Classifying P2P Activities in Netflow Records: a Case Study (Bittorrnet & Skype) by Ahmed Bashir a Thesis Submitted to the F

Total Page:16

File Type:pdf, Size:1020Kb

Classifying P2P Activities in Netflow Records: a Case Study (Bittorrnet & Skype) by Ahmed Bashir a Thesis Submitted to the F Classifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) by Ahmed Bashir A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Masters of Applied Science in Systems and Computer Engineering Carleton University Ottawa, Ontario © 2012, Ahmed Bashir To my Father. R.I.P II Abstract This thesis addresses the problem of identifying BitTorrent and Skype activities within Netflow traces. The ability to accurately classify different types of internet traffic using Netflow traces represents a major challenge in the field of internet traffic classification since there is no payload information available with Netflow. Nowadays, P2P applications represent a large portion of the internet traffic and are becoming more difficult to classify. In this thesis a simple yet effective classification method is proposed using a set of heuristics based on the discriminating features and the nature of P2P applications. The presented scheme has been tested with a collection of real data sets. The results of the classification have shown to be accurate when applied to data sets with challenging internet traffic. Furthermore, the results of the proposed scheme have proven to be superior to other existing approaches in terms of the accuracy of the classification. III Acknowledgement First and foremost, I offer my utmost gratitude to my supervisors Dr.Changcheng Huang and co- supervisor Dr. Biswajit Nandy as this thesis would not have been possible without their encouragement, guidance and support from the initial to the final level of this research. I would also sincerely thank everyone who supported me in any kind of way during the completion of this thesis. IV Table of Contents Abstract ................................................................................................................................................................ III Acknowledgement ................................................................................................................................................ IV Table of Contents................................................................................................................................................... V List of Figures ...................................................................................................................................................... VIII List of Tables ......................................................................................................................................................... IX Chapter 1 Introduction .......................................................................................................................................... 1 1.1 Background 1 1.2 Research Problem 3 1.3 Research Objective 4 1.4 Suggested Approach 5 1.5 Summary of Contributions 6 1.6 Thesis Organization 6 Chapter 2 Background Knowledge ......................................................................................................................... 8 2.1 Literature Survey of Traffic Classification Approaches 8 2.1.1 Deep Packet Inspection (DPI) ....................................................................................................................... 9 2.1.2 Port Based Classification ............................................................................................................................ 11 2.1.3 Machine Learning....................................................................................................................................... 12 2.1.4 Host Behavior ............................................................................................................................................. 14 2.2 Approach Selection and Comparison 15 2.3 Approaches for Identifying BitTorrent and Skype 17 2.3.1 BitTorrent Approaches Comparison .......................................................................................................... 17 2.3.2 Skype Approaches Comparison.................................................................................................................. 18 2. 4 P2P Applications 18 2. 4.1 BitTorrent .................................................................................................................................................. 19 2. 4.1.1 BitTorrent Peer Location .................................................................................................................... 20 2.4.2 Skype VOIP ................................................................................................................................................. 22 2.4.2.1 Start up and Login Authentication ...................................................................................................... 22 2.4.2.2 Initiating a Call and Connection........................................................................................................... 25 2.5 Netflow and General P2P features 27 2.5.1 Netflow…………………………………………………………………………………………………………………………………………………28 2.5.2 Features for Classifying P2P Activities ....................................................................................................... 31 2.5.2.1 Port Numbers ...................................................................................................................................... 31 2.5.2.2 TCP Push Flag....................................................................................................................................... 33 V 2.5.2.3 Incoming and Outgoing Flows ............................................................................................................. 34 2.5.2.4 Maximum Transmission Unit (MTU) ................................................................................................... 36 Chapter 3 Classification Heuristics and Proposed Scheme ................................................................................... 39 3.1 Detection of Potential BitTorrent or Skype Hosts 40 3.1.1 P2P Flow Identification .............................................................................................................................. 41 3.1.1.1 Distinguishing between BitTorrent and Skype Flows .......................................................................... 42 3.1.2 Identifying BitTorrent Flows Contacting Trackers ...................................................................................... 46 3.1.3 Identifying Skype Flows Contacting the Skype Server ............................................................................... 48 3.1.4 Identifying BitTorrent Heavy Hitting Flows ................................................................................................ 50 3.2 Host IP and Port Identification and Summary 52 3. 3 Traffic Detection and Extraction Heuristics 56 3.3.1 BitTorrent Traffic Heuristics and Extraction ............................................................................................... 56 3.3.1.1 Incoming Traffic via DHT Contacted Peers .......................................................................................... 57 3.3.1.2 Incoming Traffic from Peers via Trackers (UDP) .................................................................................. 59 3.3.1.3 Incoming Traffic from Peers via Trackers (TCP) ................................................................................... 60 3.3.2 Skype Traffic Heuristics and Extraction ...................................................................................................... 62 3.3.2.1 Extracting All Skype Flows ................................................................................................................... 63 3.3.2.2 Distinguishing Between Skype Call Flows and Skype Control Flows ................................................... 65 3.4 Heuristics Organization, Order Impact & Contributions 68 Chapter 4 Testing and Experimentation ............................................................................................................... 70 4.1 Data Sets Description 70 4.2 BitTorrent Traffic Detection 74 4.2.1 BitTorrent Traffic False Positives and False Negatives ............................................................................... 76 4.2.2 BitTorrent Traffic Accuracy Definition ....................................................................................................... 80 4.2.3 BitTorrent Byte-Wise Classification and Results ........................................................................................ 81 4.2.3.1 Data Set 1 ............................................................................................................................................ 82 4.2.3.2 Data Set 2 ............................................................................................................................................ 84 4.2.3.3 Data Set 3 ............................................................................................................................................ 86 4.2.3.4 Data Set 4 ............................................................................................................................................ 87 4.2.3.5 Data Set 5 ............................................................................................................................................ 90 4.3 BitTorrent Traffic Detection Summary and Limitations 92 4.4 Skype Traffic Detection 93 4.4.1 Skype Flow Evaluation Metrics .................................................................................................................
Recommended publications
  • How Can I Download a Torrent
    how can i download a torrent How To Download Torrent Files From Torrent Sites? Lately, if you have been hanging out with tech-savvy people, then you are bound to hear terms like BitTorrent , Torrenting Websites , and Torrent Clients . The primary reason behind the drastic increment in the popularity of Torrent files is that these files can be used to download Movies , Music , Books , Games , and Software for free. As you might have guessed by the title, this article is dedicated to new torrent users, and it will guide them to download their first torrent file. On the other hand, If you are a veteran reader of Techworm, then this guide won’t reveal any new information for you. However, you can contribute to the community by leaving a comment. What Is A Torrents? In simple terminology, Torrent is a file that stores metadata, and programs like uTorrent can use this meta info to download all sorts of content. A torrent file generally comes with the extension .torrent , and it’s hardly a few KB in size. In many instances, Torrent and BitTorrent are used synonymously. However, they are not the same. In reality, BitTorrent is a peer to peer (P2P) file-sharing protocol that relies on a swarm-like approach for sharing files. A seeder in torrent terminology is a person who is sharing the file; the more seeds, the more potential locations to download the file. While a person who is downloading the seeded file is a leech , if the number of leeches exceeds the number of seeds, it will make the file download slower, as more people are accessing the data at the same time.
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • My Torrent Stopped Downloading Why Some Torrents Don’T Download? a Torrent That Doesn’T Start Downloading Or One That Suddenly Stops Can Be Very Frustrating
    my torrent stopped downloading Why Some Torrents Don’t Download? A torrent that doesn’t start downloading or one that suddenly stops can be very frustrating. You check your Internet connection, the cables, and everything looks good. So what can be the reasons for those torrents that don’t seem to work? Some Torrents Don’t Download. The main reason behind a torrent file that doesn’t even start downloading is the lack of seeders and peers. In other words, there is no one seeding that file, meaning there’s no place where you can download it from. That’s why it’s very important that you have a look at the number of seeders and peers every time you start a new download. Seeders are the users who already finished downloading and are only sharing. The peers are the ones like you, the ones who are downloading and uploading at the same time. Some Files Suddenly Stop Downloading. This is another common scenario. We’ve all been there when a torrent stops at some moment, such as 99%. That usually happens when there are only peers, but no seeders . If you think about it, it makes total sense. The peers have many parts of the torrent in common, and they will share those between them. But because there are zero seeders, no one has the entire file , and everyone will share the same parts and stop in the same percentage point. A Dead Torrent. Both of the situations we just saw are what users in the community call a “dead torrent”.
    [Show full text]
  • Lista Ofrecida Por Mashe De Forobeta. Visita Mi Blog Como Agradecimiento :P Y Pon E Me Gusta En Forobeta!
    Lista ofrecida por mashe de forobeta. Visita mi blog como agradecimiento :P Y pon e Me Gusta en Forobeta! http://mashet.com/ Seguime en Twitter si queres tambien y avisame que sos de Forobeta y voy a evalu ar si te sigo o no.. >>@mashet NO ABUSEN Y SIGAN LOS CONSEJOS DEL THREAD! http://blog.newsarama.com/2009/04/09/supernaturalcrimefightinghasanewname anditssolomonstone/ http://htmlgiant.com/?p=7408 http://mootools.net/blog/2009/04/01/anewnameformootools/ http://freemovement.wordpress.com/2009/02/11/rlctochangename/ http://www.mattheaton.com/?p=14 http://www.webhostingsearch.com/blog/noavailabledomainnames068 http://findportablesolarpower.com/updatesandnews/worldresponsesearthhour2009 / http://www.neuescurriculum.org/nc/?p=12 http://www.ybointeractive.com/blog/2008/09/18/thewrongwaytochooseadomain name/ http://www.marcozehe.de/2008/02/29/easyariatip1usingariarequired/ http://www.universetoday.com/2009/03/16/europesclimatesatellitefailstoleave pad/ http://blogs.sjr.com/editor/index.php/2009/03/27/touchinganerveresponsesto acolumn/ http://blog.privcom.gc.ca/index.php/2008/03/18/yourcreativejuicesrequired/ http://www.taiaiake.com/27 http://www.deadmilkmen.com/2007/08/24/leaveusaloan/ http://www.techgadgets.in/household/2007/06/roboamassagingchairresponsesto yourvoice/ http://blog.swishzone.com/?p=1095 http://www.lorenzogil.com/blog/2009/01/18/mappinginheritancetoardbmswithst ormandlazrdelegates/ http://www.venganza.org/about/openletter/responses/ http://www.middleclassforum.org/?p=405 http://flavio.castelli.name/qjson_qt_json_library http://www.razorit.com/designers_central/howtochooseadomainnameforapree
    [Show full text]
  • Jab Harry Met Sejal" by Copying, Recording, Reproducing, Or Allowing
    ... ,., . ,_ 1 \...,- IN THE HIGH COURT OF ,JUDICATURE l>.T MADRAS (ORDINARY ORIGINJ>.L CIVIL ,JURISDICTION) WEDNESDAY, THE 02ND DAY OF AUGUST 2017 "--" THE HON'BLE DR. JUSTICE ANITA SUMANTH "-"' O.A.Nos.740 to 742 of 2017 ~n C.S.No. 601 of 2017 C.S.Ho.601 of 2017 ·- Red Chillies Entertainments Pvt. Ltd. ..__ Plot No.612, Junction of Rama Krishna Mission Road & 15th Road, Santacruz (West), Mu~bai 400054~ .. Plaintiff Vs , ____ 1. Bharat Sanchar Nigam Limit~d, '---- Bharat Sanchar Bhavan, ._ Harish Chandra Mat.hur Lane, Janpath, New Delhi 110 001. 2. Mahanagar Telephone Nigam Ltd.r 5th Floor, Mahanagar Doorsanchar Sadan, 9, CGO Complex, Lodhi Road, New Delhi 110 003. ~ 3. Bharti .Airtel Limited, Bharti Cresen.t, "'-- 1, Nelson Mandela Road, Vasant . Kunj,Phase II, New Delhi 110 070. 4. Aircel Cellular Limitedr 5th Floor, Spencer Plaza, .._. 769 Anna Salai, Chennai 600 002 . '-' 5. Hathway Cable & Datacom Limited, '-• 4th Floor, "Rahejas", . Main Avenue, Santacruz(W), Mumbai 400 054. '-' ·6 . Sistema Shyam Tele Services Limited, MTS Tower, 3, Amrapali Circle, Vaishali Nagar, Jaipui 302 021. - '-- 7. Vodafone India Limtied, ~ Peninsula Corporate Park, .-..,. Ganpatrao Kadam Marg, Lower Parel, Mumbai 400 013. ~· ........, Cz oo38893 .,_ ·--.... ._________, ;: -- '- 2 B. Idea Cellular Limited, ._.. Suman To~er, Plot No.l8, Sector 11, Gandhinagar, '-- Gujarat 3.82 011. 9. Reliance CoHtmunications Infrastructure Limited, Dhirubhai l>.l'llbani Kno~ledge City, Navi Mumbai 400 ?09. --- 10. Tata Docomo, 2A, Old Ish~ar Nagar, Main Mathura Road, Ne~ Delhi 110 065. 11. Syscon Info~- ay Pvt . Ltd. -~- 402, Fourth Floor, Skyline ~con, Andheri Kurla Road, behind Mittal ind.
    [Show full text]
  • P2P and Bittorrent
    inf5040 - Presentation by group 1 nghial, baardehe, chricar 30.10.08 Goals of today After this lecture you should have a general understanding of what P2P and bittorrent is be able to recognize the main differences of bitTorrent and other P2P networks A way of organizing resource sharing in computer networks What is P2P? Server/client model Peer-to-peer model Characteristics of P2P networks Peers act as equals Peers function as both client and server No central server managing the network No central router Examples of ”pure” P2P networks Gnutella, Freenet (filesharing) In short Decentralization and multirole BUT! Most networks and applications described as P2P actually contain or rely on some non-peer elements History 1970 – SMTP, NNTP (Usenet) One process both server and client IBM, 1984 ”Advanced Peer to Peer Networking” Software for filesharing in a LAN 1990 – IRC (DCC), MBONE One client can both send and receive 1997 – Napster Created a lot of controversy Convicted because of the centralized file indexing Advantages of P2P networks Better performance and reliability compared to server/client scheme Popular resources will be available at several locations Principle of locality -> less delay and faster transmission Overlay routing Application layer routing (middleware) Two ways of searching for files Flooding DHT (Distributed Hash Table) Area of application Mostly used in ad hoc networks Often categorized by what it’s used for Filesharing Media streaming Telephony (skype) Discussion forums Used to distribute
    [Show full text]
  • Quantifying the Heterogeneous Effects of Piracy on the Demand for Movies
    Quantifying the Heterogeneous Effects of Piracy on the Demand for Movies Zhuang Liu∗ University of Western Ontario February 10, 2019 Latest Version: http://publish.uwo.ca/~zliu328/jobmarketpaper.pdf Abstract The debate on digital piracy has attracted significant public attention. An accurate estimate of the loss due to piracy relies crucially on correctly identi- fying the substitution between pirated and paid consumption. Using a novel dataset of weekly piracy downloads collected from the BitTorrent network, I estimate a random-coefficient logit demand model of movies to quantify the effect of movie piracy on movie revenue from two distribution channels: box office and DVD sales. Counterfactual results reveal that digital piracy has het- erogeneous effects on different channels of sales. When all piracy is removed, US box office revenue will only increase by 2.71% ($ 231 million) while US DVD sales will increase by 36% ($ 527 million) over 40 weeks in 2015. In addition, the effects on sales differ substantially by quality of pirated videos. I find strong evidence that one movie's piracy have negative indirect effects on other movie's revenue. Decomposition exercises show that the magnitude of piracy's indirect effects is much larger than the direct effects on its own rev- enue. Lastly, I allow piracy to have potentially positive effects on sales through word of mouth (WOM). The positive WOM effects from all pirated consump- tion have relatively moderate contributions to the industry revenue amounted to $ 68.7 million over 40 weeks in 2015. ∗This paper was previously titled \A Structural Model of Movie Piracy with Word-of-mouth", \Estimating the Effects of fil-sharing on Movie Box office".
    [Show full text]
  • ALAI 2007 – Punta Del Este
    ALAI 2007 – Punta del Este The exclusive right to make available to the public Jacqueline Seignette © 2007 J.M.B. Seignette, Amsterdam, Netherlands [email protected] General report on the right of making available will be made available on the ALAI website and published in the ALAI 2007 book. making available to the public what does it mean? Article 8 WCT: Without prejudice to the provisions of Articles 11(1)(ii), 11bis(1)(i) and (ii), 11ter(1)(ii), 14(1)(ii) and 14bis(1) of the Berne Convention, authors of literary and artistic works shall enjoy the exclusive right of authorizing any communication to the public of their works, by wire or wireless means, including the making available to the public of their works in such a way that members of the public may access these works from a place and at a time individually chosen by them . Agreed Statements concerning Article 8: It is understood that the mere provision of physical facilities for enabling or making a communication does not in itself amount to communication within the meaning of this Treaty or the Berne Convention (…). making available to the public two different approaches: • technical • functional making available to the public technical interpretation: physically having the work available on one’s computer ready to be transmitted upon demand by a member of the public making available to the public functional interpretation: • organizing, controlling and offering a service by which the work is made available and transmitted to members of the public on demand • the technology behind the service is not determinative making available to the public an example: P2P networks P2P bit torrent technology • website with links to torrent files • tracker server • internet users with pc’s containing copyright content and bit torrent client software downloading logistics • user visits bit torrent website • he selects a title of a work (e.g.
    [Show full text]
  • Strategies for Unbridled Data Dissemination: an Emergency Operations Manual
    Strategies for Unbridled Data Dissemination: An Emergency Operations Manual Nikita Mazurov PhD Thesis Centre for Cultural Studies, Goldsmiths, University of London 1 Declaration To the extent that this may make sense to the reader, I declare that the work presented in this thesis is my own. Nikita Mazurov 2 Acknowledgements The notion that the work in a thesis is ‘one’s own’ doesn’t seem quite right. This work has benefited from countless insights, critiques, commentary, feedback and all potential other manner of what is after all, work, by those who were subjected to either parts or the entirety of it during encounters both formal and informal. To say nothing of the fact that every citation is an acknowledgement of prior contributory work in its own right. I may have, however, mangled some or all of the fine input that I have received, for which I bear sole responsibility. Certain images were copied from other publications for illustrative purposes. They have been referenced when such is the case. Certain other images were provided by sources who will rename anonymous for reasons of safety. Assistance with technical infrastructure in establishing a server for part of the project was provided by another anonymous source; anonymous for the same reason as above. 3 Abstract This project is a study of free data dissemination and impediments to it. Drawing upon post-structuralism, Actor Network Theory, Participatory Action Research, and theories of the political stakes of the posthuman by way of Stirnerian egoism and illegalism, the project uses a number of theoretical, technical and legal texts to develop a hacker methodology that emphasizes close analysis and disassembly of existent systems of content control.
    [Show full text]
  • Download Ed Sheeran Torrents Kickasstorrents
    1 / 2 Download Ed Sheeran Torrents - KickassTorrents Kickass Download the twilight saga: breaking dawn - part 1 torrent high ... Twilight 2008 kickass free download torrent. ... Lagu ed sheeran full album 2017.. - Format:- Mp3 - Quality/bitrate:- 320 Kbps - Name of artist:- Ed Sheeran - Release Date:- 2011 - Size:- 150 Mb - Genre: Hip-Hop, Rap - Track list: 01 The A Team .... If you want to download torrent files on your computer, you will need the proper software. Besides the fact that it ... Perfect Sheet Music Ed Sheeran. Load more.. Stream Music Torrents Online ... Ed Sheeran - Perfect (Official Music Video) ... How to Download Free Files, Movies, Software, Music Using Kickass Torrents .... Results 1 - 25 — 2013 torrent download written by daphenaran1987 Murder Most Foul Lyrics: ... an 8tracks radio.rar fast and secure Kickass Torrents was de populairste website ... What The official music video for Ed Sheeran - Cross Me feat.. 2013 torrent download written by daphenaran1987 Murder Most Foul Lyrics: 'Twas a ... to die Being The new Kickass Torrents website is once again back online and with ... What The official music video for Ed Sheeran - Cross Me feat.com!. Not all music on SoundCloud can be downloaded, and some require you to ... Perfect Sheet Music Ed Sheeran. ... The Pirate Bay is also considered to be one of the premier torrent sites for music following the shutdown of Kickass Torrents.. Download Ed Sheeran Torrents - KickassTorrents — https://fancli.com/1w6vx8. 4d0f88da50. GRE Powerprep Software V3.1 [ReDsKiNs80 Rip] Crack · Minecraft .... Results 1 - 25 — rar fast and secure Kickass Torrents was de populairste website voor het ... up on torrent sites and downloaded for free Peter James's bestselling Roy ..
    [Show full text]
  • Download the Prince and Me 2004 Dvdrip Xvidscream Torrent Kickasstorrents
    Download The Prince And Me 2004 DVDRip XviD-SCREAM Torrent - KickassTorrents 1 / 4 Download The Prince And Me 2004 DVDRip XviD-SCREAM Torrent - KickassTorrents 2 / 4 3 / 4 ... 7200p · The Prince and Me 2004 DVDRip XviD SCREAM bobdafob ... Download sand pebbles Torrents - KickassTorrents ... 789.5 MB: 2: 0: 222.2w: 0 War The Sand Pebbles 1966 DVDRip XviD AC3-Shoo: 2.19 GB: 0: 0 .. King Solomon's Mines 2004 Hollywood Movie Watch Online Host Server 1 - Stagevu. ... fourth (and final) season two-part episode "The Prince of Darkness Affair. ... the Hand of Death (1961 год) My World Dies Screaming (1961 год) ... Torrent Download [DvDRip XviD Ita] Il vigile.avi 11 torrent download locations .... I prepare hypothetical data to try out multilevel linear regression. You can download it from ... Let me explain a hypothetical context of this hypothetical data :).. Download the prince and the pauper Torrents - KickassTorrents. Come and ... Prince.And.Me.DVDRip.XviD Torrent Download Download Direct The.Prince. ... The Prince and Me 2004 DVDRip XviD SCREAM movies 23 hours. Deadwood Season 2 Complete torrent downloads, Deadwood . ... In honor of Scream Factory's new Blu-Ray release, the group all weigh in on ... Clinical Laboratory Pearls Ebooks - Otsuv, Thepulp.net Doc Savage, Bury Me With My Pearls. ... DVDRip · Van Helsing 2004 TRUEFRENCH DVDRip XviD-NoTag, 1.41 GB, 204 .. 2012-03-13 17:17 INFO download demonoid.me Downloading: Toy Story 3 (BDrip ... 2012-03-16 09:43 VERBOSE feed kickass REJECTED: `03 Prince When Doves Cry` ... Bought a Zoo 2011 DVDRip XviD NeDiVx' URL rewritten to http://zoink.it/torrent/ ..
    [Show full text]
  • Site Blocking Efficacy – Key Findings Australia
    Site Blocking Efficacy – Key Findings Australia February 2018 Site Blocking Efficacy: Australia | ASA Overall usage of piracy sites in Australia is down Site blocking in Australia has had a positive impact upon the usage of blocked piracy sites, reducing the usage in Australia of the websites targeted by the blocking orders by 53.4% since December 2016, when the blocking regime began. The key points from this report are as follows: • Site blocking in Australia has resulted in a usage reduction of 53.4% to blocked sites when comparing usage recorded in November 2017 to before blocking took effect. Usage has decreased for each blocking wave implemented in the country; • The usage of the top 50 piracy sites in Australia has decreased by 35.1% since October 2016. This is 25.5% further than the 10.6% in the previous report. The impact of the two August 2017 blocking injunctions is the driving force behind these changes; • The graph below summarises the findings of this report and shows the change in usage for the top 250 unauthorised sites1 in Australia over the recorded period of October 2016 to November 2017. The blocked sites have decreased in usage by a total of 53.4%. Overall usage of the top 250 unauthorised sites has decreased by 25.4% in Australia. 1 Appendix C shows how top-heavy piracy consumption is with most activity in the Top 50 sites, and demonstrates that a Top 250 is a valid proxy for piracy overall. 2 Site Blocking Efficacy: Australia | ASA Direct effect of site blocking To understand the effect of site blocking on the targeted domains it is useful to start by looking at the direct impact on the sites themselves.
    [Show full text]