Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence

This research uses data collected from a university campus network via Deep Packet Inspection (DPI) monitoring and from the largest public BitTorrent tracker to characterize the extent of unauthorized transfers of copyrighted content using Peer-to-Peer (P2P) and to evaluate the effectiveness and lim...

Full description

Bibliographic Details
Main Author: Mateus, Alexandre M
Format: Others
Published: Research Showcase @ CMU 2011
Subjects:
Online Access:http://repository.cmu.edu/dissertations/50
http://repository.cmu.edu/cgi/viewcontent.cgi?article=1051&context=dissertations
id ndltd-cmu.edu-oai-repository.cmu.edu-dissertations-1051
record_format oai_dc
spelling ndltd-cmu.edu-oai-repository.cmu.edu-dissertations-10512014-07-24T15:36:01Z Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence Mateus, Alexandre M This research uses data collected from a university campus network via Deep Packet Inspection (DPI) monitoring and from the largest public BitTorrent tracker to characterize the extent of unauthorized transfers of copyrighted content using Peer-to-Peer (P2P) and to evaluate the effectiveness and limitations of DPI in detection of such activity, both to provide a perspective of how much copyright infringement happens using P2P and to inform those seeking to deploy DPI technology. Use of P2P and transfers of copyrighted content were widespread on campus. In Spring 2008, 40% of students living on campus were detected using a P2P protocol, 70% of which were observed attempting to transfer copyrighted material. In late 2010, we estimate that over 800 million copies of content were transferred globally using BitTorrent per day, with an estimated number of transferred songs 13.1 times greater than worldwide sales of songs, and estimated number of transferred movies 6.8 times greater than worldwide box-office sales and 16.4 times greater than U.S. DVD and Blu-ray sales. Most transfers were from a small number of very popular titles that were widely available for sale. We found no evidence that use of P2P to transfer content without violating copyright was common both on campus and global BitTorrent. This indicates that copyright law is violated frequently using P2P, and while we cannot quantify how P2P transfers translate to lost sales, it is reasonable to assume some sales are lost due to P2P. Focusing on effectiveness of DPI, after a couple weeks of monitoring DPI found up to 80% of detected P2P users attempting to transfer copyrighted content. In the short term, DPI could be effective to assess which network users transfer copyrighted content using P2P given some weeks of monitoring. However, limitations such as not being able to detect users of encrypted P2P can reduce DPIʼs effectiveness in the long term. Using behavioral classifiers that we implemented and that can detect encrypted BitTorrent from traffic summaries, we found students shifting from unencrypted to encrypted BitTorrent in the 2007-2008 academic year. If this trend continues, effectiveness of DPI for enforcement can be significantly hindered 2011-08-01T07:00:00Z text application/pdf http://repository.cmu.edu/dissertations/50 http://repository.cmu.edu/cgi/viewcontent.cgi?article=1051&context=dissertations Dissertations Research Showcase @ CMU Science and Technology Policy
collection NDLTD
format Others
sources NDLTD
topic Science and Technology Policy
spellingShingle Science and Technology Policy
Mateus, Alexandre M
Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence
description This research uses data collected from a university campus network via Deep Packet Inspection (DPI) monitoring and from the largest public BitTorrent tracker to characterize the extent of unauthorized transfers of copyrighted content using Peer-to-Peer (P2P) and to evaluate the effectiveness and limitations of DPI in detection of such activity, both to provide a perspective of how much copyright infringement happens using P2P and to inform those seeking to deploy DPI technology. Use of P2P and transfers of copyrighted content were widespread on campus. In Spring 2008, 40% of students living on campus were detected using a P2P protocol, 70% of which were observed attempting to transfer copyrighted material. In late 2010, we estimate that over 800 million copies of content were transferred globally using BitTorrent per day, with an estimated number of transferred songs 13.1 times greater than worldwide sales of songs, and estimated number of transferred movies 6.8 times greater than worldwide box-office sales and 16.4 times greater than U.S. DVD and Blu-ray sales. Most transfers were from a small number of very popular titles that were widely available for sale. We found no evidence that use of P2P to transfer content without violating copyright was common both on campus and global BitTorrent. This indicates that copyright law is violated frequently using P2P, and while we cannot quantify how P2P transfers translate to lost sales, it is reasonable to assume some sales are lost due to P2P. Focusing on effectiveness of DPI, after a couple weeks of monitoring DPI found up to 80% of detected P2P users attempting to transfer copyrighted content. In the short term, DPI could be effective to assess which network users transfer copyrighted content using P2P given some weeks of monitoring. However, limitations such as not being able to detect users of encrypted P2P can reduce DPIʼs effectiveness in the long term. Using behavioral classifiers that we implemented and that can detect encrypted BitTorrent from traffic summaries, we found students shifting from unencrypted to encrypted BitTorrent in the 2007-2008 academic year. If this trend continues, effectiveness of DPI for enforcement can be significantly hindered
author Mateus, Alexandre M
author_facet Mateus, Alexandre M
author_sort Mateus, Alexandre M
title Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence
title_short Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence
title_full Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence
title_fullStr Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence
title_full_unstemmed Copyright Violation on the Internet: Extent and Approaches to Detection and Deterrence
title_sort copyright violation on the internet: extent and approaches to detection and deterrence
publisher Research Showcase @ CMU
publishDate 2011
url http://repository.cmu.edu/dissertations/50
http://repository.cmu.edu/cgi/viewcontent.cgi?article=1051&context=dissertations
work_keys_str_mv AT mateusalexandrem copyrightviolationontheinternetextentandapproachestodetectionanddeterrence
_version_ 1716709352498266112