Table
of
Contents
1
.
Introduction
....................................................................................................................................
4
2
.
The
BitTorrent
Protocol
..................................................................................................................
7
2.1
Terminology
...............................................................................................................................
7
3
.
Methodology
...................................................................................................................................
8
3.1
Tracker
Sampling
........................................................................................................................
9
3.2
Scraping
......................................................................................................................................
9
3.3
Median
Calculation
and
Filtering
.............................................................................................
10
3.4
Filename
Determination
..........................................................................................................
10
3.5
Categorisation
..........................................................................................................................
11
3.6
Fake
Detection
.........................................................................................................................
11
3.6.1
Rule
1
–
isoHunt
voting
.....................................................................................................
11
3.6.2
Rule
2
–
Torrentz
voting
....................................................................................................
12
3.6.3
Rule
3
–
Manual
Analysis
..................................................................................................
12
3.7
Infringement
Determination
....................................................................................................
12
4
.
Results
...........................................................................................................................................
13
4.1
Tracker
Selection
......................................................................................................................
13
4.2
Torrent
Scraping
.......................................................................................................................
14
4.3
Median
Calculation
..................................................................................................................
14
4.4
Filename
Determination
..........................................................................................................
14
4.5
Categorisation
..........................................................................................................................
15
4.6
Fake
Detection
.........................................................................................................................
16
4.6.1
Categories
within
the
real
files
.........................................................................................
17
4.6.2
Category
Separated
Fake
Detection
.................................................................................
20
4.7
Copyright
Infringement
............................................................................................................
21
5
.
Criticisms
of
previous
studies
........................................................................................................
23
6
.
Discussion
......................................................................................................................................
25
6.1
Acknowledgements
..................................................................................................................
26
7
.
References
.....................................................................................................................................
27