About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers

Research Article

The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent

Download(Requires a free EAI acccount)
525 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-36883-7_12,
        author={Tom Chothia and Marco Cova and Chris Novakovic and Camilo Toro},
        title={The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent},
        proceedings={Security and Privacy in Communication Networks. 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2013},
        month={2},
        keywords={BitTorrent P2P monitoring copyright enforcement},
        doi={10.1007/978-3-642-36883-7_12}
    }
    
  • Tom Chothia
    Marco Cova
    Chris Novakovic
    Camilo Toro
    Year: 2013
    The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-36883-7_12
Tom Chothia1, Marco Cova1, Chris Novakovic1, Camilo Toro1
  • 1: University of Birmingham

Abstract

It is known that BitTorrent file-sharing traffic is analysed to identify exchangers of copyrighted material. In general, copyright holders can perform monitoring using two approaches: , where indirect clues of the sharing activity of a peer are considered (e.g., its presence in the peer list of a tracker), and , which establishes connections with peers to estimate their participation in sharing activity. Previous research has focused exclusively on indirect monitoring. We provide a broader characterisation of the monitoring of BitTorrent activity by considering both indirect and direct monitoring. In particular, we review previous work on indirect monitoring, provide features to detect peers engaged in such monitoring, and apply them to identify a number of monitoring organisations. Additionally, we introduce features that detect direct monitors, and provide the first ever measurements of direct monitoring, showing that it is now occurring.

Keywords
BitTorrent P2P monitoring copyright enforcement
Published
2013-02-15
http://dx.doi.org/10.1007/978-3-642-36883-7_12
Copyright © 2012–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL