P2P Content Distribution Bittorrent and Spotify

Total Page:16

File Type:pdf, Size:1020Kb

P2P Content Distribution Bittorrent and Spotify P2P Content Distribution BitTorrent and Spotify Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 1 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 2 / 62 Possible Solutions for Content Distribution Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 3 / 62 Client-Server Model Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 4 / 62 Client-Server Model Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 5 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 6 / 62 I Single Point of failure? The Client-Server Model Problems I Scalability? Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 7 / 62 The Client-Server Model Problems I Scalability? I Single Point of failure? Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 7 / 62 The Client-Server Model Problems I Scalability? I Single Point of failure? Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 7 / 62 Client-Server Systems Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 8 / 62 The Client-Server Model Problem Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 9 / 62 Scalable and Fault-Tolerant Client-Server Model Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 10 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 11 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 12 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 13 / 62 Peer-to-Peer Model Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 14 / 62 Peer-to-Peer (P2P) Model Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 15 / 62 P2P Challenges I Churn in the system I Free-riding problem I Bottleneck in the overlay network I Connectivity problem, e.g., NAT Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 16 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 17 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 18 / 62 How To Discover Data? Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 19 / 62 Possible Solutions - First Generation I Central directory Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 20 / 62 Possible Solutions - Second Generation I Flooding Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 21 / 62 Possible Solutions - Third Generation I Distributed Hash Table (DHT) Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 22 / 62 P2P Content Distribution Applications - File Sharing Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 23 / 62 P2P Content Distribution Applications - Media Streaming Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 24 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 25 / 62 BitTorrent I BitTorrent is a system for efficient and scalable replication of large amounts of static data. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 26 / 62 BitTorrent Players Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 27 / 62 Files I Files are broken into pieces of size between 64KB and 1MB. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 28 / 62 .torrent Files I Metadata I Contains: • URL of tracker • Information about the file, e.g., filename, length, ... Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 29 / 62 I It, then, connects to the tracker. I The tracker tells the peers from which other peers to download the pieces of the file. I Peers use this information to communicate with each other. I The peers send information about the file and themselves to tracker. The Core Idea I A peer obtains .torrent file. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 30 / 62 I The tracker tells the peers from which other peers to download the pieces of the file. I Peers use this information to communicate with each other. I The peers send information about the file and themselves to tracker. The Core Idea I A peer obtains .torrent file. I It, then, connects to the tracker. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 30 / 62 I Peers use this information to communicate with each other. I The peers send information about the file and themselves to tracker. The Core Idea I A peer obtains .torrent file. I It, then, connects to the tracker. I The tracker tells the peers from which other peers to download the pieces of the file. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 30 / 62 I The peers send information about the file and themselves to tracker. The Core Idea I A peer obtains .torrent file. I It, then, connects to the tracker. I The tracker tells the peers from which other peers to download the pieces of the file. I Peers use this information to communicate with each other. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 30 / 62 The Core Idea I A peer obtains .torrent file. I It, then, connects to the tracker. I The tracker tells the peers from which other peers to download the pieces of the file. I Peers use this information to communicate with each other. I The peers send information about the file and themselves to tracker. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 30 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 31 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 32 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 33 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 34 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 35 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 36 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 37 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 38 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 39 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 40 / 62 What About Free Riders? Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 41 / 62 Tit-For-Tat Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 42 / 62 Question I From which peers download the pieces? Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 43 / 62 Peer Selection I Use choking algorithm to choose peer to download pieces. I Decision to choke/unchoke based on tit-for-tat. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 44 / 62 Discover More Cooperating Peers I Optimistic unchoking I Allocate an upload slot to a randomly chosen uncooperative peer Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 45 / 62 Snubbed Peers I If all its peers choke it. I Increase the number of optimistic unchokes. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 46 / 62 Question I Which piece? Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 47 / 62 I Random first piece: start-up need to get a complete piece I Endgame mode: broadcast for all remaining blocks Piece Selection I Rarest first: common parts left for later Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 48 / 62 I Endgame mode: broadcast for all remaining blocks Piece Selection I Rarest first: common parts left for later I Random first piece: start-up need to get a complete piece Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 48 / 62 Piece Selection I Rarest first: common parts left for later I Random first piece: start-up need to get a complete piece I Endgame mode: broadcast for all remaining blocks Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 48 / 62 BitTorrent Extension I Distributed tracker I Peer-exchange Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 49 / 62 Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 50 / 62 Spotify I Active users: over 50 million I Number of songs: over 20 million I Number of songs added per day: over 20000 I Number of playlists: over 1.5 billion created so far I Available in 58 countries I Legal Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 51 / 62 I Meanwhile, search P2P network for remainder. I Switch back and forth between Spotify servers and peers as needed. I Towards end of a track, start prefetching the next one. The Core Idea I Request first piece from Spotify servers. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 52 / 62 I Switch back and forth between Spotify servers and peers as needed. I Towards end of a track, start prefetching the next one. The Core Idea I Request first piece from Spotify servers. I Meanwhile, search P2P network for remainder. Amir H. Payberah (Tehran Polytechnic) P2P Content Distribution 1393/8/27 52 / 62 I Towards end of a track, start prefetching the next one. The Core Idea I Request first piece from Spotify servers. I Meanwhile, search P2P network for remainder. I Switch back and forth between Spotify servers and peers as needed.
Recommended publications
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • [Hal-00744922, V1] Improving Content Availability in the I2P Anonymous
    Improving Content Availability in the I2P Anonymous File-Sharing Environment Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Universit´ede Lorraine Email: fjuanpablo.timpanaro, [email protected] Email: [email protected] Abstract. Anonymous communication has gained more and more inter- est from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anony- mous file-sharing among users. However, one major problem with anony- mous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTor- rent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable. 1 Introduction Peer-to-peer file-sharing has always been one of the major sources of the Internet hal-00744922, version 1 - 24 Oct 2012 traffic, since its early beginnings in 2000. It has been moving from semi-central approaches (eDonkey2000, for example), to semi-decentralized approaches (Kazaa, for instance) to fully decentralized file-sharing architectures (like the KAD net- work).
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Frequently Asked Questions
    Copyright & File-Sharing FREQUENTLY ASKED QUESTIONS WHAT IS COPYRIGHT? BUT I BOUGHT IT. WHY CAN’T I SHARE IT? WHAT CAN I DO TO AVOID COPYRIGHT Copyright refers to the legal rights creators have There is a difference between using and distributing INFRINGEMENT? over the use, distribution, and reproduction of copyrighted materials. Purchasing songs, movies, or Download content from legitimate sources and do original work (music, movies, software, etc.). software from legitimate sources does not give you the not share copyrighted materials online. Uninstall Copyright infringement is the unlawful use of any right to share these materials over the Internet or make P2P applications (e.g., Popcorn Time, BitTorrent, material protected under copyright law. Common copies for others. When you purchase a Peer-to-Peer Vuze), which may be sharing your files without violations include downloading ‘pirated’ copies of (P2P) program (e.g., Frostwire, BitTorrent, Vuze), you your knowledge. Do not share your NetID and copyrighted materials or sharing files not intended only buy the software, not any files you download or password with anyone. Keep your computer for you to distribute. share using this software. up-to-date with the latest security patches and anti-virus software. HOW DO I KNOW IT’S COPYRIGHTED? DOES UMASS IT MONITOR MY INTERNET Assume all materials are copyright-protected CONNECTION? HOW CAN I LEGALLY DOWNLOAD CONTENT? unless you created them or you have received the No. We do not monitor the contents of your computer Services like Amazon, iTunes, and eMusic offer author’s explicit permission to distribute them. All or issue copyright complaints.
    [Show full text]
  • What You Need to Know About Copyright Infringement October 2, 2018 Dear Student, the Higher Education Opportunity Act of 2008 Re
    What You Need to Know About Copyright Infringement October 2, 2018 Dear Student, The Higher Education Opportunity Act of 2008 requires all colleges and universities to inform students of the possible consequences of copyright infringement as outlined by the Digital Millennium Copyright Act (DMCA). How the DMCA Affects Wake Forest University The Digital Millennium Copyright Act protects the rights of owners of copyrighted digital material. By providing students online access to the Wake Forest University’s computing network(s), including Internet access, the University is considered an Internet Service Provider (ISP). The DMCA requires an ISP to expeditiously respond to complaints it receives of copyright infringements over its networks. Potential Legal Penalties for Federal Copyright Law Violations Violation of the DMCA can result in severe civil or criminal penalties. University action taken to stop copyright violation, including disciplinary measures, does not protect the individual infringer from civil or criminal prosecution from the copyright owner or the authorities. Illegal Music Downloading Complaints Filed by Entertainment Entities Most copyright infringement cases reported to Wake Forest Information Systems are associated with illegal music downloading. Other common types of copyright infringement cases at Wake Forest involve the illegal downloading or sharing of movies, videos, and software including gaming software. Risks Associated with Illegal File Sharing Using peer-to-peer file sharing programs that share copyrighted material such as music, movies and software put you at risk of obtaining viruses, spyware or other malicious software that can corrupt your computer and damage your data. Peer-to-peer file sharing programs include Popcorn View, Popcorn Time, Vuze, uTorrent, BitTorrent, LimeWire, BitComet, and FrostWire.
    [Show full text]
  • Walking the Plank: How Scholarly Piracy Affects Publishers, Libraries and Their Users
    Walking the Plank: How Scholarly Piracy Affects Publishers, Libraries and Their Users Laurie Morrison, Carol Stephenson, and Elizabeth Yates* Introduction The arrival of technology supporting peer-to-peer (P2P) file sharing in scholarly communication has, until -re cently, had minimal impact on libraries. However, threats posed by pirate sites including Library Genesis Project (LibGen) and Sci-Hub are now impacting both library users and library licensing agreements with publishers. Publishers are nervous as they witness their proprietary content leaking out of paywalled systems—not just hundreds of thousands of articles, but millions. Accordingly, publishers are monitoring activities in licensed products very closely for any behavior that they deem suspicious. When a user’s activities cause a publisher to question whether materials are being pirated, the outcomes can vary. Consequences can range from relatively minor inconvenience for blocked users, who must find workarounds to access scholarly content—to the poten- tial for major disruption of a centuries-old proprietary publishing system. This article uses a case study involving a student at Brock University to highlight significant challenges facing libraries and the rights of their users in the current environment of piracy-wary academic publishers. Case Study: Access Denied “I feel like I’m being penalized for my honesty.” That’s how a graduate student at Brock University felt in January 2016, after her legitimate quest to download several hundred articles for a meta-analysis project turned into a protracted—and ultimately unsuccessful—negotiation with the American Psychological Association. Sarah† had downloaded about 20 articles from the PsycINFO database when she received the following screen prompt: The APA PsycNET Terms and Conditions prohibit “Systematic downloading of content, whether done manually or by technological means.” Please contact [email protected] if you are inter- ested in data mining or wish to conduct a systematic review or meta analysis with PsycINFO data.
    [Show full text]
  • Network File Sharing Protocols
    Network File Sharing Protocols Lucius quests her hotchpotch ethnologically, she contradistinguish it self-righteously. Dialogic Millicent catch prayingly. Sheridan usually foils stintedly or pirouette anaerobiotically when trilobed Saxon disposes genotypically and homeward. It is recommended that this type be accepted by all FTP implementations. So how do you protect yourself from these malware infected movies? Which protocol is even an option for you is based on your use scenario. Learn about the latest issues in cybersecurity and how they affect you. As more clients access the file, share important files digitally and work as a team even sitting miles apart. Friendly name of the printer object. SMB is built in to every version of Windows. As you can see NFS offers a better performance and is unbeatable if the files are medium sized or small. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. You are correct, thank you. It syncs files between devices on a local network or between remote devices over the internet. Sets the maximum number of channels for all subsequent sessions. Session control packets Establishes and discontinues a connection to shared server resources. Please fill in all required fields before continuing. File names in CIFS are encoded using unicode characters. The configured natural language of the printer. After entering its resources or network protocols that protocol over the server supports file services while originally connected you must be set. Download a free fully functional evaluation of JSCAPE MFT Server. The File Transfer Protocol follows the specifications of the Telnet protocol for all communications over the control connection.
    [Show full text]
  • Forensics in Peer-To-Peer Sharing and Associated Litigation Challenges
    Forensics in Peer-to-Peer Sharing and Associated Litigation Challenges Presented by Mo Hamoudi, Seattle, WA ([email protected]) Terry Lahman, Snoqualmie, WA ([email protected]) 1 Statement of Probable Cause “Between April 08, 2016, and April 09, 2016, while acting in an undercover capacity, I used a law enforcement version of eMule, a commonly used P2P file sharing program for the eD2k file sharing network, to monitor for P2P users possessing and distributing image and video files depicting child pornography. I used the law enforcement version of eMule to download several files depicting child pornography from a P2P user at IP address <redacted> (the SUBJECT IP ADDRESS).” The statement of probable cause implies the detective was sitting at a computer utilizing a special version of software to identify and download suspected child pornography. It also implies that the specialize software is running autonomously on the detective’s computer. The law enforcement version of eMule runs automatically without user invention. And the law enforcement computer is only one component of a large scale network of computers. Digging into the technical data of the law enforcement version of eMule required a deep investigation similar to peeling an onion, one layer at a time. The entire process required a number of discovery requests to peel back each layer. Each new discovery item was analyzed to dig deeper into the next layer. PRACTICE POINT: The practitioner needs to use the Federal Rules of Criminal Procedure 16 or its state counterpart to obtain information beyond the affidavit. United States v. Soto-Zuniga, 837 F.3d 992 (9th Cir.
    [Show full text]
  • Copyright Infringement and Illegal File Sharing
    Copyright Infringement and Illegal File Sharing The copying, distribution or sharing of copyrighted works (including music, videos, and digital copies of textbook) without permission may be referred to as “copyright infringement”, “pirating” or, in the electronic context through peer-to-peer networks, “illegal file sharing”. Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without the permission of the copyright holder constitutes infringement. Penalties for Copyright Infringement The unauthorized copying, sharing or distribution of copyrighted material is strictly prohibited. It is a violation of federal law, the Copyright Act, and of the Student Code of Conduct. Students who infringe a copyright are subject to disciplinary action under the Student Code of Conduct, up to and including expulsion. Employees may be subject to disciplinary action ranging in severity from a warning up to and including termination of employment. In addition, penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or “statutory” damages affixed at not less than $750 and not more than $30,000 per work infringed. For “willful” infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys’ fees.
    [Show full text]
  • Malware Prevalence in the Kazaa File-Sharing Network
    Malware Prevalence in the KaZaA File-Sharing Network Seungwon Shin Jaeyeon Jung Hari Balakrishnan ETRI Mazu Networks MIT CSAIL [email protected] [email protected] [email protected] ABSTRACT With few defense mechanisms in place, peer-to-peer (P2P) file- In recent years, more than 200 viruses have been reported to use sharing networks have been known to be vulnerable to many secu- a peer-to-peer (P2P) file-sharing network as a propagation vector. rity attacks. Recent papers discuss the threat of malware spread in Disguised as files that are frequently exchanged over P2P networks, P2P networks [30, 26]. One experimental study reports that 44% these malicious programs infect the user’s host if downloaded and of the 4,778 executable files downloaded through a KaZaA client opened, leaving their copies in the user’s sharing folder for fur- application contain malicious code [28]. In this study, we perform ther propagation. Using a light-weight crawler built for the KaZaA a large scale measurement study on the prevalence of malicious file-sharing network, we study the prevalence of malware in this programs in the KaZaA file-sharing network. popular P2P network, the malware’s propagation behavior in the In recent years, KaZaA has been one of most popular P2P net- P2P network environment and the characteristics of infected hosts. works and the number of active users far outnumbers that of Over- We gathered information about more than 500,000 files returned net and Gnutella. Despite a number of lawsuits [6], KaZaA still by the KaZaA network in response to 24 common query strings.
    [Show full text]
  • Involuntary Browser-Based Torrenting
    Involuntary Browser-Based Torrenting Supervisor: Course: Author: Jan Freudenreich Research Project 2 Alexander Bode Introduction BitTorrent Protocol for distributing files using peer-to-peer connections. - BitTorrent Swarm - Seeders - Leechers - Trackers - Tracker Servers - Distributed Hash Tables - Repository Servers - Torrents Source: Enhanced BitTorrent Simulation using Omnet++, IEEE, 2020 - Magnet URI’s Transport Protocol: TCP / uTP 2 Introduction Advantages of BitTorrent - Every downloader is also an uploader - Splits files into pieces - Uses tit-for-tat principle for leeching - Downloads rarest piece first - No central point of failure - Takes action with slow peers Disadvantages of BitTorrent - Torrent can’t complete if all seeds go offline and all leechers require a specific piece. - IP address is exposed to the tracker and peers 3 Introduction WebTorrent First torrent client that works in a browser. - Completely written in JavaScript - WebRTC as transport protocol - Custom tracker implementation, ICE - Once peers connected, same as BitTorrent Use Cases - File sharing & streaming - Peer-assisted delivery Source: WebTorrent.io, 2020 - Hybrid clients as bridge to “normal” BitTorrent Transport Protocol: WebRTC (on top TCP/UDP) 4 Introduction Research Questions Main Research Question Can WebTorrent be abused to have web page visitors involuntarily participate in peer-to-peer networks? Sub Questions - Which WebTorrent specific features can be abused? - In which ways could WebTorrent be useful to an adversary? - What can be done to
    [Show full text]