Proceedings of the 6th ACM Conference on Electronic Commerce 2005
DOI: 10.1145/1064009.1064017
|View full text |Cite
|
Sign up to set email alerts
|

Content availability, pollution and poisoning in file sharing peer-to-peer networks

Abstract: Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular technique consists in "poisoning" a specific item (movie, song, or software title) by injecting a massive number of decoys into the peer-to-peer network, to reduce the availability of the targeted item. In addition to poisoning, pollution, that is, the accidental injection of unusable copies of files in the network, also decreases conte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
87
0
3

Year Published

2006
2006
2013
2013

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 149 publications
(93 citation statements)
references
References 24 publications
1
87
0
3
Order By: Relevance
“…In the context of DRM protection, Vernik (2009) and Sinha, Machado, and Sellman (2010) argue that the presence of DRM may increase piracy by reducing the usability of the purchased files, causing consumers who otherwise would have purchased to pirate instead. In the context of degrading the performance of file-sharing networks, Christin et al (2005) study the impact of several different "poisoning" strategies on four popular peer-to-peer file sharing networks and find that the injection of a few replicated decoys can strategically manipulate users' perception of content availability in the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the context of DRM protection, Vernik (2009) and Sinha, Machado, and Sellman (2010) argue that the presence of DRM may increase piracy by reducing the usability of the purchased files, causing consumers who otherwise would have purchased to pirate instead. In the context of degrading the performance of file-sharing networks, Christin et al (2005) study the impact of several different "poisoning" strategies on four popular peer-to-peer file sharing networks and find that the injection of a few replicated decoys can strategically manipulate users' perception of content availability in the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As mentioned in the previous section, this kind of network coding scheme is vulnerable to pollution attacks by malicious nodes [14], [15], and the pollution can quickly spread to other parts of the network if the peer just unwittingly mixes this polluted packet into its outgoing packets. Unlike uncoded systems where the source knows all the blocks being transmitted in the network, and therefore, can sign each one of them, in a coded system, each peer produces "new" packets, and standard digital signature schemes do not apply here.…”
Section: Problem Setupmentioning
confidence: 99%
“…From the torrent files that can be found through the BitTorrent web sites, only the newest ones can be reliably and efficiently obtained from the network; the other files may be incomplete or even non-existent, or the number of peers that offer them can be too small to fill the desired download bandwidth. For non-fresh files, users typically resort to other networks, e.g., KaZaA or eDonkey, where locating files is easier, and old information can be more easily made available, at the expense of increased pollution [3].…”
Section: A Brief Description Of Bittorrentmentioning
confidence: 99%