Approximation algorithms for finding highly connected subgraphs
Approximation algorithms for NP-hard problems
Syntactic clustering of the Web
Selected papers from the sixth international conference on World Wide Web
Algorithms for the Longest Common Subsequence Problem
Journal of the ACM (JACM)
IEEE Internet Computing
PlanetLab: an overlay testbed for broad-coverage services
ACM SIGCOMM Computer Communication Review
Introduction to Data Mining, (First Edition)
Introduction to Data Mining, (First Edition)
Challenges, design and analysis of a large-scale p2p-vod system
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Monitoring the Bittorrent Monitors: A Bird's Eye View
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Observing slow crustal movement in residential user traffic
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Hi-index | 0.00 |
The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find unauthorized distribution of copyrighted work in order to deal with the problem of Internet piracy. On the other hand, P2P users are relying increasingly on blacklists and anonymization methods in order to avoid detection. In this work, we propose a number of techniques to reveal copyright monitors' current approaches and evaluate their effectiveness. We apply these techniques on data we collected from more than 2.75 million BitTorrent swarms containing 71 million IP addresses. We provide strong evidence that certain nodes are indeed copyright monitors, show that monitoring is a world-wide phenomenon, and devise a methodology for generating blacklists for paranoid and conservative P2P users.