منابع مشابه
Peeking through the BitTorrent Seedbox Hosting Ecosystem
In this paper, we propose a lightweight method for detecting and classifying BitTorrent content providers with a minimal amount of resources. While heavy methodologies are typically used (which require long term observation and data exchange with peers of the swarm and/or a semantic analysis of torrent websites), we instead argue that such complexity can be avoided by analyzing the correlations...
متن کاملAn Ecosystem Unraveling ? Richard
Continued decline of eastern hemlock forests associated with infestations of hemlock woolly adelgid will bring about major ecological changes. The plant species most likely to expand in declining hemlock stands are mainly hardwoods and invasive alien species that will not provide habitat or ecological functions anything like those of eastern hemlock. Defoliation and mortality of hemlock forests...
متن کاملMeasuring BitTorrent Ecosystem: Techniques, Tips and Tricks
BitTorrent is the most successful peer-to-peer application. In the last years the research community has studied the BitTorrent ecosystem by collecting data from real BitTorrent swarms using different measurement techniques. In this paper we present the first survey of these techniques that constitutes a first step in the design of future measurement techniques and tools for analyzing large sca...
متن کاملTorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystem
In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that fake content represents an important portion (35%) of those files shared in BitTorrent and just a few tens of users are responsible for 90% of this content. Furthermore, more than 99% of the analysed fake files are linked to eit...
متن کاملThe BitTorrent Anonymity Marketplace
The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. W...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Parallel and Distributed Systems
سال: 2011
ISSN: 1045-9219
DOI: 10.1109/tpds.2010.123