Forensic Studies in Bittorrent Optimising File Downloads Is a Dream for Some; for Others It Raises Challenging Piracy Issues

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Forensic Studies in BitTorrent Optimising file downloads is a dream for some; for others it raises challenging piracy issues. BY JAMIE ACORN AND JOHN AUSTIN Produced by the Information Security Group at Royal Holloway, University of London in conjunction with TechTarget. Copyright © 2008 TechTarget. All rights reserved. Royal Holloway series Forensic studies in BitTorrent INTRODUCTION Given the volumes of recorded and transmitted data in today’s computerised environ- ment, the collection and processing of digital evidence is an even more delicate and com- plex business than in years past. Bram Cohen’s creation of BitTorrent in 2001 enables Jamie Acorn and optimises the downloading of files, any size and any type, to remote computers. Information Security Group, Royal Now available for all common operating systems, its popularity is soaring and is available Holloway, University of London, Egham, Surrey, U.K. in many browsers including Mozilla Firefox. For some it is a dream; for others, including those trying to combat the unauthorised downloading or ‘pirating’ of copyright material, it John Austin poses yet another significant problem. Information Security Group, Royal Holloway, University of London, Egham, Surrey, U.K Forensic Studies in BitTorrent Given the ever-growing use of BitTorrent BitTorrent client, facilitating the connection as a means of file sharing, and the associat- to remote computers and the downloading ed costs to media-based industries and of files (of any size and type). legal issues, the need for a forensic under- The diagrams shown (next page) are This article was prepared by students and staff involved with the award-winning M.Sc. standing of this system of file sharing is taken from and depict how the BitTorrent in Information Security offered by the becoming increasingly important. To date, protocol works. Firstly, an individual creates Information Security Group at Royal Holloway, University of London. The student was judged there are no (known) published studies a torrent using either a BitTorrent client or to have produced an outstanding M.Sc. thesis investigating the forensic aspects of BitTor- torrent-making application, and publishes on a business-related topic. The full thesis rent. This study is a preliminary investigation it on a website or forum. This individual is is available as a technical report on the Royal Holloway website into the forensic artefacts created by BitTor- known as the ‘initial seeder’. Figure 1 shows http://www.ma.rhul.ac.uk/tech. rent use. the ‘initial seeder’ distributing fragments of a ‘BitTorrent’ is a peer-to-peer application file to different machines connected using a For more information about the Information Security Group at Royal Holloway or on the that uses metadata files known as torrents. BitTorrent client. It is usual for the shared file M.Sc. in Information Security, please visit The metadata provides instructions to a to be virtually split into many smaller chunks http://www.isg.rhul.ac.uk. • FILE SHARING • BitTorrent Clients • CACHE FILES • REGISTRY FILES 2 Royal Holloway series Forensic studies in BitTorrent Figures 1 – 4: The BitTorrent file sharing process of data of equal size to aid file transfer (it is not always possible to divide the file equally and therefore the last chunk may be truncated). The connected individuals are collectively known as a ‘swarm’. Figures 2 and 3 show the swarm sharing data chunks between each other as well as the ‘initial seeder’. Figure 4 shows the point where the ‘ini- tial seeder’ has shared all the small data chunks and now no longer needs to seed these files. The individuals that form the swarm now pos- sess the sum of all parts of the file being shared. The swarm will continue to share data with each Figure 1 Figure 2 other and any newly connected individuals. The beauty of this protocol is that an ‘initial seeder’ only needs to share each data chunk once in order for the file to be shared with many individ- uals and this means the initial seeder’s band- width is not being constantly depleted by the people they are sharing files with. The instruction information contained in tor- rent files are essentially: the name of the file to be shared, the size of each piece and the num- ber of pieces that make up the file, and the Uni- form Resource Locater (URL) of a tracker. A ‘tracker’ is a dedicated server that links all the peers (remotely connected computers) associ- Figure 3 Figure 4 SOURCE: Wikimedia Foundation, Inc. (September, 2007): BitTorrent, http://en.wikipedia.org/wiki/BitTorrent • FILE SHARING • BitTorrent Clients • CACHE FILES • REGISTRY FILES 3 Royal Holloway series Forensic studies in BitTorrent ated with a particular torrent file. Remote shared, during the test phase. individuals download the torrent from the 4. To identify whether any of the torrents website. When the .torrent file is opened had been created and seeded by the user. within a BitTorrent client, it points the client to the ‘initial seeder’ using the tracker URL. Five BitTorrent clients (ABC, Azureus, The effectiveness of the protocol relies Bitcomet, BitTornado, and uTorrent) were It is possible to on every individual sharing pieces of the file selected for testing as these were deter- prevent seeding they are downloading; hence, while an indi- mined to be the most ‘popular’ at the time of by changing vidual is downloading pieces of the file, they this study. A number of torrents were select- preferences within are also uploading or seeding the pieces of ed for download and then different scenar- the file they already have. It is possible to ios created to emulate normal usage, such the BitTorrent prevent seeding by changing preferences as stopping a torrent during the download, client but trackers within the BitTorrent client but trackers and removing a torrent from the client during and individuals individuals will ban these users or limit their download, completing a full download and will ban these download speed. Thus, it is the general rule letting the torrent seed). Torrent files were users or limit their that, by using BitTorrent to download files, also created by each client (except BitTorna- download speed. the user is also sharing files. do), linked to a public tracker and left to The specific aims of the study were seed until the files seeded were completely as follows: uploaded. Each client was then analysed 1. To identify forensic artefacts pro- using forensic software on generated image duced by BitTorrent file sharing, and to files and also in situ. establish whether the artefacts lead to iden- All the clients tested have a ‘settings or tification of the downloaded or shared files. preferences’ function where the user can 2. To identify any settings that within tweak operation configurations. Analysis of client configuration files which may be useful the clients showed that they vary in complexity to aid forensic examination. and operability and thus varied in the 3. To identify any artefacts that deter- amount of useful forensic information stored mine IP addresses of remote computers in the settings. However, investigating the from which data was downloaded, or settings of a client is key to understanding • FILE SHARING • BitTorrent Clients • CACHE FILES • REGISTRY FILES 4 Royal Holloway series Forensic studies in BitTorrent how it has been used, as the settings can that torrent files may arrive on a computer. determine information such as: A user can create a torrent, and save it any- • where downloads will be stored, where on the system. A user can open a tor- • if default settings have been altered, rent from a website; this causes the torrent • where torrents will be stored, deletion file to be saved in the ‘Temporary Internet settings, File’ folder (if Internet Explorer is used as a Torrent files • if logging is enabled, web browser). It is also possible a user contain informa- • if a password has been set, might save a torrent from a website, email, tion such as the • the version of the client used, IRC, external storage device, to any location names and sizes • the ports used, on the system. With the exception of BitTor- • the last time the client was used, nado, all clients analysed create a backup of of files that are • the seeding settings etc. torrent files (these are stored in application downloaded or specific directories) when they are opened. shared. Thus analysis of the various settings The backups are direct copies of the torrent can be used to form a profile of a user and files opened. Azureus, uTorrent and ABC to distinguish a zealous user from a recre- store all backup torrent files within their des- ational user. ignated directories where they remain stored even after torrents are removed from the TORRENT FILES GUI. The backup torrent files for these Torrent files are a fundamental component clients can be deleted by the user using the of the BitTorrent file sharing procedure. They GUI, but not by using the main removal tab. are, in effect, pointers to the target files that The BitComet client does not continue stor- are to be shared–meaning that there is no ing the torrent backups once they are difference between a torrent file that is used removed from the GUI; hence only backup to share or download a file. The only way to torrent files currently loaded in the GUI are determine what a torrent file has been used stored. for (i.e. to download or share a file) is to Torrent files contain information such as investigate artefacts produced by the BitTor- the names and sizes of files that are down- rent client used. There are different ways loaded or shared. This information can be • FILE SHARING • BitTorrent Clients • CACHE FILES • REGISTRY FILES 5 Royal Holloway series Forensic studies in BitTorrent used as a guide to determine which files downloaded/seeding, or stopped) may have been downloaded or shared but the presence of a torrent file alone is not evi- These ‘cache’ files, thus, provide evidence dence of file downloading/sharing; further for the downloading or seeding of specific evidence would have to be gathered show- files.
Recommended publications
  • Uila Supported Apps

    Uila Supported Apps

    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
  • Cisco SCA BB Protocol Reference Guide

    Cisco SCA BB Protocol Reference Guide

    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Comodo System Cleaner Version 3.0

    Comodo System Cleaner Version 3.0

    Comodo System Cleaner Version 3.0 User Guide Version 3.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System-Cleaner - Introduction ............................................................................................................ 3 1.1.System Requirements...........................................................................................................................................5 1.2.Installing Comodo System-Cleaner........................................................................................................................5 1.3.Starting Comodo System-Cleaner..........................................................................................................................9 1.4.The Main Interface...............................................................................................................................................9 1.5.The Summary Area.............................................................................................................................................11 1.6.Understanding Profiles.......................................................................................................................................12 2.Registry Cleaner............................................................................................................................................. 15 2.1.Clean.................................................................................................................................................................16
  • Digital Fountain Erasure-Recovery in Bittorrent

    Digital Fountain Erasure-Recovery in Bittorrent

    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
  • Instructions for Using Your PC ǍʻĒˊ Ƽ͔ūś

    Instructions for Using Your PC ǍʻĒˊ Ƽ͔ūś

    Instructions for using your PC ǍʻĒˊ ƽ͔ūś Be careful with computer viruses !!! Be careful of sending ᡅĽ/ͼ͛ᩥਜ਼ƶ҉ɦϹ࿕ZPǎ Ǖễƅ͟¦ᰈ Make sure to install anti-virus software in your PC personal profile and ᡅƽញƼɦḳâ 5☦ՈǍʻPǎᡅ !!! information !!! It is very dangerous !!! ᫬ΚTẝ«ŵ┭ՈT Stop violation of copyright concerning illegal acts of ơųጛňƿՈ☢ͩ ⚷<ǕO਍ᜐ&« transmitting music and ₑᡅՈϔǒ]ᡅ others through the Don’t forget to backup ඡȭ]dzÑՈ Internet !!! important data !!! Ȥᩴ̣é If another person looks in at your E-mail, it’s a big ὲâΞȘᝯɣ׏r problem !!! Don’t install software in dz]ǣrPǎᡅ ]ᡅîPéḳâ╓ ͛ƽញ4̶ᾬϹ࿕ ۅTake care of keeping your some other PCs without ੥ˊΙǺ password !!! permission !!! ₐ Stop sending the followings !!! ؄ŌՈϹوInformation against public order and Somebody targets on your PC for Pǎ]ᡅǕễạǑ͘͝ࢭÛ ΞȘƅ¦Ƿń morals illegal access !!! Ոƅ͟ǻᢊ᫁᫨ĐՈ ࿕Ϭ⓶̗ʵ£࿁îƷljĈ Information about discrimination, Shut out those attacks with firewall untruth and bad reputation against a !!! Ǎʻ ᰻ǡT person ᤘἌ᭔ ᆘჍഀ ጠᅼૐᾑ ᭼᭨᭞ᮞęɪᬡ෉ᬡǰɟ ᆘȐೈ࿴ ᾑ૥ ጠᅼ3ظ ᤘἌ᭔ ǰɟᯓۀ᭞ᮞ᭿ᮐᮧ᭪᭑᭎ᮖ᭤ᬞᬢ ഄᅤ Έʡȩîᬡ͒ͮᬢـ ᅼܘᆘȐೈ ǸᆜሹظᤘἌ᭔࿴ ཬᴔ ᭼᭨᭞ᮞᬞᬢŽᬍ᭑᭎ᮖ᭤̛ɏ᭨ᮀ᭳ᭅ ரἨ᳜ᄌ࿘Π ؼ˨ഀ ୈ᡼ὼ$ ഄጵ↬3L ʍ୰ᬞᯓ ᄨῼ33 Ȋථᬚᬌᬻᯓ ഄ˽ ઁǢᬝຨϙଙͮـᅰჴڹެ ሤᆵͨ˜Ɍ ጵႸᾀ żᆘ᭔ ᬝᬜ᫞Ϊ̎UઁɃᬢ ࡶ୰ᬝ᭲ᮧ᭪ᬢ ᄨؼᾭᄨ ᾑ૥ ٕ࿩ᅨ ΰ̛ᬞ᭫ᮌᯓ ᭻᭮᭚᭍᭮ᮂᭅ ሬČ ཬȴ3 ᾘɤɟ3 Ƌᬿᬍᬞᯓ ᫾ᬿᬒᬼۏąഄᅼ Ѹᆠᅨ ᮌᮧᮖᭅ ⃸ᛴܠ ఼ ᆬð3 ᤘἌ᭔࿴ ƂŬᯓ ᭨ᮀ᭳᭑᭒᭍ᭅƖ̳ᬞ ĩᬡ᭼᭨᭞ᮞᬞٴ ரἨ᳜ᄌ࿘ ᭼᭤ᮚᮧ᭴ᬡɼǂᬢ ڹެ ᵌೈჰ˨ ˜ϐ ᛄሤ↬3 ᆜೈᯌ ϤᏤ ᬊᬖ᫾ᬽᬊᬻ᫹ᯓ ᭏ᮞ᭤᭳ᮧᮖᬊᬝ᫷ᬚ ሬČʀ ͌ǜ ąഄᅼ ΰ̛ᬞ ޅ᫾᫿᫵ᬝᬒᬡ᭼᭨᭞ᮞᭅ ᤘἌ᭔Π ͬϐʼ ᆬð3 ʏͦᬞɃᬌᬾȩî ēᬖᬙ᫷ᬾᯓ ܘˑˑᏬୀΠ ᄨؼὼ ሹ ߍɋᬞ᫵ᬒᬾȩî ᮀᭌ᭏᭍᭑᭔ᮧᮖwƫᬚފᴰᆘ࿘ჸ $±ᅠʀ =Ė ܘ૥Čٍᅨ ᙌۨ5ࡨٍὼ ሹ ഄϤᏤ ᤘἌ᭔ ኩ˰Π3 ᬢ͒ͮᬊᬝ᫷ᯓ ᭢ᮎ᭮᭳᭍᭑᭳ᬊᬻ᫹ᯓـ ʧʧ¥¥ᬚᬚP2PP2P᭨᭨ᮀᮀ᭳᭳᭑᭑᭒᭒᭍᭍ᬢᬢ DODO NOTNOT useuse P2PP2P softwaresoftware ̦̦ɪɪᬚᬚᬀᬀᬱᬱᬎᬎᭆᭆᯓᯓ inin campuscampus networknetwork !!!! Z ʧ¥᭸᭮᭳ᮚᮧ᭚ᬞ᫽ᬄᬾ੒ͮᬢȴƏΜˉ᭢᭤᭱ Z All communications in our campus network are ᬈᬿᬙ᫷ᬱᬌ᫟ʧ¥ᬚP2P᭨ᮀ always monitored automatically.
  • What You Need to Know About Copyright Infringement October 2, 2018 Dear Student, the Higher Education Opportunity Act of 2008 Re

    What You Need to Know About Copyright Infringement October 2, 2018 Dear Student, the Higher Education Opportunity Act of 2008 Re

    What You Need to Know About Copyright Infringement October 2, 2018 Dear Student, The Higher Education Opportunity Act of 2008 requires all colleges and universities to inform students of the possible consequences of copyright infringement as outlined by the Digital Millennium Copyright Act (DMCA). How the DMCA Affects Wake Forest University The Digital Millennium Copyright Act protects the rights of owners of copyrighted digital material. By providing students online access to the Wake Forest University’s computing network(s), including Internet access, the University is considered an Internet Service Provider (ISP). The DMCA requires an ISP to expeditiously respond to complaints it receives of copyright infringements over its networks. Potential Legal Penalties for Federal Copyright Law Violations Violation of the DMCA can result in severe civil or criminal penalties. University action taken to stop copyright violation, including disciplinary measures, does not protect the individual infringer from civil or criminal prosecution from the copyright owner or the authorities. Illegal Music Downloading Complaints Filed by Entertainment Entities Most copyright infringement cases reported to Wake Forest Information Systems are associated with illegal music downloading. Other common types of copyright infringement cases at Wake Forest involve the illegal downloading or sharing of movies, videos, and software including gaming software. Risks Associated with Illegal File Sharing Using peer-to-peer file sharing programs that share copyrighted material such as music, movies and software put you at risk of obtaining viruses, spyware or other malicious software that can corrupt your computer and damage your data. Peer-to-peer file sharing programs include Popcorn View, Popcorn Time, Vuze, uTorrent, BitTorrent, LimeWire, BitComet, and FrostWire.
  • Problems with Bittorrent Litigation in the United States: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System

    Problems with Bittorrent Litigation in the United States: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System

    Washington University Global Studies Law Review Volume 13 Issue 1 2014 Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System Violeta Solonova Foreman Washington University in St. Louis, School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_globalstudies Part of the Comparative and Foreign Law Commons, and the Intellectual Property Law Commons Recommended Citation Violeta Solonova Foreman, Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System, 13 WASH. U. GLOBAL STUD. L. REV. 127 (2014), https://openscholarship.wustl.edu/law_globalstudies/vol13/iss1/8 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Global Studies Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM INTRODUCTION In 2011, 23.76% of global internet traffic involved downloading or uploading pirated content, with BitTorrent accounting for an estimated 17.9% of all internet traffic.1 In the United States alone, 17.53% of internet traffic consists of illegal downloading.2 Despite many crackdowns, illegal downloading websites continue to thrive,3 and their users include some of their most avid opponents.4 Initially the Recording Industry Association of America (the “RIAA”) took it upon itself to prosecute individuals who 1.
  • P2P and Bittorrent

    P2P and Bittorrent

    inf5040 - Presentation by group 1 nghial, baardehe, chricar 30.10.08 Goals of today After this lecture you should have a general understanding of what P2P and bittorrent is be able to recognize the main differences of bitTorrent and other P2P networks A way of organizing resource sharing in computer networks What is P2P? Server/client model Peer-to-peer model Characteristics of P2P networks Peers act as equals Peers function as both client and server No central server managing the network No central router Examples of ”pure” P2P networks Gnutella, Freenet (filesharing) In short Decentralization and multirole BUT! Most networks and applications described as P2P actually contain or rely on some non-peer elements History 1970 – SMTP, NNTP (Usenet) One process both server and client IBM, 1984 ”Advanced Peer to Peer Networking” Software for filesharing in a LAN 1990 – IRC (DCC), MBONE One client can both send and receive 1997 – Napster Created a lot of controversy Convicted because of the centralized file indexing Advantages of P2P networks Better performance and reliability compared to server/client scheme Popular resources will be available at several locations Principle of locality -> less delay and faster transmission Overlay routing Application layer routing (middleware) Two ways of searching for files Flooding DHT (Distributed Hash Table) Area of application Mostly used in ad hoc networks Often categorized by what it’s used for Filesharing Media streaming Telephony (skype) Discussion forums Used to distribute
  • A Torrent of Copyright Infringement? Liability for Bittorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law

    A Torrent of Copyright Infringement? Liability for Bittorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law

    A Torrent of Copyright Infringement? Liability for BitTorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law Allen Mendelsohn Faculty of Law McGill University Montreal August 2010 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Master of Laws (LL.M.) © Allen Mendelsohn 2010 ABSTRACT [Le résumé français suit l'anglais.] BitTorrent has become the primary means to share large files (movies, television shows, and music) over the internet. Canadian copyright law and jurisprudence have not kept pace with technology, and as a result there is no definitive pronouncement on the liability for copyright infringement of BitTorrent file- sharers, i.e. users, and file-sharing facilitators, i.e. Internet Service Providers (ISPs) and torrent search engines. Extrapolating from existing law and Canadian and foreign jurisprudence, I conclude that: (i) BitTorrent file-sharers are liable although there may be situations where fair dealing could apply; (ii) it may be possible to show ISPs are liable based on certain findings of fact; and (iii) torrent search engines should not be liable for infringement. There have been three successive attempts to reform copyright law that have addressed internet issues generally and file-sharing in particular. Under the most recent attempt, Bill C-32, file-sharers would be liable under the new ―making available‖ right, and file- sharing facilitators could be liable under the new ―enabling‖ concept of secondary infringement introduced with the bill. RÉSUMÉ BitTorrent est devenu le principal moyen de partager des fichiers volumineux (films, émissions de télévision et musique) sur Internet.
  • GAO-05-634 File Sharing Programs: the Use of Peer-To-Peer Networks

    GAO-05-634 File Sharing Programs: the Use of Peer-To-Peer Networks

    United States Government Accountability Office GAO Report to Congressional Requesters May 2005 FILE SHARING PROGRAMS The Use of Peer-to-Peer Networks to Access Pornography a GAO-05-634 May 2005 FILE SHARING PROGRAMS Accountability Integrity Reliability Highlights The Use of Peer-to-Peer Networks to Highlights of GAO-05-634, a report to Access Pornography congressional requesters Why GAO Did This Study What GAO Found Peer-to-peer (P2P) file sharing According to three popular file sharing Web sites, 134 P2P programs are programs represent a major change available to the public. Of those programs, Warez, Kazaa, and Morpheus in the way Internet users find and were among the most popular, as of February 2005. exchange information. The increasingly popular P2P programs Pornographic images are easily shared and accessed on the three P2P allow direct communication between computer users who can programs we tested—Warez, Kazaa, and Morpheus. Juveniles continue to be access and share digital music, at risk of inadvertent exposure to pornographic images when using P2P images, and video files. These programs. programs are known for having the functionality to share copyrighted Two of the three P2P programs—Kazaa and Morpheus—provided filters digital music and movies, and they intended to block access to objectionable material, but the effectiveness of are also a conduit for sharing the filters varied. Warez did not provide a filter. The filters provided by pornographic images and videos. Kazaa and Morpheus functioned differently: Kazaa filtered words found in Regarding these uses of P2P titles or metadata (data associated with the files that contain descriptive programs, GAO was asked to, information), while Morpheus required the user to enter the specific words among other things to be filtered.
  • A Measurement Study on the Bittorrent File Distribution System

    A Measurement Study on the Bittorrent File Distribution System

    A Measurement Study on the BitTorrent File Distribution System http://www1.cse.wustl.edu/~jain/cse567-11/ftp/torrent/index.html Zhicheng Yang, [email protected] (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing files with BT clients everyday. In this project, a two factor full factorial design on workloads and BT clients was proposed to test which effect is significant for BT downloading. The first part presents the background knowledge of Peer-to-peer(P2P) and BT and the introduction of several popular BT clients. Next, a two factor full factorial design was shown. The result indicated that "torrent" was the primary significant factor, while "BT client" was the secondary factor. Also, there was another experiment on out-of-date torrents to test which BT client was successful to download them with few seeder and peers. The result indicated the BT client "µTorrent" was strongest in this task. Keywords: Measurement Study, Peer-to-peer, Experimental Design, BitTorrent, BitTorrent Client, Torrent 1. Introduction 1.1 P2P 1.2 BT 2. BT Clients 2.1. µTorrent 2.2. BitComet 2.3. Vuze 2.4. FlashGet 2.5. BitLord 3. Workloads and Metric 4. Experimental Design 4.1. The Two Factor Full Factorial Design 4.1.1. Data Processing 4.1.2. Computation of Effects 4.1.3. Analysis of Variance(ANOVA) 4.1.4. Visual Tests 4.1.5. Memory Usage 4.2. Experiment on the Out-of-date Torrents 5. Summary 5.1.
  • Examples of Bittorrent Programs

    Examples of Bittorrent Programs

    Examples of BitTorrent Programs You don’t have to delete them from your device but you must make sure the program is completely turned off while connected to the Housing or University Wi-Fi BitComet: Vuze: uTorrent: qBittorent: How to Make Sure Your BitTorrent Program is Completely Turned Off Many of the BitTorrent programs can still run in your device’s operating system background even if the program is not opened. Even if you are not actively downloading or uploading files using your BitTorrent program it can still generate small amounts of BitTorrent activity which is detected by our University’s network security system, so you will need to make sure your BitTorrent program is completed turned off while you are connected to the Housing or University wireless network. You can check if your BitTorrent program is running in the background by looking at the lower right corner of your computer (example below is from Windows 7) and look for the BitTorrent program’s icon. In the example below, the BitComet icon (an example of a common BitTorrent program) is circled in red below: To confirm the icon’s program name, when you hover the mouse over the icon you can confirm the program name: To completely stop the program from running in the background, right click on the icon and click “Exit”: Notice now the BitComet icon is now gone: When you are at home or another place and desire to run the BitTorrent program (like BitComet in this example), you can open it from the Program Files menu.