iTnews
  • Home
  • News
  • Technology
  • Networking

Illegal fire-sharers tapped directly by 'monitors'

By Staff Writers on Sep 5, 2012 4:36PM
Illegal fire-sharers tapped directly by 'monitors'

Four in ten log IP address within three hours.

File sharers that use BitTorrent to illegally download popular content could expect to have their IP address logged by a monitoring agency within three hours of starting a download, according to University of Birmingham researchers.

The researchers presented findings from a 3-year study (pdf) aimed at detecting instances and the frequency of copyright enforcement agencies using direct monitoring techniques to collect "first-hand evidence of a peer's [BitTorrent] activity".

Past research had focused mainly on indirect monitoring, where "enforcement agencies rely on indirect clues that a peer is uploading or downloading some content i.e. by the presence of the peer's IP address in the ... swarm of peers reported by a BitTorrent tracker to be sharing the file".

"Forty percent of the monitors that communicated with our clients made their initial connection within three hours of the client joining the swarm; the slowest monitor took 33 hours to make its first connection," the researchers noted in the study.

"The average time decreases for torrents appearing higher in the Top 100 [torrents], implying that enforcement agencies allocate resources according to the popularity of the content they monitor."

Researchers created software that emulated a BitTorrent file sharing client, and logged all connections made to it.

They initially tried to mask their identity using Tor but excessive dropped connections forced them to redo the research.

"Careful analysis of the logs revealed the presence and behaviour of file-sharing monitors," the researchers said.

The study measured the activity of "1033 swarms across 421 trackers for 36 days over two years, collecting over 150GB of BitTorrent traffic", researchers said, though they noted they were "careful not to upload or download any shared files", avoiding any potentially infringing activity themselves.

It found "massive monitoring of all of the most popular illegal downloads from the Pirate Bay".

Some monitors caught by the study were known. Others hid their identity using third-party hosting firms or were companies that did not publicly acknowledge having BitTorrent tracking operations.

Using third party hosting companies "allowed the monitors to avoid 'block lists',that attempted to stop known monitors from connecting to file sharers", the researchers noted.

The researchers used their results to question whether evidence collected by monitors would be admissible in court proceedings.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
birminghambittorrentfileillegalnetworkingpeerpiratebayresearchsharingswarmtrackeruniversity

Partner Content

How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Staff Writers
Sep 5 2012
4:36PM
0 Comments

Related Articles

  • NSW gov invests $146m in statewide paging network
  • Services Australia extends Hume data centre lease with CDC
  • NAB backs Telstra-TPG network sharing tie-up
  • Australia Post's telco transformation named top IT project
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
The security threat of quantum computing
The security threat of quantum computing
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.