Learn More
Peer-to-peer networks are the most popular mechanism for the criminal acquisition and distribution of child pornography (CP). In this paper, we examine observations of peers sharing known CP on the eMule and Gnutella networks, which were collected by law enforcement using forensic tools that we developed. We characterize a year's worth of network activity(More)
This paper presents LiFTinG, the first protocol to detect freeriders, including colluding ones, in gossip-based content dissemination systems with asymmetric data exchanges. LiFTinG relies on nodes tracking abnormal behaviors by cross-checking the history of their previous interactions, and exploits the fact that nodes pick neighbors at random to prevent(More)
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate several flaws in OneSwarm's design and implementation through three different attacks available to forensic investigators. First, we prove that the current design is vulnerable to a(More)
Keywords: High-bandwidth content dissemination Peer-to-Peer (P2P) Free riding Distributed verifications a b s t r a c t Gossip-based protocols have proven very efficient for disseminating high-bandwidth content such as video streams in a peer-to-peer fashion. However, for the protocols to work, nodes are required to collaborate by devoting a fraction of(More)
A region based multi-sensor image fusion approach is proposed in this paper. At the initial stage of our algorithm, noise is suppressed from the input images by applying a 3 × 3 filter mask. In the next phase, regions are segmented from the input images by computing similarity map image followed by marker based watershed algorithm. Thereafter, regions are(More)
—OneSwarm is a p2p system for anonymous file sharing. We quantify the system's vulnerability to three attacks that identify the sources of files. First, we detail and prove that a timing attack allows a single attacker to investigate all its neighbors for possession of specific files. We prove the attack is possible due to OneSwarm's design and is(More)
National Institute of Technology Rourkela. Neither this thesis nor any part of it has been submitted for any degree or academic award elsewhere. Acknowledgment It will be simple to name all those people who helped us to get this thesis done, however it will be tough to thank them enough. We will nevertheless try.. . We would like to gratefully acknowledge(More)
  • 1