Identify P2P Networks, File Sharing Protocols, and Applications Step

Total Page:16

File Type:pdf, Size:1020Kb

Identify P2P Networks, File Sharing Protocols, and Applications Step 10.1.2.4 Lab-Researching peer-to-peer file sharing Part 1: Identify P2P Networks, File sharing protocols, and applications Step 1: Define P2P networking a. What is P2P network? P2P network can be a network on a much grander scale in which special protocols and applications set up direct relationships among users over the Internet. And A P2P network also can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires b. What are some advantages that P2P provides over client-server architecture? 1) Centralization : Unlike P2P, where there is no central administration, here in this architecture there is a centralized control. Servers help in administering the whole set- up. Access rights and resource allocation is done by Servers. 2) Proper Management : All the files are stored at the same place. In this way, management of files becomes easy. Also it becomes easier to find files. 3) Back-up and Recovery possible : As all the data is stored on server its easy to make a back-up of it. Also, in case of some break-down if data is lost, it can be recovered easily and efficiently. While in peer computing we have to take back-up at every workstation. 4) Upgradation and Scalability in Client-server set-up : Changes can be made easily by just upgrading the server. Also new resources and systems can be added by making necessary changes in server. 5) Accessibility : From various platforms in the network, server can be accessed remotely. 6) As new information is uploaded in database , each workstation need not have its own storage capacities increased (as may be the case in peer-to-peer systems). All the changes are made only in central computer on which server database exists. 7) Security : Rules defining security and access rights can be defined at the time of set- up of server. 8) Servers can play different roles for different clients. c. What are the disadvantages of p2p networks? 1) Congestion in Network: Too many requests from the clients may lead to congestion, which rarely takes place in P2P network. Overload can lead to breaking-down of servers. In peer-to-peer, the total bandwidth of the network increases as the number of peers increase. 2) Client-Server architecture is not as robust as a P2P and if the server fails, the whole network goes down. Also, if you are downloading a file from server and it gets abandoned due to some error, download stops altogether. However, if there would have been peers, they would have provided the broken parts of file. 3) Cost: It is very expensive to install and manage this type of computing. 4) You need professional IT people to maintain the servers and other technical details of network. Step 2: Identify p2p file sharing protocols and applications. a. Identify some P2P file sharing protocols used today? Ares (Ares Galaxy, Warez P2P) Bitcoin (Bitcoin, Alt-Coins) BitTorrent (ABC [Yet Another BitTorrent Client], Azureus, BitComet, BitSpirit, BitTornado, BitTorrent.Net, G3 Torrent, mlMac, MLdonkey, QTorrent, Shareaza, µTorrent, etc.) Direct Connect (BCDC++, DC++, NeoModus Direct Connect, etc.) FastTrack (Grokster, iMesh, Kazaa, Morpheus, etc.) b. What are some popular P2P file sharing applications available today? uTorrent Transmission MediaGet BitTorrent FrostWire c. What P2P file sharing protocols is attributed to producing the most P2P traffic on the internet today? Its average proportion of the overall data traffic regionally varies between 49% in the Middle East and 83% in Eastern Europe. The world average share of Internet traffic that consists of p2p-based file-sharing exchange is estimated to around 70%. Part 2: Research P2P File sharing Issues Step 1: Research P2P copyright infringement. a. What does the acronym DMCA stand for and what is it? The DMCA is considered a very controversial law by many who see it as an infringement to freedom. (Digital Millennium Copyright Act) A U.S. law enacted in late 1998 that provides penalties for developing hardware or software that overrides copy protection schemes for digital media. b. Name two associations that actively pursue P2P copyright infringement? UMB advises all computer account holders to use extreme caution when installing P2P software and to read all user agreements carefully beforehand. Make sure that you read all available documentation from the P2P software provider and understand how the P2P software is configured and operates. c. What are the penalties for copyright infringement? ◾Infringer pays the actual dollar amount of damages and profits. ◾The law provides a range from $200 to $150,000 for each work infringed. ◾Infringer pays for all attorney’s fees and court costs. ◾The Court can issue an injunction to stop the infringing acts. d. What are the file sharing copyright laws in your area? Are they strict or less strict than those in other area of the world? How aggressively do enforcement agencies in your area pursue those who share copyrighted material? They are everywhere Step 2: Research other P2P issues. a. What types of malware can be transported through P2P file sharing? Figure 1 shows the percentage of qualifying traffic we see each dayonthetwonetworksthatismalicious. Sincewecanonlyiden- tify malicious files from those us downloaded successfully, this figureshows alowerbound on theextentofmalware. Alargeper- centage of Limewire responses are infested with malware. On the other hand, malware on OpenFT spikes only on one day, the day Poom.Awormhits. b. What is Torrent Poisoning? Torrent poisoning is the act of intentionally sharing corrupt data or data with misleading file names using the BitTorrent protocol. c. How could identity theft occur through the use of P2P file sharing? P2P file sharing was designed to allow a system of independent computers to communicate with each other via the Internet and specialized software or sites. Part 3 Research P2P Copyright Litigations a. What was the first well-known P2P application that specialized in MP3 file sharing and was shut down by court order? It was originally founded as a pioneering peer-to-peer file sharing Internet service that emphasized sharing audio files, typically music, encoded in MP3 format. b. What was of the largest P2P file sharing lawsuits ever? There are currently more than 140,000 BitTorrent downloaders being targeted by lawsuits in the US. Rather than take the lawsuit all the way through a court proceeding, downloaders often cough up around $3,000 per infringement — which can add up to a bundle of cash quite quickly, especially when 23,000 people are on the shakedown list. 1. How can you be sure that the files you are downloading from P2P networks are not copyrighted and are safe form malware? Know what files you’re sharing. When you share a file it becomes accessible by millions of people, and computers all over the world. So, you always want to be sure about what you are sharing. Some application will automatically share any files you have downloaded. Other applications automatically upload your entire hard drive and make it shareable. So, you want to make sure that your personal information is not being made public or accessible. So, know what you are sharing and to what extent. If multiple people use your computer, you will need to be extra careful about monitoring what is being shared. .
Recommended publications
  • Online Media Piracy: Convergence, Culture, and the Problem of Media
    Online Media Piracy: Convergence, Culture, and the Problem of Media Change Sean Fuller Department of Gender and Cultural Studies The University of Sydney A thesis submitted to fulfil requirements for the degree of Doctor of Philosophy at the University of Sydney i DECLARATION I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or any other institute of higher learning, except where due acknowledgement has been made in the text. Sean Fuller April 7, 2018 ii Abstract This thesis proposes that there is a symbiotic relationship between the emergence of online media piracy and the industrial, economic and legal changes that have shaped contemporary popular media in the early 21st century. The Internet is at the heart of most recent transformations of the popular media environment, such as the emergence of video- on-demand formats for film and television consumption and the impact this has had on the nature of those media forms. This thesis discusses the powerful role played by online media piracy in shaping these developments, both through changing the expectations of consumers, and the options that are available for distributors of media content. As well as exploring the diverse forms and practices of online media piracy today, this thesis also explores theories of media change, considering how we might understand such piracy as a force underpinning media change, and how the changes it has helped shape might be placed in a broader historical context.
    [Show full text]
  • A Review on Torrent & Torrent Poisoning Over Internet
    IJCSMS (International Journal of Computer Science & Management Studies) Vol. 22, Issue 01 Publishing Month: January 2016 An Indexed and Referred Journal with ISSN (Online): 2231-5268 www.ijcsms.com A Review on Torrent & Torrent Poisoning over Internet Pooja Balhara Lecturer, All India Jat Heroes Memorial College, Rohtak, Haryana (India) [email protected] Publishing Date: January 22, 2016 Abstract A torrent file is a encoded dictionary with the Now a days, Torrents are widely used for downloading following keys: heavy files over internet the reason is being unlike other download methods, Torrent maximizes transfer speed by downloading the pieces of the files you want ∑ Announce the URL of the tracker simultaneously from people who already have them. This ∑ Info this maps to a dictionary whose keys are process makes very large files, such as videos and dependent on whether one or more files are television programs; games download much faster than is being shared: possible with other methods. In this paper, I am ∑ Name suggested filename where the file is to representing the basic and some popular details and be saved (if one file)/suggested directory name activities after a deep review of torrent and torrent poisoning. where the files are to be saved (if multiple files) Keywords: Torrent, bit torrent, torrent poisoning. ∑ Piece length number of bytes per piece. ∑ Pieces a hash list, i.e., a concatenation of each 1. Introduction to Torrent piece's SHA-1 hash. As SHA-1 returns a 160-bit hash, pieces will be a string whose length is a A Torrent file is a computer file that multiple of 160-bits.
    [Show full text]
  • Monetizing Infringement
    Monetizing Infringement Kristelia García* The deterrence of copyright infringement and the evils of piracy have long been an axiomatic focus of both legislators and scholars. The conventional view is that infringement must be curbed and/or punished in order for copyright to fulfill its purported goals of incentivizing creation and ensuring access to works. This Essay proves this view false by demonstrating that some rightsholders don’t merely tolerate, but actually encourage infringement, both explicitly and implicitly, in a variety of different situations and for one common reason: they benefit from it. Rightsholders’ ability to monetize infringement destabilizes long-held but problematic assumptions about both rightsholder preferences, and about copyright’s optimal infringement policy. Through a series of case studies, this Essay describes the impetuses and normative implications of this counterintuitive — but not so unusual — phenomenon. Recognition of monetized infringement in copyright is interesting not only for its unexpectedness, but also for the broader point that its existence suggests: we have an impoverished descriptive account of why some laws operate the way that they do. This is particularly unsettling in an area like copyright, where advocates are sharply divided along policy lines. This Essay is an important first step toward a positive theory of copyright — one that recognizes the underappreciated role, both positive and negative, that private parties play in policymaking. * Copyright © 2020 Kristelia García. Associate Professor at the University of Colorado Law School, and Director of the Content Initiative at the Silicon Flatirons Center for Law, Technology and Entrepreneurship. I would like to thank Annemarie Bridy, Eric Goldman, Justin Hughes, Ed Lee, Jake Linford, Glynn Lunney, Michael Madison, Gideon Parchomovsky, Aaron Perzanowski, Pamela Samuelson, Rebecca Tushnet, Phil Weiser, and the participants at the 2020 Intellectual Property Works-in- Progress (“WIPIP”) Conference at Santa Clara Law School for helpful comments and critique.
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia 11/12/13 Create Account Log In
    BitTorrent - Wikipedia, the free encyclopedia 11/12/13 Create account Log in Article Talk Read Edit View history BitTorrent From Wikipedia, the free encyclopedia Main page Contents This article is about the file sharing protocol. For other uses, see BitTorrent (disambiguation). Featured content This article may be too technical for most readers to Current events understand. Please help improve this article to make it Random article understandable to non-experts, without removing the technical Donate to Wikipedia details. The talk page may contain suggestions. (May 2011) Wikimedia Shop BitTorrent is a protocol supporting the practice of Part of a series on Interaction peer-to-peer file sharing that is used to distribute large File sharing Help amounts of data over the Internet. BitTorrent is one of About Wikipedia the most common protocols for transferring large files, Community portal and peer-to-peer networks have been estimated to Recent changes collectively account for approximately 43% to 70% of Technologies Contact page all Internet traffic (depending on geographical location) Peer to peer · BitTorrent­ · Tools as of February 2009.[1] In November 2004, BitTorrent ­File hosting services was responsible for 35% of all Internet traffic.[2] As of Development and societal aspects Print/export February 2013, BitTorrent was responsible for 3.35% Timeline · Legal­ aspects Non-public file sharing Languages of all worldwide bandwidth, more than half of the 6% Anonymous P2P Friend-to-friend­ Darknet­ of total bandwidth dedicated to file sharing.[3] · · · Private P2P­ العربية Azərbaycanca Programmer Bram Cohen, a former University at File sharing networks and services [4] Беларуская Buffalo graduate student in Computer Science, Gnutella / Gnutella2 (G2) · FastTrack­ · Български designed the protocol in April 2001 and released the ­eDonkey · Direct­ Connect · Mininova­ · ­isoHunt The­ Pirate Bay ­Bitcoin Bosanski first available version on July 2, 2001,[5] and the final · · [6] By country or region Català version in 2008.
    [Show full text]
  • The Case of the American Comic Book Market
    Digital disruption in the creative industries: the case of the American comic book market Wojciech Hardy Faculty of Economic Sciences, University of Warsaw Supervisor: dr hab. Katarzyna Śledziewska Warsaw May 19, 2019 Acknowledgements I would like to thank Katarzyna Śledziewska and Renata Włoch for helping me steer this thesis towards new and exciting areas, while also suggesting how to improve it and for supporting my work. Additional thanks go to Joanna Mazur, Joanna Siwińska-Gorzelak and the participants of the DELab UW internal seminars and conferences where this research was presented, for all the valuable comments and curiosity that pushed me to dig deeper into the researched topics. Last, but definitely not least, I would like to thank my supportive friends and family; my beloved wife who has greatly supported me throughout the process of writing this thesis and who has patiently reviewed all the graphs that I have shown her over the past few years; and my 3-year-old son who has been there to lift my spirits and to help me take my mind off the study when I needed it most. 2 Abstract Digital disruption toppled or transformed most of the incumbent business models in the creative industries. The American comic book market faced the same processes driven by digitalisation that disrupted music and audio-visual industries. Yet, the traditional distribution channels and print formats of the comic book market continued to grow even when new digital formats and intermediaries emerged. This thesis analyses and describes the processes that allowed for this unique development. It first describes digitalisation and the ways it led to disruption of incumbent business models.
    [Show full text]
  • Bit Torrent (Peer to Peer Network): Antipiracy and Anonymity
    International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Bit Torrent (Peer to Peer Network): Antipiracy and Anonymity Ashish Kumar Sharma1, A. Prof. Neetu Sharma2 1, 2 Cyber Forensics & Information Security, MDU, India Abstract: In this paper we have thoroughly analyzed Peer to Peer network and one of the most prominent file sharing Bit-Torrent protocol based on P2P network architecture which has been used as a major platform of pirating the copyrighted materials and imposing a threat of security as well, besides being a worthy tool of file sharing that supports almost all type and formats of data. It is also have been analyzed that P2P network is not a piracy but how it can help to reduce piracy so that antipiracy could be secured. Available tools and techniques used to support Antipiracy and Security are deeply analyzed that have been used so far by the law enforcement agencies and practitioners. So many attacks are discovered on the torrent systems and have been used to secure the antipiracy but there are also some legal complexities come into the system while addressing the issues depending upon to which country they belong. On the other hand the anonymity of the user (peer, client or node) on the Peer to peer networks is deeply discussed and further analyzed its need and methods to ensure the privacy of the users of Bit-Torrent (P2P) network. As it is important to know the source and destination pair information but new methods are also discovered for being Anonymous, used by legal and illegal way both and there are still new terminologies are being discovered to provide some solid solutions to these issues.
    [Show full text]
  • Piracy in the Digital Age
    Piracy in the Digital Age Dana Dahlstrom, Nathan Farrington, Daniel Gobera, Ryan Roemer, Nabil Schear University of California, San Diego CSE 291 (D00) – History of Computing December 6, 2006 I. Introduction Copyright owners are at no loss for words and figures asserting the detrimental effects of unauthorized copying and distribution of software and digital media. The recording industry estimates present worldwide losses at $4.2 billion per year.1 The motion picture industry puts 2005 worldwide losses at $18.2 billion,2 and the software industry claims a $34 billion figure.3 Put together, the estimated losses from piracy in these three industries in 2005 exceed the approximately $50 billion in worldwide damages from all the spam sent that year.4 Even taken with the proverbial "grain of salt," these estimates provide at least a crude indication of a large and growing phenomenon. The term "piracy," as used in this paper, refers to the illegal copying and distribution of proprietary content such as software, music, or movies. Some unauthorized copies are "bootlegged," copied for later resale at below- market prices. Other unauthorized copies are made and distributed by consumers who trade them without payment. In a break from traditional notions of piracy and counterfeiting, the "digital piracy" of primary concern today involves non-physical objects: digital files sold or exchanged over the Internet. Mode and motivation aside, the extent of piracy is most frequently measured in monetary terms: the revenues that might otherwise have resulted
    [Show full text]
  • Analyzing the Modern OTT Piracy Video Ecosystem
    Analyzing the Modern OTT Piracy Video Ecosystem A Technical Paper Prepared for SCTE•ISBE by Don Jones Senior Manager Comcast Cable Communications Management, LLC 4100 East Dry Creek Rd, Centennial CO 80122 303-712-3588 [email protected] Kei Foo Senior Manager Charter Communications 8560 Upland Drive, Suite B, Englewood, CO 80112 720-518-2343 [email protected] © 2018 SCTE•ISBE and NCTA. All rights reserved. Table of Contents Title Page Number Table of Contents .......................................................................................................................................... 2 Introduction.................................................................................................................................................... 3 A Brief History of the Pirated-Content Ecosystem ........................................................................................ 3 The Financial Impact of Piracy ...................................................................................................................... 5 Business Models of the Pirate Offerings to Consumers ............................................................................... 6 Two Types of Content Delivery ..................................................................................................................... 7 Live Streaming Content Acquisition .............................................................................................................. 7 Live Streaming Content Distribution ............................................................................................................
    [Show full text]
  • Video Game Piracy As Viral Vector and National Security Threat Andrew V
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Indiana University Bloomington Maurer School of Law Indiana Law Journal Volume 93 | Issue 4 Article 2 Winter 2018 Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat Andrew V. Moshirnia Monash University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/ilj Part of the Entertainment, Arts, and Sports Law Commons, Internet Law Commons, Law and Economics Commons, Law and Society Commons, and the National Security Law Commons Recommended Citation Moshirnia, Andrew V. (2018) "Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat," Indiana Law Journal: Vol. 93 : Iss. 4 , Article 2. Available at: https://www.repository.law.indiana.edu/ilj/vol93/iss4/2 This Article is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Indiana Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat ANDREW V. MOSHIRNIA Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal de- livery device for malware, as users routinely launch unverified programs and forego virus detection.
    [Show full text]
  • 5 CLOUD STORAGE in FILE SHARING 23 5.1 Cloud Storage in Business 24 5.2 Online Backup Services 25
    Bachelor’s thesis Degree Programme in Information Technology NINFOS12 May 2016 Timo Ilonen FILE SHARING SERVICES AND TECHNOLOGIES BACHELOR’S THESIS | ABSTRACT TURKU UNIVERSITY OF APPLIED SCIENCES Degree Programme in Information Technology 2016 | 46 pages Timo Ilonen FILE SHARING SERVICES AND TECHNOLOGIES The purpose of this thesis was to study file sharing in its many forms, focusing on the services and technologies behind it, as well as gauging its effects on companies and consumers alike. The thesis begins with a relatively brief overview of how file sharing worked in pre-Internet times, from the first floppy disks to early forms of networked sharing such as Usenet, the thesis then moves on to its main focus: file sharing in the Internet age. It covers a wide variety of topics, starting with torrent technology, explaining how peer-to-peer based file sharing works. The thesis then covers a topic closely related to torrents: digital piracy. It explains how illegal file sharing took place before the Internet, how Internet-based piracy works and how peer-to-peer technologies aided its emerge. The thesis also briefly covers legal and ethical matters and examines the impact piracy has had on various industries. The thesis also addresses cloud storage services, streaming services and digital distribution and the technologies behind these services, as well as the kind of consumer experience they provide. Finally, the thesis examines digital rights management, an ever-pressing issue in the field of file sharing. These topics are then included in an online survey carried out to gather real-life data on consumer behavior.
    [Show full text]
  • A Review on Torrent and Torrent Poisoning Over Internet
    International Journal of Research e-ISSN: 2348-6848 p-ISSN: 2348-795X Available at https://edupediapublications.org/journals Volume 05 Issue 12 April 2018 A Review on Torrent and Torrent Poisoning over Internet Pooja Balhara Lecturer, All India Jat Heroes Memorial College, Rohtak, Haryana (India) [email protected] Abstract Now a days, Torrents are widely used for torrent file is a encoded dictionary with the downloading heavy files over internet the reason following keys: is being unlike other download methods, Torrent maximizes transfer speed by downloading the Announce the URL of the tracker pieces of the files you want simultaneously from people who already have them. This process Info this maps to a dictionary whose makes very large files, such as videos and keys are television programs; games download much faster than is possible with other methods. In this dependent on whether one or more files are being paper, I am representing the basic and some shared: popular details and activities after a deep review of torrent and torrent poisoning. Name suggested filename where the file is to be saved (if one file)/suggested directory name Keywords: Torrent, bit torrent, torrent poisoning. where the files are to be saved (if multiple files) 1. Introduction to Torrent . Piece length number of bytes per piece. A Torrent file is a computer file that Pieces a hash list, i.e., a concatenation of each piece's SHA-1 hash. As SHA-1 returns a contains metadata about files and folders to be 160-bit hash, pieces will be a string whose length distributed, and usually also a list of the network is a multiple of 160-bits.
    [Show full text]
  • Video Game Piracy As Viral Vector and National Security Threat
    Indiana Law Journal Volume 93 Issue 4 Article 2 Winter 2018 Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat Andrew V. Moshirnia Monash University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/ilj Part of the Entertainment, Arts, and Sports Law Commons, Internet Law Commons, Law and Economics Commons, Law and Society Commons, and the National Security Law Commons Recommended Citation Moshirnia, Andrew V. (2018) "Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat," Indiana Law Journal: Vol. 93 : Iss. 4 , Article 2. Available at: https://www.repository.law.indiana.edu/ilj/vol93/iss4/2 This Article is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Indiana Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat ANDREW V. MOSHIRNIA Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal de- livery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost en- tirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download.
    [Show full text]