parallel Seed Torrents Per Publisher ;>>,$>(8$-N?$))+/%NB+C$NO$,NM"#.+)3$,NUR/",)V JGG WGG IGG 3GG 2GG 1GG G ;.. Q(7$ B/O B/O!RM B/O!&I (c) Average Aggregated Session Time Per Publisher Figure 4: Seeding Behaviour for the different classes of publishers: All, Fake, Top, Top-HP and Top-CI. the time that a specific publisher has been connected to a torrent (in one or multiple sessions). Since each query to the tracker just reports (at most) a random subset of 200 IPs, in big torrents (>200 peers), we need to perform multiple queries in order to assess the presence of the publisher in the torrent. In our associated Technical Report [8], we detail the technique used to estimate the session time of a specific user in each torrent. Average Seeding Time: We measure the duration of time that a publisher stays in a torrent since its birth to seed the content. In general, a publisher can leave the torrent once there is an adequate fraction of other seeds. Figure 4(a) depicts the summary distribution of average seeding time across all publishers in each target group. This figure demonstrates the following points: first, the seeding time for fake publishers is significantly longer than publishers in other groups. Since these publishers do not provide the actual content, the initial fake publisher remains the only seed in the session (i.e. other users do not help in seeding fake content) to keep the torrent alive. Second, Figure 4(a) shows that top publishers typically seed a content for a few hours. However, the seeding time for top publishers from hosting providers is clearly longer than top publishers from commercial ISPs. This suggests that publishers at hosting providers are more concerned about the availability of their published content. Average number of Parallel Torrents: Figure 4(b) depicts the summary distribution of the average number of torrents that a publisher seeds in parallel across publishers in each target group. This figure indicates that fake publishers seed many torrents in parallel. We have seen that fake publishers typically publish a large number of torrents and other users do not help them for seeding. Therefore, fake publishers need to seed all of their seeded torrents in parallel in order to keep them alive. The results for top publishers show that their typical number of seeded torrents in parallel is the same (around 3 torrents) regardless of their location. However, we expect that a regular publisher seed only 1 file at a time. Aggregated Session Time: We have also quantified the availability of individual publishers by estimating the aggregated session time that each publisher is present in the system across all published torrents. Figure 4(c) shows the distribution of this availability measure across publishers in each target group. As expected fake publishers present the longest aggregated session time due to their obligation to continuously seed their content to keep them alive. If we focus on top publishers, they exhibit a typical aggregated session 10 times longer than standard users. Furthermore, top publishers at hosting services are clearly more available than those from commercial ISPs. 4.4 Summary BitTorrent content publishers can be broadly divided into three groups as follows: (i) Altruistic users who publish content while consuming content that is published by other users. (ii) Fake publishers publish a significant number of files that are often Video and Software content from a few hosting providers. Due to the fake nature of their content, their torrents are unpopular and they need to seed all torrents to keep them alive. These publishers appear to be associated with antipiracy agencies or malicious users. We validate this hypothesis in the next section. (iii) Top publishers publish a large number of popular files (often copyrighted video) and remain for a long time in the associated torrents to ensure proper seeding of their published content. These publishers are located at hosting facilities or commercial ISPs. Their behavior suggests that these publishers are interested in the visibility of the published content possibly to attract a large number of users. The (cost of) allocated resources by these publishers along with legal implications of publishing copyrighted material cannot be considered as altruistic.
8 Therefore, the most conceivable incentive for these publishers appears to be financial profit. We examine this hypothesis in the rest of the paper. 5. INCENTIVES OF MAJOR PUBLISHERS In this section, we examine the incentive of different groups of publishers in more detail. First we focus on fake publishers by examining the name and content of the files they published. We noticed that these publishers often publish files with catchy titles (e.g. recently released Hollywood movies) and in most cases the actual content has already been removed at the moment of downloading it 4. The few files we were able to download were indeed fake content. Some of them included an antipiracy message whereas some others led to malware software. In the latter case, the content was a video that had a pointer to a specific software (e.g. to be downloaded in order to reproduce the video. This software was indeed a malware 5. These observations validate our hypothesis that fake publishers are either antipiracy agents who publish fake versions of copyrighted content or malicious users who led users to download a malware. Therefore, we have clearly identified the incentives of fake publishers. Second, another group of major publishers allocate significant amount of resources to publish non-fake an often copyrighted content. We believe that the behavior of these users is not altruistic. More specifically, our hypothesis is that these publishers leverage major Bit- Torrent portals as a venue to freely attract downloading users to their web sites. To verify this hypothesis, we conduct an investigation to gather the following information about each one of the top (i.e. top-100 non-fake) publishers: Promoting URL: the URL that downloaders of a published content may encounter, Publisher s Username: any publicly available information about the username that a major publisher uses in the Pirate Bay portal, and Business Profile: offered services (and choices) at the promoting URL. Next, we describe our approach for collecting this information. Promoting URL: We emulate the experience of a user by downloading a few randomly-selected files published by each top publisher to determine whether and where they may encounter a promoting URL. We identified 4 We tried to download these files a few weeks after the correspondent measurement study was performed. 5 FLVDIRECT.EXE.html three places where publishers may embed a promoting URL: (i) name of the downloaded file (e.g. user mois20 names his files as filename-divxatope.com, thus advertising the URL (ii) the textbox in the web page associated with each published content, (iii) name of a text file that is distributed with the actual content and is displayed by the BitTorrent software when opening the.torrent file. Our investigation indicates that the second approach (using the textbox) is the most common technique among the publishers. Publisher s Username: We browsed the Internet to learn more information about the username associated with each top publisher. First, the username is in some cases directly related to the URL (e.g. user UltraTorrents whose URL is This exercise also reveals whether this username publishes on other major BitTorrent portals in addition to the Pirate Bay. Finally, posted information in various forums could reveal (among other things) the promoting web site. Business Services: We characterize the type of services offered at the promoting URL and ways that the web site may generate incomes (e.g. posting ads). We also capture the exchanged HTTP headers between a web browser and the promoting URL to identify any established connection to third-party web sites (e.g. redirection to ads web sites or some third party aggregator) using the technique described in [14]. 5.1 Classifying Publishers Using the above methodology, we examined a few published torrents for each one of the top publishers as well as sample torrents for 100 randomly selected publishers that are not in the top-100, called regular publishers. On the one hand, we did not discover any interesting or unusual behavior in torrents published by regular publishers and thus conclude that they behave in an altruistic manner. On the other hand, a large fraction of seeded torrents by the top publishers systematically promote one or more web sites with financial incentives. Our examination revealed that these publishers often include a promotional URL in the textbox of the content web page. We classify these top publishers into the following three groups based on their type of business (using the content of their promoting web sites) and describe how they leverage BitTorrent portals to intercept and redirect users to their web sites. Private BitTorrent Trackers: A subset of major publishers (25% of top) own their BitTorrent portals that are in some cases associated with private trackers [11]. These private trackers offer a better user experience in terms of download rate (compared to major open BitTorrent portals) but require clients to maintain certain seeding ratio. More specifically, each participating BitTorrent client is required to seed content propor-
9 tionally to the amount of data it downloads across multiple torrents. To achieve this goal, users are required to register in the web site and login before downloading the torrent files. The publishers in this class publish 18% of all the content while they are responsible for 29% of the downloads. 2/3 of these publishers advertise the URL in the textbox at the content web page. Furthermore, they appear to gain financial profit in three different ways: (i) posting advertisement in their web sites, (ii) seeking donations from visitors to continue their basic service, and (iii) collecting a fee for VIP access that allows the client to download any content without requiring any kind of seeding ratio. These publishers typically inject video, audio and application content into BitTorrent portals. Interestingly, a significant fraction of publishers in this class (40%) publish content in a specific language (Italian, Dutch, Spanish or Swedish) and specifically a 66% of this group are dedicated to publishing Spanish content. This finding is consistent with prior reports on the high level of copyright infringement in Spain [5]. Promoting Web Sites: Another class of top publishers (23% of top) promote some URLs that are associated with hosting images web sites (e.g. forums or even religious groups (e.g. lightmiddleway. com). These publishers inject 8% of the content and are responsible of 11% of the downloads. Most publishers in this class advertise their URL using the textbox in the content web page. Furthermore, most of these publishers (70%), specifically those that are running a hosting image web site, publish only porn content. Inspection of the associated hosting image web sites revealed that they store adult pictures. Therefore, by publishing porn content in major BitTorrent portals, they are targeting a particular demography of users who are likely to be interested in their web sites. The incomes of the portals within this class is based on advertisement. Altruistic Publisher: The remaining top publishers (52% of top) appear to be altruistic users since they do not seem to directly promote any URL. These publishers are responsible of 11.5% of the content and the same fraction of downloads. Many of these users publish small music and e-book files that require smaller amount of seeding resources. Furthermore, they typically include a very extensive description of the content and often ask other users to help with seeding the content. These evidences suggest that these publishers may have limited resources and thus they need the help of others to sustain the distribution of their content. In summary, roughly half of the top publishers advertise a web portal in their published torrents. It seems that their intention is to attract a large number of users to their web sites. The incomes of these portals come from ads and in the specific case of private BitTorrent portals also from donations and VIP fees. Overall, these Lifetime Avg. Publishing Rate (days) (torrents per day) Private Portals 63/466/ /11.43/79.91 Promoting Web sites 50/459/ /4.31/18.98 Altruistic 10/376/ /3.80/23.67 Table 4: Lifetime and Avg. Publishing Rate for the different classes of content publishers: BitTorrent Portals, Promoting Web Sites and Altruistic Publishers. The represented values are min/avg/max per class. profit-driven publishers generate 26% of the content and 40% of the downloads. Therefore, the removal of this small fraction of publishers is likely to have a dramatic impact on the BitTorrent open ecosystem. Finally, a fraction of publishers appear to be altruistic and responsible for a notable fraction of published content and downloads (11.5%). This suggests that there are some seemingly ordinary users who dedicate their resources to share content with a large number of peers in spite of the potential legal implications of such activity. 5.2 Longitudinal View of Major Publishers So far we focused on the contribution of major publishers only during our measurement intervals. Having identified the top publishers in our pb10 dataset, we examine the longitudinal view of the contribution by major publishers since they appeared on the Pirate Bay portal. Toward this end, for each top publisher, we obtain the username page on the Pirate Bay portal that maintains the information about all the published content and its published time by the corresponding user till our measurement date (June 4, 2010) 6. Using this information for all top publishers, we capture their publishing pattern over time with the following parameters: (i) Publisher Lifetime which represents the number of days between the first and the last appearance of the publisher in the Pirate Bay portal, (ii) Average Publishing Rate that indicates the average number of published content per day during their lifetime. Table 4 shows the min/avg/max value of these metrics for the different classes of publishers: Private Portals, Promoting Web Sites and Altruistic publishers. The profit-driven publishers (i.e. private portals and promoting web sites) have been publishing content for 15 months on average (at the time of the measurement) while the most longed-lived ones have been feeding content for more than 5 years ago. Furthermore, some of these publishers exhibit a surprisingly high average rate of publishing content (80 files per day). The altruistic publishers present a shorter lifetime and a lower publishing rate that seems to be due to their weaker incen- 6 Note that we cannot collect information about fake publishers since the web pages of their associated usernames are removed by the Pirate Bay just after identifying they are publishing fake content.
10 tives and their lower availability of resources. In summary, the lifetime of major publishers suggests that content publishing in BitTorrent seems have been a profitable business for (at least) a couple of years. Furthermore, the high seeding activity by profit-driven publishers (e.g. private portals) over a long period of time implies a high and continuous investment for required resources that should be compensated by different types of incomes (e.g. ads) for these portals. We examine the incomes of the profit-driven publishers in the next subsection. 5.3 Estimating Publishers Income The evidences we presented in previous subsections suggest that the goal of half of the top publishers is to attract users to their own web sites. We also showed that most of these publishers seem to generate income at least by posting ads in their web sites. In essence, these publishers have a clear financial incentive to publish content. In order to validate this key point, we assess their ability to generate income by estimating three important but related properties of their promoting web sites: (i) average value of the web site, (ii) average daily income of the web site, and (iii) average daily visits to the web site. We obtain this information from several web sites that monitor and report these statistics for other sites on the Web. To reduce any potential error in the provided statistics by individual monitoring web sites, for each publisher s web site we collect this information from six independent monitoring sites and use the average value of these statistics across these webs 7. Table 5 presents the min/median/avg/max value of the described metrics for each class of profit-driven publisher classes (i.e. private portals and promoting web sites). The median values suggest that the promoted web sites are fairly profitable since they value tens of thousand dollars with daily incomes of a few hundred dollars and tens of thousand visits per day. Furthermore, few publishers (<10) are associated to very profitable web sites valued in hundreds of thousand to millions of dollars, that receive daily incomes of thousands of dollars and hundreds of thousand visits per day. In summary, these statistics confirm that these web sites are indeed valuable and visible, and generate a substantial level of incomes. 6. OTHER BENEFICIARIES IN THE BIT- TORRENT MARKETPLACE In previous sections we analyzed the main characteristics of major content publishers in BitTorrent, demonstrating that content publishing is a profitable business for an important fraction of the top publishers; www. yourwebsitevalue.com Web site Web site Web site Value ($) Daily Income ($) Daily visits Private Portals 1K/33K/313K/2.8M 1/55/440/3.7K 74/21K/174K/1.4M Promoting Web Sites 24/22K/142K/1.8M 1/51/205/1.9K 7/22K/73.5K/772K Table 5: Publisher s web site value ($), daily income ($) and num of daily visits for the different classes of profit-driven content publishers: Bit- Torrent Portals and Promoting Web Sites. The represented values are min/median/avg/max per class. a business that is responsible of 40% of the downloads. However, although content publishers are the key players, there are other players who help sustain the business and obtain financial benefits including: Major Bit- Torrent Portals, Hosting Providers and ad companies. Figure 5 depicts the interactions between different players in BitTorrent content publishing where the arrows indicate the flow of money between them. Next, we briefly describe the role of each player. Major Public BitTorrent Portals such as the Pirate Bay are dedicated to index torrent files. They are rendezvous points where content publishers and clients publish and retrieve torrent files respectively. The main advantage of these major portals is that they offer a reliable service (e.g. they rapidly react to remove fake or infected content). All this makes that millions of BitTorrent users utilize these portals every day. These portals are the perfect target for profit-driven publishers in order to publish their torrents and advertise their web sites (potentially) to millions of users. Therefore, these major portals are one of the key players of the Bit- Torrent Ecosystem [22] that brings substantial financial profit. For instance, the Pirate Bay is one of the most popular sites in the whole Internet (ranked the 94 th in the Alexa Ranking) as well as one of the most valued ones (around $10M). Hosting Providers are companies dedicated to renting servers. Heavy seeding activity performed by some publishers requires significant resources (e.g. bandwidth and storage). Thus a large fraction of major publishers obtain these resources from rented servers in hosting providers who receive an income in return for the offered service. Let s focus on OVH, the ISP responsible of a major portion of the content published in BitTorrent. Our measurement study shows that OVH contributes between 78 and 164 different servers (i.e. IP addresses) across the different datasets. Considering the cost of the average server offered by OVH in its web page (around 300 e/month) we estimate that the average income obtained by OVH due to BitTorrent content publishing ranges between roughly 23.4K and 42.9K e/month. It is worth noting that some hosting providers have defined strict policies against sharing copyrighted material through P2P applications using their servers due
11 Figure 5: Business Model of Content Publishing in Bittorrent. to legal issues 8. However the income obtained by some hosting providers such as OVH seems to justify the risk of potential legal actions taken against them. Ad Companies are responsible for advertisements in the Internet. They have a set of customers who wish to be advertised in the Internet and a set of web sites where they put their customers ads. They apply complex algorithms to dynamically select in which web site and when to post each ad. They charge their customers for this service and part of this income is forwarded to the web sites where the ads have been posted. Therefore, ad companies look for popular web sites where to put ads for their costumers. We have demonstrated in this paper that profit-driven BitTorrent content publishers web sites are popular, thus most of them post ads from ad companies 9. Hence, part of the income of ad companies is directly linked to the BitTorrent content publishing. Unfortunately, there is no practical way to estimate the value of this income. 7. SOFTWARE FOR CONTENT PUBLISH- ING MONITORING Using the methodology described in Section 2, we have implemented a system that continuously monitors the Pirate Bay portal, and leverages RSS feed to quickly detect a newly published content. Once a new torrent is detected, our system retrieves the following information for that torrent: filename, content category and subcategory (based on the Pirate Bay categories), publisher s username, and (in those cases we can) the publisher s IP address as well as the ISP, City and Country associated to this IP address. Furthermore, for profit-driven publishers described in this paper, we have created an individual publisher s web page that provides specific information such as the publisher s promoted URL or We have validated this by looking at the header exchange between the browser and the publishers web site servers. business type. The system stores all this information in a database. Finally, we have built a simple web-based interface to query the resulting database. This interface is publicly available 10 and access is granted to interested parties by contacting the authors. Our application has two goals. On the one hand, we want to share this data with the research community to permit further analysis of different aspects of the Bit- Torrent content publishing activity. On the other hand, we believe that this application can be useful for regular BitTorrent clients. First, a BitTorrent client can easily identify those publishers that publish content aligned with her interest (e.g. an e-books consumer could find publishers responsible for publishing large numbers of e-books). Furthermore, we are working on implementing a feature to filter out fake publishers, allowing Bit- Torrent users of our application (in the future) to avoid downloading fake content. 8. RELATED WORK Significant research effort has focused on understanding different aspects of BitTorrent by gathering data from live swarms. Most of these studies have primarily examined demographics of users [12, 20, 22] and technical aspects of swarming mechanism [18, 13, 9]. However, to our knowledge the socio-economics aspects of BitTorrent that we addressed in this paper have received little attention. The most relevant work to this paper is a recent study that examined the weakness of BitTorrent privacy [6]. The authors analyzed the demography of BitTorrent content publishers and presented a highly skewed distribution of published content among them as well as the presence of a significant fraction of publishers located at hosting providers. This indeed validates some of our initial observations. In another study, Zhang et al. [22] presented the most extensive characterization of the BitTorrent ecosystem. This study briefly examined the demography of content publishers and showed a skewed distribution of the contributed content among them. The authors identify the publishers by their usernames. We have shown that this assumption may miss an important group of publishers who post fake content, i.e. fake publishers. Our work goes beyond the simple examination of demographics of content publishers. We identify, characterize and classify the major publishers and more interestingly reveal their incentives and their motivating business model. 9. CONCLUSION In this paper we studied the content publishing activity in BitTorrent from a socio-economic perspective. The results reveal that a small fraction of publishers are responsible for 67% of the published content and 75% of 10
12 the downloads. We have carefully examined the incentives of major publishers and identified the following key characteristics: first, antipiracy agencies and malicious users perform a systematic poisoning index attack over major BitTorrent portals in order to obstruct download of copyrighted content and to spread malware, respectively. Overall, this attack contributes 30% of the content and attracts 25% (several millions) of downloads. Second, 37% of the (non-fake) published content is published by a small fraction of users that serve 54% of the (non-fake files) downloads. Our evidence suggests that these publishers have financial incentives for posting these contents on BitTorrent portals. The removal of these financial-driven publishers (e.g. by antipiracy actions) may significantly affect the popularity of these portals as well as the whole BitTorrent ecosystem. If this happens, will BitTorrent survive as the most popular file-sharing application without these publishers?. 10. ACKNOWLEDGEMENTS The authors would like to thank anonymous CoNEXT reviewers for their valuable feedback as well as Jon Crowcroft for his insightful comments. We are also grateful for David Rubio s help on developing the webbased application. This work has been partially supported by the European Union through the FP7 TREND Project (257740), the Spanish Government through the T2C2 (TIN C04-01) and CONPARTE (TEC C03-03) projects, the Regional Government of Madrid through the MEDIANET project (S-2009/TIC- 1468) and the National Science Foundation under Grant No REFERENCES [1] onk_further_arrests/. [2] shtml?id=123&tid=97&tid=95&tid=1. [3] MaxMind. [4] The Impact of P2P File Sharing, Voice over IP, Skype, Joost, Instant Messaging, One-Click Hosting and Media Streaming such as YouTube on the Internet, [5] Bay TSP Annual Report, BayTSP2008report.pdf. [6] S. Le Blond, A. Legout, F. Lefessant, W. Dabbous, and M. Ali Kaafar. Spying the world from your laptop. LEET 10, [7] D. R. Choffnes, J. Duch, D. Malmgren, R. Guimera, F. E. Bustamante, and L. Amaral. Strange bedfellows: Communities in bittorrent. IPTPS 10, [8] R. Cuevas, M. Kryczka, A. Cuevas, S. Kaune, C. Guerrero, and R. Rejaie. Is content publishing in bittorrent altruistic or profit-driven?. Tech report: [9] R. Cuevas, N. Laoutaris, X. Yang, G. Siganos, and P. Rodriguez. Deep Diving into BitTorrent Locality. In ACM SIGMETRICS 10 (Poster Session). [10] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, Analysis, and Modeling of BitTorrent-like Systems. In ACM IMC 05. [11] David Hales, Rameez Rahman, Boxun Zhang, Michel Meulpolder, and Johan Pouwelse. Bittorrent or bitcrunch: Evidence of a credit squeeze in bittorrent? In WETICE 09, [12] M. Izal, G. Urvoy-Keller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. Garces-Erice. Dissecting bittorrent: Five months in a torrent s lifetime. In PAM 04. [13] S. Kaune, R. Cuevas, G. Tyson, A. Mauthe, C. Guerrero, and R. Steinmetz. Unraveling BitTorrent s File Unavailability: Measurements, Analysis and Solution Exploration. In IEEE P2P 10. [14] B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. In ACM WOSN 09, [15] N. Laoutaris, D. Carra, and P. Michiardi. Uplink allocation beyond choke/unchoke or how to divide and conquer best. In ACM CoNEXT 08. [16] A. Legout, N. Liogkas, E. Kohler, and L. Zhang. Clustering and sharing incentives in bittorrent systems. In ACM SIGMETRICS 07. [17] J. Liang, N. Naoumov, and K.W. Ross. The index poisoning attack in p2p file sharing systems. In IEEE INFOCOM 06, [18] D. Menasche, A. Rocha, B. Li, D. Towsley, and A. Venkataramani. Content availability in swarming systems: Models, measurements and bundling implications. In ACM CoNEXT 09. [19] M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in BitTorrent? In NSDI 07, [20] J.A. Pouwelse, P. Garbacki, D.H.J. Epema, and H.J. Sips. The BitTorrent P2P file-sharing system: Measurements and analysis. In IPTPS 05. [21] M. Sirivianos, J. Han, P. Rex, and C.X. Yang. Free-riding in bittorrent networks with the large view exploit. In IPTPS 07, [22] C. Zhang, P. Dhungel, D. Wu, and K.W. Ross. Unraveling the bittorrent ecosystem. IEEE Transactions on Parallel and Distributed Systems, 2010.
Is Content Publishing in BitTorrent Altruistic or Profit-Driven?
Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Ruben Cuevas Univ. Carlos III de Madrid [email protected] Sebastian Kaune TU Darmstadt [email protected] Michal Kryczka Institute
Investigating the Reaction of BitTorrent Content Publishers to Antipiracy Actions
Investigating the Reaction of BitTorrent Content Publishers to Antipiracy Actions Reza Farahbakhsh, Ángel Cuevas, Rubén Cuevas, Reza Rejaie, Michal Kryczka, Roberto Gonzalez and Noel Crespi Institut-Mines
The BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science,
The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, Delft University of Technology, the Netherlands BitTorrent
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Case 1:16-cv-00670-WJM Document 1 Filed 03/22/16 USDC Colorado Page 1 of 12 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. FATHERS & DAUGHTERS NEVADA, LLC, a Nevada Limited
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
Overview of recent changes in the IP interconnection ecosystem
Presentation for Broadband for America Overview of recent changes in the IP interconnection ecosystem Michael Kende June 7 th, 2011 Ref: Introduction 2 Last year marked the 15 th anniversary of the commercialization
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Case 2:16-cv-00928-APG-GWF Document 1 Filed 04/24/16 Page 1 of 12
Case :-cv-00-apg-gwf Document Filed 0// Page of CHARLES C. RAINEY, ESQ. Nevada Bar No. [email protected] RAINEY LEGAL GROUP, PLLC 0 W. Martin Avenue, Second Floor Las Vegas, Nevada +.0..0 (ph +... (fax
SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.
BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent
Lecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
Masters special education thesis >>>CLICK HERE<<<
Masters special education thesis. But how do you get others to spread your ideas. Masters special education thesis >>>CLICK HERE
User research for information architecture projects
Donna Maurer Maadmob Interaction Design http://maadmob.com.au/ Unpublished article User research provides a vital input to information architecture projects. It helps us to understand what information
SEARCH ENGINE OPTIMIZATION Jakub Zilincan 1. Introduction. Search Engine Optimization
SEARCH ENGINE OPTIMIZATION Jakub Zilincan 1 Abstract: Search engine optimization techniques, often shortened to SEO, should lead to first positions in organic search results. Some optimization techniques
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Distinguishing Humans from Robots in Web Search Logs: Preliminary Results Using Query Rates and Intervals
Distinguishing Humans from Robots in Web Search Logs: Preliminary Results Using Query Rates and Intervals Omer Duskin Dror G. Feitelson School of Computer Science and Engineering The Hebrew University
BitSight Insights Global View. Revealing Security Performance Metrics Across Major World Economies
BitSight Insights Global View Revealing Security Performance Metrics Across Major World Economies Introduction There is no denying the global nature of 21st century business. The export and import of goods
Introduction... 1 Website Development... 4 Content... 7 Tools and Tracking... 19 Distribution... 20 What to Expect... 26 Next Step...
Contents Introduction... 1 Website Development... 4 Content... 7 Tools and Tracking... 19 Distribution... 20 What to Expect... 26 Next Step... 27 Introduction Your goal is to generate leads that you can
Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO
Case 1:15-cv-02739-WYD-MEH Document 1 Filed 12/17/15 USDC Colorado Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. CLEAR SKIES NEVADA, LLC, a Nevada Limited
Peering Analysis: GenieATM 6000 July 2013
Application Note Peering Analysis: July 2013 1. Application background As the internet activity is expected to expand continuously, ISPs across the globe are looking for ways to optimize their operations
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
SYSTEM DEVELOPMENT AND IMPLEMENTATION
CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design
An Automated Test for Telepathy in Connection with Emails
Journal of Scientifi c Exploration, Vol. 23, No. 1, pp. 29 36, 2009 0892-3310/09 RESEARCH An Automated Test for Telepathy in Connection with Emails RUPERT SHELDRAKE AND LEONIDAS AVRAAMIDES Perrott-Warrick
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
THE SECURITY EXPOSURE
Secunia Whitepaper - February 2010 THE SECURITY EXPOSURE OF SOFTWARE PORTFOLIOS An empirical analysis of the patching challenge faced by the average private user In this paper, we examine the software
Impact of Peer Incentives on the Dissemination of Polluted Content
Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto [email protected] Virgilio Almeida [email protected] Cristiano Costa [email protected] Jussara Almeida [email protected]
Management Accounting 303 Segmental Profitability Analysis and Evaluation
Management Accounting 303 Segmental Profitability Analysis and Evaluation Unless a business is a not-for-profit business, all businesses have as a primary goal the earning of profit. In the long run, sustained
LIVE CHAT PERFORMANCE BENCHMARKS 2015
LIVE CHAT PERFORMANCE BENCHMARKS 2015 RESEARCH REPORT Background Top Findings The 2015 Live Chat Performance Benchmarks research report reveals the following: Chatters are worth 4.5 times as much as website
Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent
Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada
Predict the Popularity of YouTube Videos Using Early View Data
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview
Website Marketing Audit. Example, inc. Website Marketing Audit. For. Example, INC. Provided by
Website Marketing Audit For Example, INC Provided by State of your Website Strengths We found the website to be easy to navigate and does not contain any broken links. The structure of the website is clean
100 SEO Tips. 1. Recognize the importance of web traffic.
1. Recognize the importance of web traffic. 100 SEO Tips SEO or Search Engine Optimization is one of the techniques to use in order to achieve more volume of traffic to your site. Without a good number
Last Updated: June 2013
Society of Petroleum Engineers Privacy Policy Statement Last Updated: June 2013 This Privacy Policy tells you about the information the Society of Petroleum Engineers (SPE) gathers about you and how we
INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST
THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast.
Peer-to-Peer Networks
Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from
Lab 5: BitTorrent Client Implementation
Lab 5: BitTorrent Client Implementation Due: Nov. 30th at 11:59 PM Milestone: Nov. 19th during Lab Overview In this lab, you and your lab parterner will develop a basic BitTorrent client that can, at minimal,
EST.03. An Introduction to Parametric Estimating
EST.03 An Introduction to Parametric Estimating Mr. Larry R. Dysert, CCC A ACE International describes cost estimating as the predictive process used to quantify, cost, and price the resources required
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
ASUS WebStorage Client-based for Windows [Advanced] User Manual
ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The
Deep analysis of a modern web site
Deep analysis of a modern web site Patrick Lambert November 28, 2015 Abstract This paper studies in details the process of loading a single popular web site, along with the vast amount of HTTP requests
IP interconnection issues
Regulatory and policy challenges of next-generation access IP interconnection issues 6 November 0 Michael Kende Introduction Last year marked the 5th anniversary of the commercialisation of the Internet
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Lecture - 41 Value of Information In this lecture, we look at the Value
A Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
1 Annex 11: Market failure in broadcasting
1 Annex 11: Market failure in broadcasting 1.1 This annex builds on work done by Ofcom regarding market failure in a number of previous projects. In particular, we discussed the types of market failure
Crowd sourced Financial Support: Kiva lender networks
Crowd sourced Financial Support: Kiva lender networks Gaurav Paruthi, Youyang Hou, Carrie Xu Table of Content: Introduction Method Findings Discussion Diversity and Competition Information diffusion Future
A TASTE OF HTTP BOTNETS
Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Smarter Balanced Assessment Consortium. Recommendation
Smarter Balanced Assessment Consortium Recommendation Smarter Balanced Quality Assurance Approach Recommendation for the Smarter Balanced Assessment Consortium 20 July 2012 Summary When this document was
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Last Updated: 08/27/2013. Measuring Social Media for Social Change A Guide for Search for Common Ground
Last Updated: 08/27/2013 Measuring Social Media for Social Change A Guide for Search for Common Ground Table of Contents What is Social Media?... 3 Structure of Paper... 4 Social Media Data... 4 Social
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
Opinion 04/2012 on Cookie Consent Exemption
ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is
Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX
1 Recommendations how to attract clients to RoboForex s partners www.roboforex.com RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX Your success as a partner directly depends on the number of attracted
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
Know Your Foe. Threat Infrastructure Analysis Pitfalls
Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking
DIGITAL MEDIA MEASUREMENT FRAMEWORK SUMMARY Last updated April 2015
DIGITAL MEDIA MEASUREMENT FRAMEWORK SUMMARY Last updated April 2015 DIGITAL MEDIA MEASUREMENT FRAMEWORK SUMMARY Digital media continues to grow exponentially in Canada. Multichannel video content delivery
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Technical report: An Estimate of Infringing Use of the Internet
Technical report: An Estimate of Infringing Use of the Internet January 2011 Version 1.8 Envisional Ltd, Betjeman House, 104 Hills Road, Cambridge, CB2 1LQ Telephone: +44 1223 372 400 www.envisional.com
Java Bit Torrent Client
Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download
Performance Optimization Guide
Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.
Synology QuickConnect
Synology QuickConnect Based on DSM 5.2 Synology Inc. Table of Contents Chapter 1: Introduction What is QuickConnect?... 3 Chapter 2: How QuickConnect Works Overview... 4 QuickConnect Connectivity Test...
Project Orwell: Distributed Document Integrity Verification
1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam [email protected] Abstract Project Orwell is a client and server application designed to facilitate the preservation
FLASH DELIVERY SERVICE
Privacy Policy FLASH DELIVERY SERVICE is Committed to Protecting Your Privacy Protecting our customers' privacy is an important priority at FLASH DELIVERY SERVICE and we are committed to maintaining strong
Web Analytics Definitions Approved August 16, 2007
Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 [email protected] 1-800-349-1070 Licensed under a Creative
RMFT Outlook Add-In User Guide
RMFT Outlook Add-In User Guide Software Version 2.5 November 23, 2011 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: [email protected], Support:
Accurate speed test results are difficult to obtain. Below are a few pointers for users on the LGfL 2.0 network.
Download speeds the dilemma of speed testing Accurate speed test results are difficult to obtain. Below are a few pointers for users on the LGfL 2.0 network. Your school s connection a few examples Normally
Planning and Writing Essays
Planning and Writing Essays Many of your coursework assignments will take the form of an essay. This leaflet will give you an overview of the basic stages of planning and writing an academic essay but
The big data revolution
The big data revolution Friso van Vollenhoven (Xebia) Enterprise NoSQL Recently, there has been a lot of buzz about the NoSQL movement, a collection of related technologies mostly concerned with storing
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Service Description. Ericsson IPX
Service Description Ericsson IPX Disclaimer Please be advised that the information included in this document is based on generic Operator integrations. This document does not constitute a commitment from
A Marketer's Guide. to Facebook Metrics
A Marketer's Guide to Facebook Metrics 2 Whether you ve invested big in social or are starting to consider a new strategy for 2014, one of the key aspects to think about is social media metrics - namely
The Application Usage and Threat Report
The Application Usage and Threat Report An Analysis of Application Usage and Related Threats within the Enterprise 10th Edition February 2013 PAGE 1 Executive Summary Global Findings Since 2008, Palo Alto
Conversations (Creative Virtual)
The world s busiest Virtual Assistants Conversations (Creative Virtual) 2,750,000 2,550,000 2,350,000 2,150,000 1,950,000 1,750,000 1,550,000 1,350,000 1,150,000 950,000 750,000 Apr-06 May-06 Jun-06 Jul-06
cprax Internet Marketing
cprax Internet Marketing cprax Internet Marketing (800) 937-2059 www.cprax.com Table of Contents Introduction... 3 What is Digital Marketing Exactly?... 3 7 Digital Marketing Success Strategies... 4 Top
