Measuring the Bittorrent Ecosystem: Techniques, Tips, and Tricks

Total Page:16

File Type:pdf, Size:1020Kb

Measuring the Bittorrent Ecosystem: Techniques, Tips, and Tricks CUEVAS LAYOUT 8/23/11 9:38 AM Page 144 TOPICS IN NETWORK TESTING Measuring the BitTorrent Ecosystem: Techniques, Tips, and Tricks Michal Kryczka, University Carlos III Madrid and Institute IMDEA Networks Rubén Cuevas, Carmen Guerrero, and Arturo Azcorra, University Carlos III Madrid Angel Cuevas, Institut Telecom, Telecom SudParis ABSTRACT far; however, to the best of the authors’ knowl- edge there is no document that compiles, BitTorrent is the most successful peer-to-peer describes, and classifies these techniques. In this application. In the last years the research com- article we first describe the main aspects and munity has studied the BitTorrent ecosystem by functionality of the complete BitTorrent ecosys- collecting data from real BitTorrent swarms tem. Afterward, we present a survey of the exist- using different measurement techniques. In this ing BitTorrent measurement techniques. Finally, article we present the first survey of these tech- we describe the main challenges these tech- niques that constitutes a first step in the design niques face and possible solutions to them before of future measurement techniques and tools for concluding the article. analyzing large-scale systems. The techniques are classified into macroscopic, microscopic, and IT ORRENT COSYSTEM complementary. Macroscopic techniques allow B T E us to collect aggregated information of torrents BitTorrent [5] is the name used by Brian Cohen and present very high scalability, able to monitor to define the peer-to-peer file sharing protocol up to hundreds of thousands of torrents in short he designed a decade ago. Due to the great suc- periods of time. Microscopic techniques operate cess of this protocol, a complex system was cre- at the peer level and focus on understanding ated around it. In this article we adopt the performance aspects such as the peers’ down- terminology used by Zhang et al. [16] to refer to load rates. They offer higher granularity but do this complex system as the BitTorrent ecosystem. not scale as well as macroscopic techniques. In this section we describe the main players of Finally, complementary techniques utilize recent this ecosystem as well as its functionality. This is extensions to the BitTorrent protocol in order to summarized in Fig. 1. obtain both aggregated and peer-level informa- tion. The article also summarizes the main chal- DESCRIPTION OF lenges faced by the research community to BITTORRENT FUNCTIONAL ELEMENTS accurately measure the BitTorrent ecosystem such as accurately identifying peers and estimat- •A BitTorrent portal is a server into which ing peers’ upload rates. Furthermore, we provide content publishers upload .torrent files and Bit- possible solutions to address the described chal- Torrent clients download those .torrent files. lenges. •A BitTorrent swarm is formed by a set of peers downloading a given content using the Bit- INTRODUCTION Torrent protocol. •A BitTorrent tracker is a server that main- BitTorrent [5] is the most successful peer-to- tains a list of clients forming the BitTorrent peer file sharing application. Indeed, it is respon- swarm associated with given content. Further- sible for a major portion of the Internet traffic more, the tracker is aware of the download share [10] and is used daily by dozens of millions progress of each peer within the swarm. of users. This has attracted the interest of the •A BitTorrent client or peer is an entity that research community, which has thoroughly eval- participates in a BitTorrent swarm by download- uated the performance and demographic aspects ing and/or uploading pieces of the content. Two of BitTorrent. Due to the complexity of the sys- categories of peers may be distinguished: A seed- tem, the most relevant studies have tried to er is a client that has a complete copy of the con- understand different aspects by performing real tent, and thus only uploads pieces to other peers. measurements of BitTorrent swarms in the wild, A leecher is a client that does not have a com- that is, inferring information from real swarms in plete copy of the content, and thus uploads and real time. downloads pieces to and from other peers, Several techniques have been used in order respectively. to measure different aspects of BitTorrent so •A .torrent file is a meta-information file asso- 144 0163-6804/11/$25.00 © 2011 IEEE IEEE Communications Magazine • September 2011 CUEVAS LAYOUT 8/23/11 9:38 AM Page 145 ciated with content shared through BitTorrent. The .torrent file includes the following informa- User connects to tracker using hash tion: content name, file size, number and size of Public bit torrent of the swarm from .torrent file. Tracker identifies swarm and responds the pieces that form the content (named chunks), with random pool of IP’s which torrent infohash (an identifier that uniquely Tracker participate in swarm. identifies the swarm associated to the .torrent file) and IP address(es) of the Tracker(s) man- aging the swarm associated to the file. Swarm UBLISHING ONTENT IN IT ORRENT Seeder Leecher [82%] Leecher [21%] Leecher [0%] P C B T [100%] In order to make available content C in Bit- Torrent, the content publisher creates a .tor- C User connects with rent file associated with . After creating the peers and downloads/ .torrent file, the content publisher uploads it to uploads chunks User User downloads Bit torrent a BitTorrent portal. A detailed analysis of the .torrent file portal BitTorrent content publishing phenomenon connected with content he is can be found at [6]. There are a few BitTorrent interested in. portals such as The Pirate Bay1 indexing mil- lions of torrents and receiving millions of daily Figure 1. BitTorrent Ecosystem basic functionality: i) the BitTorrent client con- visits. These portals are critical for the BitTor- tacts a BitTorrent portal to download the .torrent file associated to the desired rent ecosystem as demonstrated by Zhang et al. content (the .torrent file includes the IP address of the Tracker managing the [16]. They offer detailed information regarding swarm associated to the desired content); ii) the BitTorrent client contacts the each indexed torrent. This information slightly Tracker that provides the IP addresses of a set of peers within the swarm; and varies from one portal to another, but in gen- iii) the BitTorrent client connects to these peers for downloading the content. eral it includes category of the content, num- ber of associated files, size of the whole content in the torrent, complete name of the file, BITTORRENT DELIVERY PROCEDURE uploading date, username who uploaded the torrent, number of seeders and leechers partic- In BitTorrent two peers communicate using the ipating in the torrent swarm (this data is updat- peer wire protocol. Every communication starts ed every few minutes), and a description text with an initial handshake. Just after the handshake giving more detailed information regarding the sequence is completed (and before any other mes- content. Figure 2 shows an example of a tor- sages are sent), the peers exchange bitfields by rent web page from the Pirate Bay portal. using a BITFIELD message. The bitfield indicates Finally, it is worth noting that some of these which chunks of the file a peer has already down- major portals offer a Really Simple Syndica- loaded. Furthermore, every time a peer gets a new tion (RSS) feed to announce new published chunk, it informs its neighbors by using a HAVE torrents. message. Hence, every peer is aware of the chunks each neighbor has at any moment. JOINING A BITTORRENT SWARM AND BitTorrent uses Tit-for-Tat as the incentive DISCOVERING PEERS model for the delivery mechanism; basically, each leecher uploads chunks to those other leechers When a BitTorrent user wants to download a from whom it is downloading more chunks. The given content C, it looks for the .torrent file Choking Algorithm is responsible for providing associated with C in a BitTorrent portal and this behavior. It is a periodical operation where downloads it. The .torrent file can be opened every 10 s a leecher selects (unchokes) n other with any of the existing BitTorrent clients.2 leechers from its neighborhood to upload chunks Upon opening the .torrent file, the BitTorrent to. These n (typically 4) unchoked leechers are client connects to one of the trackers included in those from whom the peer downloaded more this one. A new peer first contacts the tracker chunks during the last 20 s. The rest of the using an announce started request that is neighbors are blocked (choked). In the case of a answered by the tracker with the number of seeder, it unchokes n (typically 4) leechers to seeders and leechers participating in the swarm whom more chunks it uploaded in the last 20 s along with the IP addresses of N (between 40 (i.e., those with higher download rate).4 In addi- 1 This is currently the and 200) randomly selected peers. These N tion to the regular unchoke operation, BitTor- largest BitTorrent portal peers form the initial neighborhood of the new rent implements the optimistic unchoke based on Alexa ranking. node. Furthermore, if a peer’s neighborhood operation. Every 30 s (i.e., every 3 regular size falls below a given threshold (typically 20), it unchoke operations) both leechers and seeders 2 http://en.wikipedia.org/ again sends an announce started request to the randomly select one choked neighbor to upload wiki/Comparison_of_ tracker in order to get new neighbors. Finally, chunks to. Finally, when a leecher is unchoked BitTorrent_clients when a peer leaves the swarm, it sends an by a neighbor, it applies the Rarest First Policy in announce stopped request to the tracker that order to choose which chunk to request of this 3 http://www.openbittor- removes this peer from the list of participants in neighbor.
Recommended publications
  • New York University Annual Survey of American Law New York of American Law University Annual Survey
    nys69-2_cv_nys69-2_cv 9/22/2014 8:41 AM Page 2 (trap 04 plate) Vol. 69 No. 2 Vol. New York University Annual Survey of American Law New York University Annual Survey of American Law New York ARTICLES TOWARD ADEQUACY Sarah L. Brinton SHOULD EVIDENCE OF SETTLEMENT NEGOTIATIONS AFFECT ATTORNEYS’ FEES AWARDS? Seth Katsuya Endo A LOOK INSIDE THE BUTLER’S CUPBOARD: HOW THE EXTERNAL WORLD REVEALS INTERNAL STATE OF MIND IN LEGAL NARRATIVES Cathren Koehlert-Page NOTES EXPERTISE AND IMMIGRATION ADMINISTRATION: WHEN DOES CHEVRON APPLY TO BIA INTERPRETATIONS OF THE INA? Paul Chaffin WHAT MOTIVATES ILLEGAL FILE SHARING? EMPIRICAL AND THEORETICAL APPROACHES Joseph M. Eno 2013 Volume 69 Issue 2 2013 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 1 23-OCT-14 9:10 NEW YORK UNIVERSITY ANNUAL SURVEY OF AMERICAN LAW VOLUME 69 ISSUE 2 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 NEW YORK UNIVERSITY SCHOOL OF LAW ARTHUR T. VANDERBILT HALL Washington Square New York City 35568-nys_69-2 Sheet No. 1 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 2 23-OCT-14 9:10 New York University Annual Survey of American Law is in its seventy-first year of publication. L.C. Cat. Card No.: 46-30523 ISSN 0066-4413 All Rights Reserved New York University Annual Survey of American Law is published quarterly at 110 West 3rd Street, New York, New York 10012.
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Multi-Core Architecture for Anonymous Internet Streaming
    Multi-core architecture for anonymous Internet streaming Quinten Stokkink Multi-core architecture for anonymous Internet streaming Master’s Thesis in Computer Science Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Quinten Stokkink 3rd March 2017 Author Quinten Stokkink Title Multi-core architecture for anonymous Internet streaming MSc presentation 15th March 2017 Graduation Committee Graduation professor: Prof. dr. ir. D. H. J. Epema Delft University of Technology Supervisor: Dr. ir. J. A. Pouwelse Delft University of Technology Committee member: Dr. Z. Erkin Delft University of Technology Abstract There are two key components for high throughput distributed anonymizing ap- plications. The first key component is overhead due to message complexity of the utilized algorithms. The second key component is an nonscalable architecture to deal with this high throughput. These issues are compounded by the need for an- onymization. Using a state of the art serialization technology has been shown to increase performance, in terms of CPU utilization, by 65%. This is due to the com- pression (byte stuffing) used by this technology. It also decreased lines of code in the Tribler project by roughly 2000 lines. Single-core architectures are shown to be optimizable by performing a minimum s,t-cut on the data flows within the original architecture: between the entry point and the most costly CPU-utilizing compon- ent as derived from profiling the application. This method is used on the Tribler technology to create a multi-core architecture. The resulting architecture is shown to be significantly more efficient in terms of consumed CPU for the delivered file download speed.
    [Show full text]
  • Credits in Bittorrent: Designing Prospecting and Investments Functions
    Credits in BitTorrent: designing prospecting and investments functions Ardhi Putra Pratama Hartono Credits in BitTorrent: designing prospecting and investment functions Master’s Thesis in Computer Science Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Ardhi Putra Pratama Hartono March 17, 2017 Author Ardhi Putra Pratama Hartono Title Credits in BitTorrent: designing prospecting and investment functions MSc presentation Snijderzaal, LB01.010 EEMCS, Delft 16:00 - 17:30, March 24, 2017 Graduation Committee Prof. Dr. Ir. J.A. Pouwelse (supervisor) Delft University of Technology Prof. Dr. Ir. S. Hamdioui Delft University of Technology Dr. Ir. C. Hauff Delft University of Technology Abstract One of the cause of slow download speed in the BitTorrent community is the existence of freeriders. The credit system, as one of the most widely implemented incentive mechanisms, is designed to tackle this issue. However, in some cases, gaining credit efficiently is difficult. Moreover, the supply and demand misalign- ment in swarms can result in performance deficiency. As an answer to this issue, we introduce a credit mining system, an autonomous system to download pieces from selected swarms in order to gain a high upload ratio. Our main work is to develop a credit mining system. Specifically, we focused on an algorithm to invest the credit in swarms. This is composed of two stages: prospecting and mining. In prospecting, swarm information is extensively col- lected and then filtered. In mining, swarms are sorted by their potential and then selected. We also propose a scoring policy as a method to quantify swarms with a numerical score.
    [Show full text]
  • Master's Thesis
    MASTER'S THESIS Analysis of UDP-based Reliable Transport using Network Emulation Andreas Vernersson 2015 Master of Science in Engineering Technology Computer Science and Engineering Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The TCP protocol is the foundation of the Internet of yesterday and today. In most cases it simply works and is both robust and versatile. However, in recent years there has been a renewed interest in building new reliable transport protocols based on UDP to handle certain problems and situations better, such as head-of-line blocking and IP address changes. The first part of the thesis starts with a study of a few existing reliable UDP-based transport protocols, SCTP which can also be used natively on IP, QUIC and uTP, to see what they can offer and how they work, in terms of features and underlying mechanisms. The second part consists of performance and congestion tests of QUIC and uTP imple- mentations. The emulation framework Mininet was used to perform these tests using controllable network properties. While easy to get started with, a number of issues were found in Mininet that had to be resolved to improve the accuracy of emulation. The tests of QUIC have shown performance improvements since a similar test in 2013 by Connectify, while new tests have identified specific areas that might require further analysis such as QUIC’s fairness to TCP and performance impact of delay jitter. The tests of two different uTP implementations have shown that they are very similar, but also a few differences such as slow-start growth and back-off handling.
    [Show full text]
  • Economics of P2P File- Sharing Systems
    Economics of P2P file- sharing systems Basic introduction to the (sociology and) economics of file-sharing in BitTorrent systems name: David Hales, Tribler team, TUD date: Oct. 21, 2008 event: PetaMedia workshop Talk Overview • Basic introduction to: • P2P systems • Overlay networks • Gossip • Tribler.org client • Basic introduction to: • BitTorrent file sharing protocol • Game theory / strategy / Tit-for-tat • Future directions in Tribler If you are interested you can look-up the terms given in red italics on Wikipedia for good introductions What are Peer-to-Peer systems? • All nodes both clients and servers • Multiple connections between nodes • Notion of “equality” Client / Server hence “peers” • Pure P2P = Zero server • It is about power not just as technology Peer-to-Peer What is an “overlay network” • Most P2P networks are logical not physical • Use an overlay network • Assume an existing physical network that can connect all peers (usually the internet) • Store the logical addresses (IP’s) of their “neighbours” or “view” onto the network • Overlays are often self-repairing, robust to “churn” and light-weight • Given their logical nature overlays can support arbitrary and dynamic topologies • Structured and Unstructured overlays Tribler Overlay and MegaCache • Tribler is a (BitTorrent) file sharing client • Implements gossip based semi-random overlay network (using BuddyCast protocol) • Gossip protocols pair random nodes in the overlay and let them exchange information • Tribler clients swap information (meta-data) and store it
    [Show full text]
  • A Week in the Life of the Most Popular Bittorrent Swarms
    A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University College Dublin, Belfield, Dublin 4, Ireland {mark.scanlon, alan.hannaway, tahar.kechadi}@ucd.ie AbstractThe popularity of peer-to-peer (P2P) file distribution is c material, which typically commences with a single source sharing large sized files to many downloaders. networks lend themselves well to the unauthorised distribution of To commence the download of the content in a particular copyrighted material due to their ease of use, the abundance of - material available and the apparent anonymity awarded to the downloaders. This paper presents the results of an investigation loaded from an indexing website. This file is then opened conducted on the top 100 most popular BitTorrent swarms over using a BitTorrent client, which proceeds to connect to several the course of one week. The purpose of this investigation is to members of the swarm and download the content. Each quantify the scale of unauthorised distribution of copyrighted BitTorrent swarm is built around a particular piece of content material through the use of the BitTorrent protocol. Each IP which is determined through a unique identifier based on a address, which was discovered over the period of the weeklong SHA-1 hash of the file information contained in this UTF- 8 investigation, is mapped through the use of a geolocation encoded metadata file, e.g., name, piece length, piece hash database, which results in the ability to determine where the values, length and path.
    [Show full text]
  • 1 Tribler 3 1.1 Obtaining the Latest Release
    Tribler Documentation Release 7.5.0 Tribler devs Jan 29, 2021 CONTENTS 1 Tribler 3 1.1 Obtaining the latest release........................................3 1.2 Obtaining support............................................3 1.3 Contributing...............................................3 1.4 Packaging Tribler.............................................4 1.5 Submodule notes.............................................4 2 How to contribute to the Tribler project?5 2.1 Checking out the Stabilization Branch..................................5 2.2 Reporting bugs..............................................5 2.3 Pull requests...............................................6 3 Branching model and development methodology7 3.1 Branching model.............................................7 3.2 Release lifecycle.............................................7 3.3 Tags....................................................8 3.4 Setting up the local repo.........................................8 3.5 Working on new features or fixes....................................8 3.6 Getting your changes merged upstream.................................9 3.7 Misc guidelines.............................................. 10 4 Setting up your development environment 11 4.1 Windows................................................. 11 4.2 MacOS.................................................. 13 4.3 Linux................................................... 15 5 Building Tribler 17 5.1 Windows................................................. 17 5.2 MacOS.................................................
    [Show full text]
  • Researchers Make Bittorrent Anonymous and Impossible to Shut Down (Updated) by Ernesto on December 18, 2014 C: 350
    RESEARCHERS MAKE BITTORRENT ANONYMOUS AND IMPOSSIBLE TO SHUT DOWN (UPDATED) BY ERNESTO ON DECEMBER 18, 2014 C: 350 While the BitTorrent ecosystem is filled with uncertainty and doubt, researchers at Delft University of Technology have released the first version of their anonymous and decentralized BitTorrent network. "Tribler makes BitTorrent anonymous and impossible to shut down," lead researcher Prof. Pouwelse says. The Pirate Bay shutdown has once again shows how vulnerable the BitTorrent ‘landscape’ is to disruptions. With a single raid the largest torrent site on the Internet was pulled offline, dragging down several other popular BitTorrent services with it. A team of researchers at Delft University of Technology has found a way to address this problem. With Tribler they’ve developed a robust BitTorrent client that doesn’t rely on central servers. Instead, it’s designed to keep BitTorrent alive, even when all torrent search engines, indexes and trackers are pulled offline. “Tribler makes BitTorrent anonymous and impossible to shut down,” Tribler’s lead researcher Dr. Pouwelse tells TF. “Recent events show that governments do not hesitate to block Twitter, raid websites, confiscate servers and steal domain names. The Tribler team has been working for 10 years to prepare for the age of server-less solutions and aggressive suppressors.” To top that, the most recent version of Tribler that was released today also offers ‘anonymity’ to its users through a custom-built in Tor network. This allows users to share and publish files without broadcasting their IP-addresses to the rest of the world (note: see warning at the bottom of this article).
    [Show full text]
  • Petter Sandvik Formal Modelling for Digital Media Distribution
    Petter Sandvik Formal Modelling for Digital Media Distribution Turku Centre for Computer Science TUCS Dissertations No 206, November 2015 Formal Modelling for Digital Media Distribution Petter Sandvik To be presented, with the permission of the Faculty of Science and Engineering at Åbo Akademi University, for public criticism in Auditorium Gamma on November 13, 2015, at 12 noon. Åbo Akademi University Faculty of Science and Engineering Joukahainengatan 3-5 A, 20520 Åbo, Finland 2015 Supervisors Associate Professor Luigia Petre Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Professor Kaisa Sere Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Reviewers Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom Professor Gheorghe S, tefănescu Computer Science Department University of Bucharest 14 Academiei Str., Bucharest, RO-010014 Romania Opponent Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom ISBN 978-952-12-3294-7 ISSN 1239-1883 To tose who are no longr wit us, and to tose who wil be here afer we are gone i ii Abstract Human beings have always strived to preserve their memories and spread their ideas. In the beginning this was always done through human interpretations, such as telling stories and creating sculptures. Later, technological progress made it possible to create a recording of a phenomenon; first as an analogue recording onto a physical object, and later digitally, as a sequence of bits to be interpreted by a computer.
    [Show full text]
  • Downloaded 2021-10-03T02:24:37Z
    Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title A Week in the Life of the Most Popular BitTorrent Swarms Authors(s) Scanlon, Mark; Hannaway, Alan; Kechadi, Tahar Publication date 2010-06-17 Publication information Goel, S. Proceedings of the 5th Annual Symposium on Information Assurance Academic track of the 13th Annual 2009 NYS Cyber Security Conference, 2010 Conference details The 5th Annual Symposium on Information Assurance (ASIA '10): Academic Track of 13th Annual NYS Cyber Security Conference, Albany, New York, USA, 16 - 17 June 2010 Link to online version http://www.albany.edu/iasymposium/proceedings.2010.shtml Item record/more information http://hdl.handle.net/10197/7379 Downloaded 2021-10-03T02:24:37Z The UCD community has made this article openly available. Please share how this access benefits you. Your story matters! (@ucd_oa) © Some rights reserved. For more information, please see the item record link above. A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University College Dublin, Belfield, Dublin 4, Ireland {mark.scanlon, alan.hannaway, tahar.kechadi}@ucd.ie AbstractThe popularity of peer-to-peer (P2P) file distribution is c material, which typically commences with a single source sharing large sized files to many downloaders. networks lend themselves well to the unauthorised distribution of To commence the download of the content in a particular copyrighted material due to their ease of use, the abundance of - material available and the apparent anonymity awarded to the downloaders.
    [Show full text]