99 research outputs found

    Methodology and implementation for tracking the file sharers using BitTorrent

    Get PDF

    An FPGA-Based System for Tracking Digital Information Transmitted via Peer-to-Peer Protocols

    Get PDF
    This thesis addresses the problem of identifying and tracking digital information that is shared using peer-to-peer file transfer and Voice over IP (VoIP) protocols. The goal of the research is to develop a system for detecting and tracking the illicit dissemination of sensitive government information using file sharing applications within a target network, and tracking terrorist cells or criminal organizations that are covertly communicating using VoIP applications. A digital forensic tool is developed using an FPGA-based embedded software application. The tool is designed to process file transfers using the BitTorrent peer-to-peer protocol and VoIP phone calls made using the Session Initiation Protocol (SIP). The tool searches a network for selected peer-to-peer control messages using payload analysis and compares the unique identifier of the file being shared or phone number being used against a list of known contraband files or phone numbers. If the identifier is found on the list, the control packet is added to a log file for later forensic analysis. Results show that the FPGA tool processes peer-to-peer packets of interest 92% faster than a software-only configuration and is 99.0% accurate at capturing and processing BitTorrent Handshake messages under a network traffic load of at least 89.6 Mbps. When SIP is added to the system, the probability of intercept for BitTorrent Handshake messages remains at 99.0% and the probability of intercept for SIP control packets is 97.6% under a network traffic load of at least 89.6 Mbps, demonstrating that the tool can be expanded to process additional peer-to-peer protocols with minimal impact on overall performance

    An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols

    Get PDF
    This paper presents a Field Programmable Gate Array (FPGA)-based tool designed to process file transfers using the BitTorrent Peer-to-Peer (P2P) protocol and VoIP phone calls made using the Session Initiation Protocol (SIP). The tool searches selected control messages in real time and compares the unique identifier of the shared file or phone number against a list of known contraband files or phone numbers. Results show the FPGA tool processes P2P packets of interest 92% faster than a software-only configuration and is 97.6% accurate at capturing and processing messages at a traffic load of 89.6 Mbps

    Law, Norms, Piracy and Online Anonymity – Practices of de-identification in the global file sharing community

    Get PDF
    Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through a web-based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), which allowed us to link the survey from the main logo of their site. In 72 hours, we received over 75,000 responses, providing the opportunity to compare use of anonymity services with factors of age, geographical region, file-sharing frequency, etc. Findings Overall, 17.8 per cent of the respondents used a VPN or similar service (free or paid). A core of high-frequency uploaders is more inclined to use VPNs or similar services than the average file sharer. Online anonymity practices in the file-sharing community depend on how legal and social norms correlate (more enforcement means more anonymity). Research limitations/implications The web-based survey was in English and mainly attracted visitors on The Pirate Bay’s web site. This means that it is likely that those who do not have the language skills necessary were excluded from the survey. Practical implications This study adds to the knowledge of online anonymity practices in terms of traceability and identification, and therefore describes some of the conditions for legal enforcement in a digital environment. Social implications This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable. Originality/value The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file-sharing community is therefore likely unique

    Peer-to-peer-based file-sharing beyond the dichotomy of 'downloading is theft' vs. 'information wants to be free': How Swedish file-sharers motivate their action

    Get PDF
    This thesis aims to offer a comprehensive analysis of peer-to-peer based file-sharing by focusing on the discourses about use, agency and motivation involved, and how they interrelate with the infrastructural properties of file-sharing. Peer-to-peer-based file-sharing is here defined as the unrestricted duplication of digitised media content between autonomous end nodes on the Internet. It has become an extremely popular pastime, largely involving music, film, games and other media which is copied without the permission of the copyright holders. Due to its illegality, the popular understanding of the phenomenon tends to overstate its conflictual elements, framing it within a legalistic 'copyfight'. This is most markedly manifested in the dichotomised image of file-sharers as 'pirates' allegedly opposed to the entertainment industry. The thesis is an attempt to counter this dichotomy by using a more heterodox synthesis of perspectives, aiming to assimilate the phenomenon's complex intermingling of technological, infrastructural, economic and political factors. The geographic context of this study is Sweden, a country characterised by early broadband penetration and subsequently widespread unrestricted file-sharing, paralleled by a lively and well-informed public debate. This gives geographic specificity and further context to the file sharers' own justificatory discourses, serving to highlight and problematise some principal assumptions about the phenomenon. The thesis thus serves as a geographically contained case study which will have analytical implications outside of its immediate local context, and as an inquiry into two aspects of file-sharer argumentation: the ontological understandings of digital technology and the notion of agency. These, in turn, relate to particular forms of sociality in late modernity. Although the agencies and normative forces involved are innumerable, controversies about agency tend to order themselves in a more comprehensive way, as they are appropriated discursively. The invocation to agency that is found in the justificatory discourses - both in the public debate and among individual respondents - thus allows for a more productive and critically attentive understanding of the phenomenon than previously

    The Piratical Ethos: Textual Activity and Intellectual Property in Digital Environments

    Get PDF
    The Piratical Ethos: Textual Activity and Intellectual Property in Digital Environments examines the definition, function, and application of intellectual property in contexts of electronically mediated social production. With a focus on immaterial production - or the forms of coordinated social activity employed to produce knowledge and information in the networked information economy - this project ultimately aims to demonstrate how current intellectual property paradigms must be rearticulated for an age of digital (re)production. By considering the themes of Piracy , Intellectual Property , and Distributed Social Production this dissertation provides an overview of the current state of peer production and intellectual property in the Humanities and Writing Studies. Next, this project develops and implements a communicational-mediational research methodology to theorize how both discursive and material data lend themselves to a more nuanced understanding of the ways that technologies of communication and coordination effect attitudes toward intellectual property. After establishing both a methodology and an interdisciplinary grounding for the themes of the work, this dissertation presents a grounded theoretic analysis of piratical discourse to reveal what I call the piratical ethos , or the guiding attitudes of individuals actively contesting intellectual property in piratical acts of distributed social production. Congruently, this work also investigates the material dynamics of piratical activity by analyzing the cultural-historical activity systems wherein piratical subjectivity emerges, emphasizing the agenic capacity of interfacial technologies at the scales of user and system. Exploring the attitudes of piratical subjects and the technological genres that mediate piratical activity, I contend that the conclusions drawn from The Piratical Ethos can assist Writing Studies researchers with developing novel methodologies to study the intersections of intellectual property and distributed social production in digital worlds
    • …
    corecore