Improving Performance and Availability in Peer-To-Peer Content

Total Page:16

File Type:pdf, Size:1020Kb

Improving Performance and Availability in Peer-To-Peer Content PERFORMANCE AND AVAILABILITY INPEER-TO-PEERCONTENTDISTRIBUTIONSYSTEMS: ACASEFORAMULTILATERALINCENTIVEAPPROACH Vom Fachbereich Elektrotechnik und Informationstechnik der Technischen Universität Darmstadt zur Erlangung des akademischen Grades eines Doktor-Ingenieurs (Dr.-Ing.) genehmigte Dissertation von dipl.-inform. sebastian kaune Geboren am 14. November 1979 in Darmstadt, Hessen Vorsitz: Prof. Dr.-Ing. Thomas Hartkopf Referent: Prof. Dr.-Ing. Ralf Steinmetz Korreferent: Prof. Dr.-Ing. Jörg Eberspächer Korreferent: Dr. Andreas Mauthe Tag der Einreichung: 25. November 2010 Tag der Disputation: 10. Februar 2011 Hochschulkennziffer D17 Darmstadt 2011 Dieses Dokument wird bereitgestellt von This document is provided by tuprints, E-Publishing-Service der Technischen Universität Darmstadt. http://tuprints.ulb.tu-darmstadt.de [email protected] Bitte zitieren Sie dieses Dokument als: Please cite this document as: URN: urn:nbn:de:tuda-tuprints-24924 URL: http://tuprints.ulb.tu-darmstadt.de/2492 Die Veröffentlichung steht unter folgender Creative Commons Lizenz: Namensnennung – Keine kommerzielle Nutzung – Keine Bearbeitung 3.0 Deutschland This publication is licensed under the following Creative Commons License: Attribution – Noncommercial – No Derivs 3.0 http://creativecommons.org/licenses/by-nc-nd/3.0/de/ http://creativecommons.org/licenses/by-nc-nd/3.0/ ABSTRACT The peer-to-peer paradigm offers the potential to address many of the challenges related to large-scale content distribution over the Internet (e.g., scalability, costs, etc.). However, currently, many approaches fail to offer the quality of service supported by over- provisioned client-server distribution systems such as RapidShare and YouTube. The reason for this is that peer-to-peer systems must operate under the constraints placed on them by contributing users. Consequently, selfish, strategic, or malicious users often lower the overall system utility. To address this, incentive mechanisms are employed to motivate such users to cooperate with the system (e.g., those that contribute more, receive more in return). Many users, however, observe that popular systems such as BitTorrent (employing tit-for-tat as incentive mechanism), are often ineffective at fulfilling a set of key content distribution requirements, namely performance and availability. The overarching goal of this thesis is therefore to extend existing incentive mechanisms to better fulfil these core requirements. At first, this thesis validates and quantifies these casual observations regarding peer-to-peer performance and content availability. To achieve this we carry out two major measurement studies in the BitTorrent system, the current de-facto standard for peer-to-peer content distribution. To this end we identify widespread performance and availability problems that, through detailed analysis, are attributed to ineffective incentive design. In particular, we find that the current popular approach of ’tit-for-tat’ fails to incite sufficient cooperation amongst users to ensure high performance and content availability. Further analysis shows that this is caused by a lack of incentives for seeding (i.e., the process of remaining as a data source after one has downloaded the entire file). Based on these findings, we subsequently study a set of intuitive solutions to overcome what we call the seeder promotion problem. The purpose of this analysis is to narrow the solution space and to shape a more sophisticated incentive design. In order to achieve this, three abstract cross-torrent incentive approaches are detailed, as well as single-torrent incentive mechanisms. Each of these approaches are then quantitatively analysed through extensive trace-based simulations. These analysis further confirm our finding that bilateral incentive strategies (e.g., tit-for-tat) are insufficient at providing robust incentives for seeders. This is because most users (i) do not meet each other repeatedly and (ii) do not simultaneously require each other’s content. Instead, it is shown that the only way to overcome performance and availability issues is to use multilateral incentive strategies (i.e., to allow users to contribute to one user yet receive reciprocation from another). Finally, we design and evaluate a novel multilateral incentive mechanism, named FairSwarm.KOM. Unlike digital currency systems (in which contribution informa- tion is globally visible) or tit for-tat (where no propagation of credit points occurs), FairSwarm.KOM uses one-hop information of the overlay network to evaluate the cooperativeness of the peers. Through the use of extensive trace-based simulations, it is shown that FairSwarm.KOM improves the download performance of the popular BitTorrent system by more than 86%, while guaranteeing high levels of file availability (>99%). Most importantly, these two properties are achieved without harming the fairness of individual users and with an extremely low overhead. KURZFASSUNG Das Peer-to-Peer (P2P)-Kommunikations-Paradigma bietet neue Möglichkeiten für die Verteilung von digitalen Inhalten über das Internet. Peer-to-Peer bündelt die Ressourcen der Teilnehmer im System und setzt diese effizient ein, um eine Datei an eine große Anzahl von interessierten Nutzern zu verteilen. Damit sind P2P-Systeme inhärent selbst-skalierend: Je mehr Teilnehmer dem System beitreten, desto höher die Anzahl der verfügbaren Ressourcen und desto besser die Verteilungsgeschwindigkeit. Jedoch profitieren nicht nur die Nutzer von P2P-Technologie; die Anbieter digitaler Medien (Content-Provider) können gerade durch die Nutzung dieser Ressourcen ebenfalls Upload-Kosten durch den Quellserver einsparen. Trotz dieser beachtlichen Vorteile gegenüber traditionellen Client/Server-Ansätzen können bestehende P2P-Inhaltsverteilsysteme, wie zum Beispiel das populäre BitTor- rent-System, bezüglich der Downloadgeschwindigkeit und der Langzeitverfügbarkeit von Inhalten oftmals nicht mit ressourcenstarken Client/Server-Farmen wie Rapid- Share oder YouTube konkurrieren. Dies ist insbesondere darauf zurückzuführen, dass die Leistungsfähigkeit eines Peer-to-Peer-Systems einzig und allein auf der Kooperati- onsbereitschaft der teilnehmenden Nutzer beruht. Jedoch neigen gerade die Endnutzer dazu, ihre Ressourcenbereitstellung bis auf ein Minimum zu reduzieren, solange kein Anreiz zur Kooperation besteht. Angesichts dieses Dilemma und der häufig zu beo- bachtenden Effizienzprobleme von P2P-Inhaltsverteilsystemen, ist daher zu vermuten, dass existierende Anreizmechanismen zur Erhöhung von Kooperation, wie z. B. der vorwiegend eingesetzte „Tit-for-Tat“-Mechanismus in BitTorrent, ihre Rolle gänzlich verfehlen. Genau an diesem Punkt setzt die vorliegende Dissertation an; dem Entwurf und der Konzeptionierung eines neuartigen Anreizmechanismus zur Förderung von nachhaltiger Kooperation, der sowohl höhere Downloadgeschwindigkeiten erzielen soll, als auch die Langzeitverfügbarkeit von Inhalten in P2P-Systemen verbessert. Um die Korrektheit der oben genannten Schlussfolgerungen wissenschaftlich zu untermauern, beschäftigt sich diese Arbeit zunächst mit der Validierung, Quantifi- zierung und Ursachenanalyse bestehender Effizienzprobleme in P2P-Inhaltsverteil- systemen. In diesem Kontext werden zwei Messstudien im populären BitTorrent- System durchgeführt, das den gegenwärtigen de-facto-Standard für moderne P2P- Inhaltsverteilung repräsentiert. Hierbei wird gezeigt, dass P2P-Systeme sowohl von gravierenden Geschwindigkeits- als auch Verfügbarkeitsproblemen betroffen sind. Durch die Messdatenanalyse kann des Weiteren belegt werden, dass diese Effizienzpro- bleme auf falsch gesetzte Anreize zur Kooperation zurückzuführen sind. Genauer betrachtet schafft es der Tit-for-Tat-Mechanismus nicht, Nutzern Anreize zur Koope- ration zu geben, wenn diese ihren Dateidownload beendet haben. Jedoch sind genau diese Datenquellen, die so genannten „Seeder“, ausschlaggebend für die Downloadge- schwindigkeit und Verfügbarkeit von Inhalten in P2P-Systemen. Basierend auf diesen Erkenntnissen wird anschließend eine eingehende Analyse von möglichen Lösungsansätzen zur Schaffung von Anreizen für Seeder durchgeführt. In Folge dessen wird der mögliche Lösungsraum weiter eingegrenzt und es können grund- legende Lösungsanforderungen ermittelt werden. In diesem Zusammenhang werden sowohl drei „Torrent“-übergreifende Lösungsansätze als auch „Single-Torrent“-basierte Ansätze durch messdatengestützte Simulationen quantitativ untersucht. Hierbei be- stätigt sich, dass bilaterale Anreizstrategien (wie z. B. Tit-for-Tat) gänzlich ungeeignet sind, um nachhaltige Kooperationen in P2P-Systemen zu fördern. Dies ist dadurch begründet, dass Nutzer sich oftmals nur einmal im P2P-System begegnen und keine Tauschgrundlage bezüglich bereits heruntergeladener Inhalte besitzen. Stattdessen kann aufgezeigt werden, dass ausschließlich multilaterale Anreizmechanismen das Potenzial aufweisen, langanhaltende Anreize für Seeder zu schaffen, und somit der Schlüssel zur Lösung der oben beschriebenen Effizienzprobleme sind. Mithilfe eines multilateralen Anreizmechanismus kann ein Nutzer beispielsweise Daten zu einem beliebigen Teilnehmer im System transferieren, um diese Kooperation dann von einem beliebigen Dritten (zu einem späteren Zeitpunkt) zurückzufordern. Anhand der ermittelten Anforderungen für eine konkrete Lösung beschäftigt sich der letzte Teil dieser Arbeit mit dem Entwurf und der Konzeptionierung eines neuartigen Anreizmechanismus namens „FairSwarm.KOM“. Im Gegensatz zu bestehenden Tit-for- Tat-Mechanismen,
Recommended publications
  • From Sony to SOPA: the Technology-Content Divide
    From Sony to SOPA: The Technology-Content Divide The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem, From Sony to SOPA: The Technology-Content Divide, Harvard Law School Case Studies (2013). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11029496 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP http://casestudies.law.harvard.edu By John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem February 23, 2013 From Sony to SOPA: The Technology-Content Divide Background Note Copyright © 2013 Harvard University. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means – electronic, mechanical, photocopying, recording, or otherwise – without permission. "There was a time when lawyers were on one side or the other of the technology content divide. Now, the issues are increasingly less black-and-white and more shades of gray. You have competing issues for which good lawyers provide insights on either side." — Laurence Pulgram, partner, Fenwick & Westi Since the invention of the printing press, there has been tension between copyright holders, who seek control over and monetary gain from their creations, and technology builders, who want to invent without worrying how others might use that invention to infringe copyrights.
    [Show full text]
  • United States Court of Appeals for the Ninth Circuit
    Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 1 of 114 Docket No. 10-55946 In the United States Court of Appeals for the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson PETITION FOR PANEL REHEARING AND REHEARING EN BANC BY APPELLANTS GARY FUNG AND ISOHUNT WEB TECHNOLOGIES, INC. IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 2 of 114 TABLE OF CONTENTS page Index of Authorities ..….....….....….....….....….....….....….....….....…....…... ii I. The Panel Decision Applies Erroneous Legal Standards to Find ..…... 1 Fung Liable on Disputed Facts and to Deny Him a Trial by Jury II. The Panel Decision and the District Court Opinion Combine to ……... 5 Punish Speech that Should Be Protected by the First Amendment III. The Panel Decision Expands the Grokster Rule in Multiple Ways ….. 7 that Threaten the Future of Technological Innovation A. The “Technological Background” set forth in the Panel ……….
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Vysoke´Ucˇenítechnicke´V Brneˇ
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Digital library of Brno University of Technology VYSOKE´ UCˇ ENI´ TECHNICKE´ V BRNEˇ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMACˇ NI´CH TECHNOLOGII´ U´ STAV POCˇ ´ITACˇ OVY´ CH SYSTE´ MU˚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF COMPUTER SYSTEMS DETEKCE DYNAMICKY´ CH SI´TˇOVY´ CH APLIKACI´ DIPLOMOVA´ PRA´ CE MASTER’S THESIS AUTOR PRA´ CE Bc. PAVEL BURIA´ N AUTHOR BRNO 2013 VYSOKE´ UCˇ ENI´ TECHNICKE´ V BRNEˇ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMACˇ NI´CH TECHNOLOGII´ U´ STAV POCˇ ´ITACˇ OVY´ CH SYSTE´ MU˚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF COMPUTER SYSTEMS DETEKCE DYNAMICKY´ CH SI´TˇOVY´ CH APLIKACI´ DETECTION OF DYNAMIC NETWORK APPLICATIONS DIPLOMOVA´ PRA´ CE MASTER’S THESIS AUTOR PRA´ CE Bc. PAVEL BURIA´ N AUTHOR VEDOUCI´ PRA´ CE Ing. JAN KASˇ TIL SUPERVISOR BRNO 2013 Abstrakt Tato práce se zabývá detekcí dynamických síťových aplikací. Popisuje některé stávající protokoly a zpùsoby jejich identifikace z IP tokù a obsahu paketù. Pøedstavuje návrh de- tekčního systému, založeného na automatické tvorbě regulárních výrazů a popisuje jeho implementaci. Prezentuje vytvoøené regulární výrazy pro BitTorrent a eDonkey protokol. Jejich kvalitu srovnává s řešením L7-filteru. Abstract This thesis deals with detection of dynamic network applications. It describes some of the existing protocols and methods of their identification from IP flow and packet contents. It constitues a design of a detection system based on the automatic creation of regular expressions and describes its implementation. It presents the created regular expressions for BitTorrent and eDonkey protocol. It compares their quality with the solution of L7-filter.
    [Show full text]
  • International Intellectual Property Alliance®
    I NTERNATIONAL I NTELLECTUAL P ROPERTY A LLIANCE® 1818 N STREET, NW, 8TH FLOOR · WASHINGTON, DC 20036 · TEL (202) 355-7924 · FAX (202) 355-7899 · WWW.IIPA.COM · EMAIL: [email protected] September 14, 2012 Filed via www.regulations.gov, Docket No. USTR–2012–0011 Stanford K. McCoy, Esq. Assistant U.S. Trade Representative for Intellectual Property and Innovation Office of the U.S. Trade Representative Washington, DC 20508 Re: IIPA Written Submission Re: 2012 Special 301 Out-of-Cycle Review of Notorious Markets: Request for Public Comments, 77 Fed. Reg. 48583 (August 14, 2012) Dear Mr. McCoy: In response to the August 14, 2012 Federal Register notice referenced above, the International Intellectual Property Alliance (IIPA)1 provides the Special 301 Subcommittee with the following written comments to provide examples of Internet and physical “notorious markets” – those “where counterfeit or pirated products are prevalent to such a degree that the market exemplifies the problem of marketplaces that deal in infringing goods and help sustain global piracy and counterfeiting.” We hope our filing will assist the Office of the United States Trade Representative (USTR) in “identifying potential Internet and physical notorious markets that exist outside the United States and that may be included in the 2012 Notorious Markets List.” We express appreciation to USTR for publishing a notorious markets list as an “Out of Cycle Review” separately from the annual Special 301 Report. This list has successfully identified key online and physical marketplaces that are involved in intellectual property rights infringements, and has led to some positive developments. These include closures of some Internet websites whose businesses were built on illegal conduct, greater cooperation from some previously identified “notorious” and other suspect sites, and the facilitation of licensing agreements for legitimate distribution of creative materials.
    [Show full text]
  • Mobile Peer Model a Mobile Peer-To-Peer Communication and Coordination Framework - with Focus on Scalability and Security
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Mobile Peer Model A mobile peer-to-peer communication and coordination framework - with focus on scalability and security DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Software Engineering & Internet Computing eingereicht von Jörg Schoba, BSc Matrikelnummer 01026309 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Eva Kühn Mitwirkung: Projektass. Dipl.-Ing. Stefan Craß Wien, 10. Oktober 2017 Jörg Schoba Eva Kühn Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Mobile Peer Model A mobile peer-to-peer communication and coordination framework - with focus on scalability and security DIPLOMA THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Software Engineering & Internet Computing by Jörg Schoba, BSc Registration Number 01026309 to the Faculty of Informatics at the TU Wien Advisor: Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Eva Kühn Assistance: Projektass. Dipl.-Ing. Stefan Craß Vienna, 10th October, 2017 Jörg Schoba Eva Kühn Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Jörg Schoba, BSc Donaufelderstraße 8/1/12 1210 Wien Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwen- deten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe.
    [Show full text]
  • Piratebrowser Artifacts
    PirateBrowser Artifacts Written by Chris Antonovich Researched by Olivia Hatalsky 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu Published Date Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................................. 2 Background: ........................................................................................................................................................................ 2 Purpose and Scope: ............................................................................................................................................................
    [Show full text]
  • List of Search Engines
    A blog network is a group of blogs that are connected to each other in a network. A blog network can either be a group of loosely connected blogs, or a group of blogs that are owned by the same company. The purpose of such a network is usually to promote the other blogs in the same network and therefore increase the advertising revenue generated from online advertising on the blogs.[1] List of search engines From Wikipedia, the free encyclopedia For knowing popular web search engines see, see Most popular Internet search engines. This is a list of search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. Contents 1 By content/topic o 1.1 General o 1.2 P2P search engines o 1.3 Metasearch engines o 1.4 Geographically limited scope o 1.5 Semantic o 1.6 Accountancy o 1.7 Business o 1.8 Computers o 1.9 Enterprise o 1.10 Fashion o 1.11 Food/Recipes o 1.12 Genealogy o 1.13 Mobile/Handheld o 1.14 Job o 1.15 Legal o 1.16 Medical o 1.17 News o 1.18 People o 1.19 Real estate / property o 1.20 Television o 1.21 Video Games 2 By information type o 2.1 Forum o 2.2 Blog o 2.3 Multimedia o 2.4 Source code o 2.5 BitTorrent o 2.6 Email o 2.7 Maps o 2.8 Price o 2.9 Question and answer .
    [Show full text]
  • Searching for Malware in Bittorrent∗
    Searching for Malware in BitTorrent∗ Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of malware. Malware has adapted to many different changing technologies, in- cluding recently-popular P2P systems. While previous work has examined P2P networks and protocols like KaZaA and Gnutella for malware, little has been done so far that examines BitTor- rent. This project explored BitTorrent for the presence of malware, and discovered a significant portion of malware in the downloaded file set. Statistics on torrents infected with malware were gathered and analyzed to find patterns that are helpful in creating basic filtering heuristics. While these heuristics may work in simple cases, several easy ways they can be defeated were found. 1 Introduction Recently, peer-to-peer networks have emerged as a popular paradigm for Internet applications. In fact, a study in 2005 estimated that P2P traffic accounted for around 70% of all traffic on the Internet [2]. P2P technology is finding new applications as it grows, including voice-over-IP systems and streaming video delivery. While P2P has found several different uses, perhaps the most widely-known use is for file sharing. One concern with P2P file sharing is that it can be used to distribute malware (malicious software, such as worms, viruses, and rootkits). On the one hand, users have access to huge amounts of data, while on the other hand, this data can easily be tainted with viruses, worms, and other forms of malware. An important consideration, then, is if the concern about malware in P2P networks is warranted, and if it is, are there ways to protect a computer and minimize the risk of malware infection from P2P networks.
    [Show full text]
  • High Court Judgment Template
    MR. JUSTICE BIRSS 20C Fox v Sky - Popcorn Time Approved Judgment Neutral Citation Number: [2015] EWHC 1082 (Ch) Case No: HC2014 - 002029 IN THE HIGH COURT OF JUSTICE CHANCERY DIVISION Royal Courts of Justice, Rolls Building Fetter Lane, London, EC4A 1NL Date: 28/04/2015 Before: MR JUSTICE BIRSS - - - - - - - - - - - - - - - - - - - - - Between: (1) TWENTIETH CENTURY FOX FILM CORPORATION (2) UNIVERSAL CITY STUDIOS PRODUCTIONS LLP (3) WARNER BROS. ENTERTAINMENT INC. (4) PARAMOUNT PICTURES CORPORATION (5) DISNEY ENTERPRISES, INC (6) COLUMBIA PICTURES INDUSTRIES, INC. (On their own behalf and on behalf of all other companies that are controlled by, controlling of or under common control of the members of the Motion Picture Association of America Inc that are the owners, or exclusive licensees, of the copyright in films and television programmes) Claimants - and - (1) SKY UK LIMITED (2) BRITISH TELECOMMUNICATIONS PLC (3) EE LIMITED (4) TALKTALK TELECOM LIMITED (5) VIRGIN MEDIA LIMITED Defendants - - - - - - - - - - - - - - - - - - - - - Richard Spearman QC (instructed by Wiggin LLP) for the Claimants The defendants did not appear and were not represented Hearing dates: 24th March 2015 - - - - - - - - - - - - - - - - - - - - - Approved Judgment I direct that pursuant to CPR PD 39A para 6.1 no official shorthand note shall be taken of this Judgment and that copies of this version as handed down may be treated as authentic. ............................. MR. JUSTICE BIRSS MR. JUSTICE BIRSS 20C Fox v Sky - Popcorn Time Approved Judgment Mr Justice Birss: 1. The claimants are all members of the Motion Picture Association of America and hold copyright in a large number of films and television programmes. This is an application by those companies for an order under s97A of the Copyright Designs and Patents Act 1988.
    [Show full text]
  • GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business a Report on the Profitability of Ad-Supported Content Theft
    GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business A Report on the Profitability of Ad-Supported Content Theft February 2014 www.digitalcitizensalliance.org/followtheprofit CONTENTS Contents .............................................................................................................................................................i Table of References .....................................................................................................................................ii Figures .........................................................................................................................................................................................ii Tables ...........................................................................................................................................................................................ii About this Report ..........................................................................................................................................1 Executive Summary .................................................................................................................................... 3 Three Key Relevant Growth Trends .................................................................................................... 4 Methodology .................................................................................................................................................. 4 Sites Studied ..........................................................................................................................................................................
    [Show full text]
  • Problems with Bittorrent Litigation in the United States: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System
    Washington University Global Studies Law Review Volume 13 Issue 1 2014 Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System Violeta Solonova Foreman Washington University in St. Louis, School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_globalstudies Part of the Comparative and Foreign Law Commons, and the Intellectual Property Law Commons Recommended Citation Violeta Solonova Foreman, Problems with BitTorrent Litigation in the United states: Personal Jurisdiction, Joinder, Evidentiary Issues, and Why the Dutch Have a Better System, 13 WASH. U. GLOBAL STUD. L. REV. 127 (2014), https://openscholarship.wustl.edu/law_globalstudies/vol13/iss1/8 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Global Studies Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM INTRODUCTION In 2011, 23.76% of global internet traffic involved downloading or uploading pirated content, with BitTorrent accounting for an estimated 17.9% of all internet traffic.1 In the United States alone, 17.53% of internet traffic consists of illegal downloading.2 Despite many crackdowns, illegal downloading websites continue to thrive,3 and their users include some of their most avid opponents.4 Initially the Recording Industry Association of America (the “RIAA”) took it upon itself to prosecute individuals who 1.
    [Show full text]