Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Report August 2011 Final

Report August 2011 Final

Ratings: (0)|Views: 51 |Likes:
Published by TorrentFreak_

More info:

Published by: TorrentFreak_ on Sep 20, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/22/2014

pdf

text

original

 
Dete mininEnhanIntern
 
Infricing
 
Sobert
 
t
 
Co
,
ging
 
CmplinAULaytonmerceniver
 
 
onteng
 
and
 
UST
 
and
 
P
 
Security
 
of 
 
on
 
Bietect011
 
aul
 
A.
 
ty
 
LabBallaraTorreng
 
Faatteratort
 
t
 
Nete
 
Files
 
s
 
(ICSLorks:
 
 
Executive
 
Summary
 
AttheICSL,wehavedevelopedamethodologyforsystematicallyestimatingthetrueextentofillegalfilesharingonpeer‐to‐peer(P2P)networks.PreviousstudieshavefoundthattheoverwhelmingmajorityofBitTorrentusagewasforsharingcopyrightinfringingcontent[1].Wehaveidentifiedaclearpowerlawrelationshipbetweentorrentsanddownloads,meaningthatasmallnumberofverypopulartorrentsaccountforalargerproportionofoveralldownloads.Wealsovalidatedtheresultsbycross‐checkingtherelativeproportionsofcategoriseddownloads(movies,music,softwareetc.)againstkeywordtermsenteredontoapopulartorrentsearchenginesite[2].Multipleversionsofmanyfiles,mostnotablymovies,areavailablefordownloadviaBitTorrent.Furthertothat,therearemillionsoftorrentsonBitTorrentnetworks,releasedunderavarietyofcircumstancesandlegalities.ThefocusofthisreportisonpopularusageofBitTorrent.Welookprimarilyatthetop1000mostdownloadedandtop1000mostactivelyseededtorrents.Toremovetheeffectofoutliersandpotentiallybiasednumbers,weremoveanytorrentsnotoccurringonatleastthreetrackerswescrapedandusethemedianvalueinourcalculations.Wefurthervalidateourfindingsbyrandomlysamplingfromalltorrentscollected.Inthisreport,wefurtherrefineandextendthemethodologybyintroducingasecondsamplingtechniqueforidentifyingpopularandavailabletrackers,andforidentifying“fake”fileswhicharebeingshared.Insomecases,usersmaysearchforandattempttodownloadinfringingcontentandthedownloadedfileisafake,potentiallycontainingmalware.Wefactoredthisintothefindingsandfoundalargenumberofpopulartorrentsappeartobefaked.Furthertothis,weshowastrongbodyofevidencethatsuggeststhatnearlyallBitTorrentuseisnefariousinnature,eitherfakedfilesorcopyrightinfringing.Thekeyfindingsofthisreportare:
 
50%ofpopulartorrentsappeartobefakedfiles,eithermalwareorincorrectfiles.
 
60%ofpopulartorrentsaremoviebasedcontent.
 
97.9%ofBitTorrentuseinoursamplesisnefariousinnature,eitherfakedfiles,copyrightinfringingorcriminallyinfringing.
 
97.2%ofofthemostpopular“real”torrents(i.e.notfakedfiles)arecopyrightinfringing.
 
Table
 
of 
 
Contents
 
1
 
.
 
Introduction
 
....................................................................................................................................
 
4
 
2
 
.
 
The
 
BitTorrent
 
Protocol
 
..................................................................................................................
 
7
 
2.1
 
Terminology
 
...............................................................................................................................
 
7
 
3
 
.
 
Methodology
 
...................................................................................................................................
 
8
 
3.1
 
Tracker
 
Sampling
 
........................................................................................................................
 
9
 
3.2
 
Scraping
 
......................................................................................................................................
 
9
 
3.3
 
Median
 
Calculation
 
and
 
Filtering
 
.............................................................................................
 
10
 
3.4
 
Filename
 
Determination
 
..........................................................................................................
 
10
 
3.5
 
Categorisation
 
..........................................................................................................................
 
11
 
3.6
 
Fake
 
Detection
 
.........................................................................................................................
 
11
 
3.6.1
 
Rule
 
1
 
 –
 
isoHunt
 
voting
 
.....................................................................................................
 
11
 
3.6.2
 
Rule
 
2
 
 –
 
Torrentz
 
voting
 
....................................................................................................
 
12
 
3.6.3
 
Rule
 
3
 
 –
 
Manual
 
Analysis
 
..................................................................................................
 
12
 
3.7
 
Infringement
 
Determination
 
....................................................................................................
 
12
 
4
 
.
 
Results
 
...........................................................................................................................................
 
13
 
4.1
 
Tracker
 
Selection
 
......................................................................................................................
 
13
 
4.2
 
Torrent
 
Scraping
 
.......................................................................................................................
 
14
 
4.3
 
Median
 
Calculation
 
..................................................................................................................
 
14
 
4.4
 
Filename
 
Determination
 
..........................................................................................................
 
14
 
4.5
 
Categorisation
 
..........................................................................................................................
 
15
 
4.6
 
Fake
 
Detection
 
.........................................................................................................................
 
16
 
4.6.1
 
Categories
 
within
 
the
 
real
 
files
 
.........................................................................................
 
17
 
4.6.2
 
Category
 
Separated
 
Fake
 
Detection
 
.................................................................................
 
20
 
4.7
 
Copyright
 
Infringement
 
............................................................................................................
 
21
 
5
 
.
 
Criticisms
 
of 
 
previous
 
studies
 
........................................................................................................
 
23
 
6
 
.
 
Discussion
 
......................................................................................................................................
 
25
 
6.1
 
Acknowledgements
 
..................................................................................................................
 
26
 
7
 
.
 
References
 
.....................................................................................................................................
 
27
 

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->