102 research outputs found

    An investigation into darknets and the content available via anonymous peer-to-peer file sharing

    Get PDF
    Media sites, both technical and non-technical, make references to Darknets as havens for clandestine file sharing. They are often given an aura of mystique; where content of any type is just a mouse click away. However, can Darknets really be easily accessed, and do they provide access to material that would otherwise be difficult to obtain? This paper investigates which Darknets are easily discovered, the technical designs and methods used to hide content on the networks, the tools needed to join, and ultimately what type and quantities of files can be found on anonymous peer-to-peer file sharing networks. This information was gathered by conducting weekly searches for specific file extensions on each Darknet over a 4 week period. It was found that connectivity to Darknets was easy to establish, and installing peer-to-peer file sharing applications was a simple process. The quantity of content found on Darknet peer-to-peer file sharing networks indicates that file sharing is rampant. Of particular concern was what appears to be a large quantity of child pornography made available

    The evolution of P2P networks for file exchange: the interaction between social controversy and technical change

    Get PDF
    Since the irruption of Napster in 1999, Peer-to-Peer computer networks for file exchange have been at the heart of a heated debate that has eventually evolved into a wide social controversy across the world, involving legal, economical, and even political issues. This essay analyzes the effects of this controversy on the technical innovations that have shaped the evolution of those systems. It argues that the usual image of a single two-sided conflict does not account for most of the technical changes involved. P2P entrepreneurs and creators show a wide range of motivations and business strategies -if any- and users are not a monolithic group with a common set of goals and values. As a result, the actual historical evolution of those networks does not follow a simple linear path but a more complex and multidirectional development

    The Darknet: A Digital Copyright Revolution

    Get PDF
    We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the public’s great equalizing force in the digital millennium, because it will serve as “a counterbalancing force and bulwark to defend digital liberties” against forces lobbying for stronger copyrights and increased technological controls

    Pirates and Samaritans: A Decade of Measurements on Peer Production and their Implications for Net Neutrality and Copyright

    Get PDF
    This study traces the evolution of commons-based peer production by a measurementbased analysis of case studies and disusses the impact of peer production on net neutrality and copyright law. The measurements include websites such asSuprnova. org, Youtube.com, and Facebook.com, and the Peer-to-Peer (P2P) systems Kazaa, Bittorrent, and Tribler. The measurements show the two sides of peer production, the pirate side with free availability of Hollywood movies on these P2P systems and the samaritan side exhibited by the quick joining of 400,000+ people in a community to organize protests against events in Burma. The telecommunications and content industry are disrupted by this way of peer production. As a consequence, revenues of both industries are likely to suffer in the coming years. On the other hand, innovative P2P systems could win the battle on merit over classical distribution technologies. As a result, a continuation is expected of both legal actions against P2P and possible blocking actions of P2P traffic, violating net neutrality. It is argued that this hinders innovation and causes a large discrepancy between legal and user perspectives. A reform of copyright laws are clearly needed, otherwise they will be unenforceable around 2010. Key words: P2P, collaboration, commons-based peer production, copyright

    Performance Evaluation of a Field Programmable Gate Array-Based System for Detecting and Tracking Peer-to-Peer Protocols on a Gigabit Ethernet Network

    Get PDF
    Recent years have seen a massive increase in illegal, suspicious, and malicious traffic traversing government and military computer networks. Some examples include illegal file distribution and disclosure of sensitive information using the BitTorrent file sharing protocol, criminals and terrorists using Voice over Internet Protocol (VoIP) technologies to communicate, and foreign entities exfiltrating sensitive data from government, military, and Department of Defense contractor networks. As a result of these growing threats, the TRacking and Analysis for Peer-to-Peer (TRAPP) system was developed in 2008 to detect BitTorrent and VoIP traffic of interest. The TRAPP system, designed on a Xilinx Virtex-II Pro Field Programmable Gate Array (FPGA) proved valuable and effective in detecting traffic of interest on a 100 Mbps network. Using concepts and technology developed for the TRAPP system, the TRAPP-2 system is developed on a Xilinx ML510 FPGA. The goals of this research are to evaluate the performance of the TRAPP-2 system as a solution to detect and track malicious packets traversing a gigabit Ethernet network. The TRAPP-2 system detects a BitTorrent, Session Initiation Protocol (SIP), or Domain Name System (DNS) packet, extracts the payload, compares the data against a hash list, and if the packet is suspicious, logs the entire packet for future analysis. Results show that the TRAPP-2 system captures 95.56% of BitTorrent, 20.78% of SIP INVITE, 37.11% of SIP BYE, and 91.89% of DNS packets of interest while under a 93.7% network utilization (937 Mbps). For another experiment, the contraband hash list size is increased from 1,000 to 131,072,000 unique items. The experiment reveals that each doubling of the hash list size results in a mean increase of approximately 16 central processing unit cycles. These results demonstrate the TRAPP-2 system’s ability to detect traffic of interest under a saturated network utilization while maintaining large contraband hash lists

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

    Get PDF
    Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practice to trace a significant number of streams originating from secure (i.e., proxied) applications. In this paper, we show that linkability allows us to trace 193% of additional streams, including 27% of HTTP streams possibly originating from "secure" browsers. In particular, we traced 9% of Tor streams carried by our instrumented exit nodes. Using BitTorrent as the insecure application, we design two attacks tracing BitTorrent users on Tor. We run these attacks in the wild for 23 days and reveal 10,000 IP addresses of Tor users. Using these IP addresses, we then profile not only the BitTorrent downloads but also the websites visited per country of origin of Tor users. We show that BitTorrent users on Tor are over-represented in some countries as compared to BitTorrent users outside of Tor. By analyzing the type of content downloaded, we then explain the observed behaviors by the higher concentration of pornographic content downloaded at the scale of a country. Finally, we present results suggesting the existence of an underground BitTorrent ecosystem on Tor

    Enforceability of digital copyright on the darknet?

    Get PDF
    This dissertation seeks to comparatively analyse different emerging jurisprudence of pioneering jurisdictions on the operability of enforcing digital copyright in light of the growing use of the Darknet. It addresses the legal lacuna in the existing copyright laws with regards to enforcement against the illegal distribution of infringing copies of online digital content. It also seeks to illustrate how the concept of digital copyright protection has been compromised by the inoperability of enforcement laws on illegal distribution via the Darknet. It thereby advocates for a 'digital use' exemption and or free access as a recommendation. Although the advancement of technology created new and advanced forms of distribution or availing copyrighted works to the public, these new advanced channels of distribution have been compromised by rogue online clandestine file sharing networks. Digital copyright protection laws have been advanced so as to respond to illegal online file sharing, however, they have had limited impact due to the vast, flexible and unregulated nature of the internet which transcends the territorial nature of any single state's copyright laws. Currently, online file sharing is effected through peer to peer networks due to their operational convenience. This dissertation suggests that the need to control distribution, legally or technological, is driven by the urge to enable digital copyright owners to benefit financially from their works and get a return on their investment. Technologically, this has been effected through the adoption of Digital Rights Management (DRMs) measures that control access to these works through the use of paywalls on commercial websites that require online consumers to pay/ subscribe first before they gain access to the copyrighted works. (eg Netflix, Showmax, itunes e.t.c) However, since absolute control over one's digital works, online, is impossible, the success of these access-control mechanisms remains debatable and remain vulnerable to technologically sophisticated users who could easily circumvent them and make the protected works available to millions of other users in Darknets. This, in effect, creates a parallel and free market for digital content. Darknets have grown as the new preferred channel of distribution due to their unique features which have rendered any judicial or legislative threat of sanctions, merely academic and detached from practical application. The Darknet essentially provides for user privacy, in anonymity, and security from monitoring and detection. These two primary features have exacerbated online piracy as various Darknets ISPs have now developed more user-friendly Darknet versions for the average mainstream user. This dissertation will highlight how the digital creative industry faces an existential threat with the growing use of Darknets. Darknets have created a virtual environment where illegal digital content distribution continues with impunity, since the burden of the enforceability of copyright rests squarely on the individual copyright holder and the pursuit of liability only begins upon detection of any such infringement of copyright. In effect, copyright owners, most often than not, lack the technological expertise to monitor and detect and thereby cannot enforce their copyright. As such, this dissertation postulates that the legal/ technological effort to maintain any form of monopoly over digital content online is an unattainable objective. As a solution, to end both online piracy and safeguarding the financial interests of copyright owners, a change in the approach to digital copyright is needed. This will be achieved through creating a 'digital use' exemption and or free access. Rather than copyright owners trying to control access, they should provide free access and profit on alternative revenue business models. Free access to digital content will do away with the need of online users to pirate and also save copyright owners the effort and resource to keep monitoring the virtual world for infringement. It will also counter-react to the Darknet's parallel market since users will have free access to digital content from the official distribution websites. This dissertation will interrogate the viability of this option

    The Evolution of P2P networks for file exchange: the interaction between social controversy and technical change

    Get PDF
    Since the irruption of Napster in 1999, Peer-to-Peer computer networks for file exchange have been at the heart of a heated debate that has eventually evolved into a wide social controversy across the world, involving legal, economical, and even political issues. This essay analyzes the effects of this controversy on the technical innovations that have shaped the evolution of those systems. It argues that the usual image of a single two-sided conflict does not account for most of the technical changes involved. P2P entrepreneurs and creators show a wide range of motivations and business strategies —if any—and users are not a monolithic group with a common set of goals and values. As a result, the actual historical evolution of those networks does not follow a simple linear path but a more complex and multidirectional development

    Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

    Full text link
    Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data. This paper provides an introduction to network steganography and highlights its potential application for harmful purposes. We discuss the issues related to countering network steganography in practice and provide an outlook on further research directions and problems.Comment: 11 page
    • …
    corecore