Knowledge (XXG)

Torrent poisoning

Source 📝

103:
index format is changed to incorporate a digital signature. A peer authentication protocol can then establish the legitimacy of a peer when she downloads and uploads files. Using identity based signatures, the system enables each peer to identify infringing users without the need for communication with a central authority. The protocol then sends poisoned chunks to these detected users requesting a copyright protected file only. If all legitimate users simply deny download requests from known infringers, the latter can usually accumulate clean chunks from colluders (paid peers who share content with others without authorization). However, this method of content poisoning forces illegitimate users to discard even clean chunks, prolonging their download time.
72:
from finding the correct resource. Invalid information could include random content identifiers or fake IP addresses and port numbers. When a user attempts to download the corrupted content, the server will fail to establish a connection due to the large volume of invalid information. Users will then waste time trying to establish a connection with bogus users thus increasing the average time it takes to download the file. The index poisoning attack requires less bandwidth and server resources than decoy insertion. Furthermore, the attacker does not have to transfer files nor respond to requests. For this reason, index poisoning requires less effort than other methods of attack.
59:). In order to entice users to download the decoys, malicious users may make the corrupted file available via high bandwidth connections. This method consumes a large amount of computing resources since the malicious server must respond to a large quantity of requests. As a result, queries return principally corrupted copies such as a blank file or executable files infected with a virus. There were known cases when a company had created a special version of a game and published it on file sharing services (e.g. 218:
of your data". as well as claiming that their approach was 99% effective. Despite these claims, the algorithm has not yet been tested with BitTorrent. A group of Finnish musicians requested an investigation into the company, arguing that their software was effectively a virus and was in violation of Finnish law. The investigation was declined by Finnish police, and later by the Finnish parliamentary
301:, anti-infringement vigilantes have been known to create viruses that are distributed exclusively via P2P networks, and are designed to attack mp3s and other music files stored on a user's PC. The Nopir-B worm, which originated in France, poses as a DVD copying program and deletes all the mp3 files on a user's computer, regardless of whether or not they were legally obtained. 123:
the whole network for the targeted peer, they can manipulate them in a number of ways. For example, the attacker can specify which search results are returned. The attacker can also modify file comments. The peer's requests can also be directed back into the network by the attacker and can also be modified. It also checks data randomly for any errors found in that.
145:
There are several reasons why content providers and copyright holders may not choose torrent poisoning as a method for guarding their content. First, before injecting decoys, content providers have to normally monitor the BitTorrent network for signs that their content is being illegally shared (this
316:
conducted public hearings in response to the allegations. Comcast argued that it was regulating network traffic to enable reasonable downloading times for the majority of users. On 21 August 2008 the FCC issued an order which stated that Comcast's network management was unreasonable and that Comcast
136:
message, followed by a message advertising that they have a number of available chunks. Not only does the attacker never provide any chunks, they also repeatedly resend the handshake and message. These attacks prevent downloads as, essentially, the peer wastes time dealing with the attacker, instead
122:
The eclipse attack (also known as routing-table poisoning), instead of poisoning the network, targets requesting peers directly. In this attack, the attacker takes over the peer's routing table so that they are unable to communicate with any other peer except the attacker. As the attacker replicates
217:
claimed that their software, which uses a similar approach to spoofing, could be used to bring an end to illegal P2P file sharing. The firm offered "total blocking of peer 2 peer sharing for your intellectual property" and claimed that its "patented virtual algorithm blocks out all illegal swapping
71:
This method targets the index found in P2P file sharing systems. The index allows users to locate the IP addresses of desired content. Thus, this method of attack makes searching difficult for network users. The attacker inserts a large amount of invalid information into the index to prevent users
153:
Instead, the aim of content providers is to make illegal downloads statistically less likely to be clean and complete, in the hope that users will be discouraged from illegally downloading copyright material. Content providers and copyright holders may decide that the financial outlay is not worth
102:
Selective content poisoning (also known as proactive or discriminatory content poisoning) attempts to detect copyright violators while allowing legitimate users to continue to enjoy the service provided by an open P2P network. The protocol identifies a peer with its endpoint address while the file
113:
are theoretical systems where users pay a subscription fee for access to a file-sharing network, and are able to legally download and distribute copyright content. Selective content poisoning could potentially be used here to limit access to legitimate and subscribed users, by providing poisoned
54:
Decoy insertion (or content pollution) is a method by which corrupted versions of a particular file are inserted into the network. This deters users from finding an uncorrupted version and also increases distribution of the corrupted file. A malicious user pollutes the file by converting it into
276:
was an early example of content poisoning. Before the release of the album, tracks that appeared to be of similar length and file size to the real album tracks were leaked by the singer's record label. The tracks featured only a clip of Madonna saying "What the fuck do you think you're doing?"
230:
proposed the Peer To Peer Piracy Prevention Act, which would have granted immunity to copyright holders for taking steps to prevent the illegal distribution of their content (i.e. poisoning activities) on P2P networks, as long as they did not go as far as to harm the files stored on a P2P user's
131:
In this attack, the attacker joins the targeted swarm and establishes connections with many peers. However, the attacker never provides any chunks (authentic or otherwise) to the peers. A common version of this attack is the "chatty peer" attack. The attacker establishes connection with targeted
84:
has written their own program which directs users to non-existent locations via bogus search results. As users typically select one of the top five search results only, this method requires users to persevere beyond their initial failed attempts to locate the desired file. The idea is that many
284:
released a number of tracks online in 2000 that appeared to be legitimate copies of tracks from the band's latest album. Each file contained a short sample of the song, followed by a clip of a band member saying, "Although you thought you were downloading our new single, what you were actually
162:
The methods of attack described above are not particularly effective on their own, as for each measure effective countermeasures have evolved. These measures must be combined in order to have a significant impact on illegal peer-to-peer filesharing using BitTorrent protocols and Torrent files.
149:
This process can be expensive and time-consuming. As a result, most poisoning is only continued for the first few months following a leak or release. Second, it is also unlikely that torrent poisoning can be successful in disrupting every illegal download.
93:
This method of attack prevents distributors from serving users and thus slows P2P file sharing. The attacker's servers constantly connect to the desired file, which floods the provider's upstream bandwidth and prevents other users from downloading the file.
171:
On private tracker websites, where all posted torrents can be traced to a particular member, poisoned torrents can be quickly labeled and deleted and the poster can be banned, preventing further introduction of poisoned torrents by that
317:
must terminate the use of its discriminatory network management by the end of the year. Comcast complied with the order and appealed. On 6 June 2010, the District Court of Appeals for the Columbia vacated the FCC order in
167:
BitTorrent is highly resistant to content poisoning (as opposed to index poisoning), as it is able to verify individual file chunks. Overall, BitTorrent is one of the most resistant P2P filesharing methods to
225:
In some jurisdictions, there were concerns that content providers and copyright holders engaging in poisoning activities may be held liable for damages to users' computers. In the US in 2002, Representative
175:
Public torrent tracker sites have enabled the ability to report if a torrent has been poisoned (or is fake or malicious in any way). Thus torrent files shared by public trackers can have similar levels of
768:
33 Sw. U. L. Rev. 397 (2003-2004). The Piracy Prevention Bill, H.R. 5211: The Second Generation's Answer to Copyright Infringement over Peer-to-Peer Networks. Pesta, Kristine
183:
Tracker technology (as well as BitTorrent client programs) has improved over time, and many kinds of spoofing that were possible in the past are no longer possible.
821: 880: 203: 312:
of "hindering" P2P file sharing traffic. Tests conducted by AP have shown that Comcast hindered the uploading of complete files to BitTorrent. The
936: 657: 620: 487: 586: 781: 294:
was uploaded online, it became a hit on P2P websites such as Pirate Bay. MediaDefender was hired to poison torrents using decoy insertion.
731: 961: 538: 313: 80:
Some companies that disrupt P2P file sharing on behalf of content providers create their own software in order to launch attacks.
340: 856: 210:
and others, claiming that their spoofing services violated Altnet's patent for a file identification method called TrueNames.
729:
The Truth About the Peer to Peer Piracy Prevention Act: Why Copyright Owner Self-Help Must Be Part Of The P2P Piracy Solution
106: 63:) advertising it as cracked, having undocumented hidden functionality, making it impossible to win this variant of the game. 562: 514: 458: 415: 386: 362: 854:
After pirates steal "Sicko," Weinsteins deploy decoys; people hunting for new Moore movie might find advertising instead
330: 250: 696: 371:
Proceedings of the 6th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT 2010)
818: 801: 877: 335: 254: 34: 900: 187: 232: 267: 133: 26: 484: 318: 298: 951: 55:
another format that is indistinguishable from uncorrupted files (e.g. it may have similar or same
956: 778: 676: 438:
Kong, J. et al (2010) The Evaluation of Index Poisoning in BitTorrent. In: D. Wen. et al (eds).
728: 838: 640: 752: 305: 281: 244: 110: 904: 884: 860: 825: 805: 785: 735: 700: 680: 590: 566: 542: 518: 491: 462: 419: 390: 366: 60: 30: 22: 535: 440:
Proceedings of the Second International Conference on Communication Software and Networks
840:
Defending the brand: aggressive strategies for protecting your brand in the online arena
853: 945: 606:
Dhungel, P. et al. (2008) A Measurement Study of Attacks On Bittorrent Leechers. In:
272: 227: 81: 571:
27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07)
608:
Proceedings of the 7th International Conference on Peer-To-Peer Systems (IPTPS ’08)
259: 583: 383: 412: 384:
An Effective Early Warning Scheme against Pollution Dissemination for Bittorrent
207: 621:
Adaptive Content Poisoning To Prevent Illegal File Distribution in P2P Networks
455: 114:
content to non-subscribed users who attempt to illegitimately use the network.
186:
The BitTorrent protocol uses TCP exclusively, but the newer, widely supported
38: 249:
by providing chunks of garbage data to users. HBO were also reported to have
559: 219: 146:
includes watching for variations of files and files in compressed formats).
693: 536:
A Better Way Forward: Voluntary Collective Licensing of Music File Sharing
798: 257:(ISPs) of downloaders they believe have illegally downloaded episodes of 56: 511: 424:
The 2nd International Conference on Computer and Automation Engineering
309: 29:. This practice of uploading fake torrents is sometimes carried out by 897: 716: 243:
In 2005, it was reported that HBO was poisoning torrents of its show
214: 359: 878:
Nopir worm fights pirates by wiping MP3 music files, Sophos reports
308:(AP) released information accusing the broadband service provider 290: 610:. Tampa Bay, Florida. 25–26 February 2008. Berkeley: USENIX. p.7. 397:. Honolulu, 30 November – 4 December. New Jersey: IEEE. pp. 1 -7. 442:. Singapore. 26–28 February 2010. New Jersey: IEEE. pp. 382-386. 426:. Singapore, 26–28 February 2010. New Jersey: IEEE. pp. 118-122. 360:
Is Content Publishing in BitTorrent Altruistic or Profit-Driven?
192:
which is less frequently targeted by man-in-the-middle attacks.
512:
Collusive Piracy Prevention in P2P Content Delivery Networks
85:
users will simply give up their search through frustration.
673: 469:. Osaka, 19–23 April 2010. New Jersey: IEEE. pp. 559-566. 231:
computer. However, the bill died later in 2002 when the
560:
Integrated Copyright Protection in Peer-to-Peer Networks
456:
Choking Polluters in Bittorrent File Sharing Communities
25:
or data with misleading, deceiving file names using the
467:
Network Operations and Management Symposium (NOMS) 2010
288:
After an unauthorized copy of Michael Moore's movie
285:
downloading is an advertisement for our new album.”
373:. Philadelphia, USA. 30 November - 3 December 2010. 213:In 2005 the Finnish anti-infringement organisation 266:Although not targeted specifically at BitTorrent, 694:Slyck News - Claim to End 99% of Illegal Trading 485:Peer-to-peer poisoners: A tour of MediaDefender 867:. 18 June 2007. p. 3. Retrieved 25 April 2011. 506: 504: 479: 477: 475: 843:. AMACOM Books. p. 119. Retrieved 2011-04-23. 8: 920:Roth, D. (2009) The dark lord of broadband. 635: 633: 631: 629: 450: 448: 434: 432: 33:organisations as an attempt to prevent the 407: 405: 403: 395:Global Telecommunications Conference, 2009 37:of copyrighted content, and to gather the 573:. Toronto, Canada. 22–29 June 2007. p. 28 204:Recording Industry Association of America 898:Consumer groups ask FCC to fine Comcast 759:. 115 (20). p. 7. Retrieved 2011-04-23. 647:. 117 (20). p. 10. Retrieved 2011-04-23 558:Lou, X., Hwang, K. and Zhou, R. (2007) 351: 788:. O'Reilly Radar. Retrieved 2011-03-31 235:ended and has not been reintroduced. 7: 597:. Heidelberg: Springer. pp. 195-206. 595:Distributed Computing and Networking 202:In September 2004, Altnet sued the 137:of downloading chunks from others. 819:Hacked: Madonna's Web Site Defaced 413:A Study of Pollution on Bittorrent 14: 314:Federal Communications Commission 154:the end result of their efforts. 619:Lou, X. & Hwang, K. (2006). 341:Privacy in file sharing networks 277:followed by minutes of silence. 799:Madonna swears at music pirates 547:Electronic Frontier Foundation 523:IEEE Transactions on Computers 107:Voluntary Collective Licensing 1: 658:Altnet Fights Back, Sues RIAA 510:Lou, X. and Hwang, K. (2009) 251:sent cease-and-desist letters 141:Barriers to torrent poisoning 593:. In: Kant, K. et al (eds). 331:Legal issues with BitTorrent 180:as Private Tracker websites. 852:Brodesser-Akner, C. (2007) 98:Selective content poisoning 978: 911:. Retrieved 25 April 2011. 753:Spoofing Continues To Grow 255:Internet service providers 35:peer-to-peer (P2P) sharing 962:Denial-of-service attacks 903:23 September 2020 at the 896:Associated Press. (2007) 641:Viralg Touts P2P Solution 584:Poisoning the Kad Network 582:Locher, T. et al. (2010) 358:Cuevas, R. et al. (2010) 336:Peer-to-peer file sharing 127:Uncooperative-peer attack 21:is intentionally sharing 817:The Smoking Gun (2003). 779:HBO Attacking BitTorrent 887:. retrieved 2011-04-23. 828:. Retrieved 2011-03-30. 808:. Retrieved 2011-03-30. 804:5 February 2022 at the 777:Torkington, N. (2005). 742:. Retrieved 2001-04-23. 707:. Retrieved 2011-04-23. 679:2 February 2011 at the 664:. Retrieved 2011-04-23. 589:5 February 2022 at the 565:5 February 2022 at the 549:. Retrieved 2011-04-22. 541:19 January 2022 at the 534:von Lohmann, F. (2008) 517:5 February 2022 at the 498:. Retrieved 2011-03-30. 461:5 February 2022 at the 418:5 February 2022 at the 411:Kong, J. et al (2010). 389:5 February 2022 at the 365:5 February 2022 at the 132:peers via the required 937:Attacking P2P Networks 683:. Retrieved 2011-04-23 623:Retrieved 2011-03-21. 525:. 58 (7) pp. 970-983. 483:Anderson, N. (2007). 454:Santos et al (2010). 206:, Overpeer, Loudeye, 883:23 June 2011 at the 859:14 July 2011 at the 837:Murray, B.H. (2004) 824:3 March 2016 at the 784:23 July 2008 at the 727:Berman, H.L. (2002) 699:10 June 2011 at the 319:Comcast Corp. v. FCC 299:Internet vigilantism 280:Similarly, the band 751:Garrity, B. (2003) 734:3 June 2011 at the 304:On 19 October 2007 190:protocol uses UDP, 27:BitTorrent protocol 692:Ingram, M. (2005) 656:Cowley, S. (2004) 490:5 May 2012 at the 382:Luo et al (2009). 239:High-profile cases 233:Congressional Term 797:BBC News (2003). 639:Bruno, A. (2005) 297:In an example of 178:quality assurance 45:Methods of attack 31:anti-infringement 19:Torrent poisoning 969: 925: 918: 912: 894: 888: 874: 868: 850: 844: 835: 829: 815: 809: 795: 789: 775: 769: 766: 760: 749: 743: 725: 719: 714: 708: 690: 684: 671: 665: 654: 648: 637: 624: 617: 611: 604: 598: 580: 574: 556: 550: 532: 526: 508: 499: 481: 470: 452: 443: 436: 427: 409: 398: 380: 374: 356: 306:Associated Press 282:Barenaked Ladies 193: 111:Open Music Model 41:of downloaders. 977: 976: 972: 971: 970: 968: 967: 966: 942: 941: 933: 928: 919: 915: 905:Wayback Machine 895: 891: 885:Wayback Machine 876:Sophos. (2005) 875: 871: 865:Advertising Age 861:Wayback Machine 851: 847: 836: 832: 826:Wayback Machine 816: 812: 806:Wayback Machine 796: 792: 786:Wayback Machine 776: 772: 767: 763: 750: 746: 736:Wayback Machine 726: 722: 715: 711: 701:Wayback Machine 691: 687: 681:Wayback Machine 674:Viralg homepage 672: 668: 655: 651: 638: 627: 618: 614: 605: 601: 591:Wayback Machine 581: 577: 567:Wayback Machine 557: 553: 543:Wayback Machine 533: 529: 519:Wayback Machine 509: 502: 492:Wayback Machine 482: 473: 463:Wayback Machine 453: 446: 437: 430: 420:Wayback Machine 410: 401: 391:Wayback Machine 381: 377: 367:Wayback Machine 357: 353: 349: 327: 241: 200: 191: 160: 158:Countermeasures 143: 129: 120: 100: 91: 78: 69: 67:Index poisoning 61:Game Dev Tycoon 52: 50:Decoy insertion 47: 12: 11: 5: 975: 973: 965: 964: 959: 954: 944: 943: 940: 939: 932: 931:External links 929: 927: 926: 924:. 17 (2) p.54. 913: 889: 869: 845: 830: 810: 790: 770: 761: 744: 720: 709: 685: 666: 649: 625: 612: 599: 575: 551: 527: 500: 471: 444: 428: 399: 375: 350: 348: 345: 344: 343: 338: 333: 326: 323: 270:'s 2003 album 240: 237: 199: 196: 195: 194: 184: 181: 173: 169: 159: 156: 142: 139: 128: 125: 119: 118:Eclipse attack 116: 99: 96: 90: 87: 77: 74: 68: 65: 51: 48: 46: 43: 13: 10: 9: 6: 4: 3: 2: 974: 963: 960: 958: 955: 953: 950: 949: 947: 938: 935: 934: 930: 923: 917: 914: 910: 906: 902: 899: 893: 890: 886: 882: 879: 873: 870: 866: 862: 858: 855: 849: 846: 842: 841: 834: 831: 827: 823: 820: 814: 811: 807: 803: 800: 794: 791: 787: 783: 780: 774: 771: 765: 762: 758: 754: 748: 745: 741: 737: 733: 730: 724: 721: 718: 713: 710: 706: 702: 698: 695: 689: 686: 682: 678: 675: 670: 667: 663: 659: 653: 650: 646: 642: 636: 634: 632: 630: 626: 622: 616: 613: 609: 603: 600: 596: 592: 588: 585: 579: 576: 572: 568: 564: 561: 555: 552: 548: 544: 540: 537: 531: 528: 524: 520: 516: 513: 507: 505: 501: 497: 493: 489: 486: 480: 478: 476: 472: 468: 464: 460: 457: 451: 449: 445: 441: 435: 433: 429: 425: 421: 417: 414: 408: 406: 404: 400: 396: 392: 388: 385: 379: 376: 372: 368: 364: 361: 355: 352: 346: 342: 339: 337: 334: 332: 329: 328: 324: 322: 320: 315: 311: 307: 302: 300: 295: 293: 292: 286: 283: 278: 275: 274: 273:American Life 269: 264: 262: 261: 256: 252: 248: 247: 238: 236: 234: 229: 228:Howard Berman 223: 221: 216: 211: 209: 205: 197: 189: 185: 182: 179: 174: 170: 166: 165: 164: 157: 155: 151: 147: 140: 138: 135: 126: 124: 117: 115: 112: 108: 104: 97: 95: 88: 86: 83: 82:MediaDefender 75: 73: 66: 64: 62: 58: 49: 44: 42: 40: 36: 32: 28: 24: 20: 16: 921: 916: 908: 892: 872: 864: 848: 839: 833: 813: 793: 773: 764: 756: 747: 739: 723: 712: 704: 688: 669: 661: 652: 644: 615: 607: 602: 594: 578: 570: 554: 546: 530: 522: 496:Ars Technica 495: 466: 439: 423: 394: 378: 370: 354: 303: 296: 289: 287: 279: 271: 265: 260:The Sopranos 258: 245: 242: 224: 212: 201: 198:Legal issues 177: 161: 152: 148: 144: 130: 121: 105: 101: 92: 89:Interdiction 79: 70: 53: 39:IP addresses 23:corrupt data 18: 17: 15: 208:MediaSentry 952:BitTorrent 946:Categories 347:References 168:poisoning. 957:Deception 909:msnbc.com 757:Billboard 645:Billboard 220:ombudsman 134:handshake 901:Archived 881:Archived 857:Archived 822:Archived 802:Archived 782:Archived 732:Archived 697:Archived 677:Archived 587:Archived 563:Archived 539:Archived 515:Archived 488:Archived 459:Archived 416:Archived 387:Archived 363:Archived 325:See also 109:and the 76:Spoofing 57:metadata 740:FindLaw 662:PCWorld 310:Comcast 268:Madonna 253:to the 717:Viralg 569:. In: 422:. In: 393:. In: 215:Viralg 922:Wired 705:Slyck 291:Sicko 172:user. 246:Rome 188:uTP 948:: 907:. 863:. 755:. 738:. 703:. 660:. 643:. 628:^ 545:. 521:. 503:^ 494:. 474:^ 465:. 447:^ 431:^ 402:^ 369:. 321:. 263:. 222:.

Index

corrupt data
BitTorrent protocol
anti-infringement
peer-to-peer (P2P) sharing
IP addresses
metadata
Game Dev Tycoon
MediaDefender
Voluntary Collective Licensing
Open Music Model
handshake
uTP
Recording Industry Association of America
MediaSentry
Viralg
ombudsman
Howard Berman
Congressional Term
Rome
sent cease-and-desist letters
Internet service providers
The Sopranos
Madonna
American Life
Barenaked Ladies
Sicko
Internet vigilantism
Associated Press
Comcast
Federal Communications Commission

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.