2011
DOI: 10.1007/978-3-642-19260-9_13
|View full text |Cite
|
Sign up to set email alerts
|

Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors

Abstract: Abstract. 1The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find unauthorized distribution of copyrighted work in order to deal with the problem of Internet piracy. On the other hand, P2P users are relying increasingly on blacklists and anonymization methods in order to avoid detection. In this work, we propose a number of techniques to reveal copyright monitors' current approaches and evalu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(10 citation statements)
references
References 9 publications
1
9
0
Order By: Relevance
“…We only disclose the identity of copyright enforcement agencies that have publicly announced that they are monitoring BitTorrent. Following previous work in this area (e.g., [18]), we indicate Autonomous Systems (ASes) that appear to host large numbers of monitors, but we do not disclose individual ranges inside an AS.…”
Section: Ethical Statementmentioning
confidence: 90%
See 4 more Smart Citations
“…We only disclose the identity of copyright enforcement agencies that have publicly announced that they are monitoring BitTorrent. Following previous work in this area (e.g., [18]), we indicate Autonomous Systems (ASes) that appear to host large numbers of monitors, but we do not disclose individual ranges inside an AS.…”
Section: Ethical Statementmentioning
confidence: 90%
“…Potharaju et al [18] offer a blocklist generation technique for BitTorrent based on peers' participation in multiple swarms sharing the same content, arguing that simultaneously downloading multiple copies of the same content is suspicious. The blocklist approach only prevents direct monitoring and it is only effective if reliable techniques exist for identifying monitors.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations