The P2P War: Someone Is Monitoring Your Activities!

In an effort to prosecute P2P users, RIAA and MPAA have reportedly started to create decoy users: they participate in P2P networks in order to identify illegal sharing of content. This has reportedly scared some users who are afraid of being caught. The question the authors attempt to answer is how prevalent is this phenomenon: how likely is it that a user will run into such a "Fake User" and thus run the risk of a lawsuit? The first challenge is identifying these "Fake Users". The authors collect this information from a number of free open source software projects which are trying to identify such IP address ranges by forming the so-called blocklists. The second challenge is running a large scale experiment in order to obtain reliable and diverse statistics.

Provided by: University of California Topic: Collaboration Date Added: Jan 2011 Format: PDF

Find By Topic