TorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystem
نویسندگان
چکیده
In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that fake content represents an important portion (35%) of those files shared in BitTorrent and just a few tens of users are responsible for 90% of this content. Furthermore, more than 99% of the analysed fake files are linked to either malware or scam websites. This creates a serious threat for the BitTorrent ecosystem. To address this issue, we present a new tool named TorrentGuard for the early detection of fake content. Based on our evaluation this tool may prevent end users from downloading more than 35 millions of fake files per year. This could help to reduce the number of computer infections and scams suffered by BitTorrent users. TorrentGuard is already available and it can be accessed through both a webpage or a Vuze plugin.
منابع مشابه
FakeDetector: A measurement-based tool to get rid out of fake content in your BitTorrent Downloads
Fake content represents an important portion of those files shared in BitTorrent. In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that a few tens of users are responsible for 90% of the fake content. Furthermore, more than 99% of the analysed fake files are linked to either malwar...
متن کاملSearching for Malware in BitTorrent∗
One of the most widely publicized aspects of computer security has been the presence and propagation of malware. Malware has adapted to many different changing technologies, including recently-popular P2P systems. While previous work has examined P2P networks and protocols like KaZaA and Gnutella for malware, little has been done so far that examines BitTorrent. This project explored BitTorrent...
متن کاملInvestigating Cybercrimes that Occur on Documented P2P Networks
The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised di...
متن کامل!" #$%&'%& ()*+,"-,%. ,% /,&0$11'%& 2+&1),"&,3 $1 (1$!&4d1,6'%7 !"#$% &"$'()
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serio...
متن کاملRisk of Sequential Estimator of the Failure Rate of Exponential Distribution under Convex Boundary
In this paper the exact determination of the distribution of stopping variable, the moment and risk of sequential estimator of the failure rate of exponential distribution, under convex boundary is obtained. The corresponding Poisson Process is used to derive the exact distribution of stopping variable of sequential estimator of the failure rate. In the end the exact values of mean and risk ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 59 شماره
صفحات -
تاریخ انتشار 2014