Measurement Based Analysis of One-Click File Hosting Services

@article{SanjusCuxart2011MeasurementBA,
  title={Measurement Based Analysis of One-Click File Hosting Services},
  author={Josep Sanju{\`a}s-Cuxart and Pere Barlet-Ros and Josep Sol{\'e}-Pareta},
  journal={Journal of Network and Systems Management},
  year={2011},
  volume={20},
  pages={276-301}
}
It is commonly believed that file sharing traffic on the Internet is mostly generated by peer-to-peer applications. However, we show that HTTP based file sharing services are also extremely popular. We analyzed the traffic of a large research and education network for three months, and observed that a large fraction of the inbound HTTP traffic corresponds to file download services, which indicates that an important portion of file sharing traffic is in the form of HTTP data. In particular, we… Expand
Piracy on the Internet: Publisher-side Analysis on File Hosting Services
TLDR
This work presents a publisher-side analysis of FHS file sharing dynamics through data collected from active measurement by crawling Warez-BB, and primarily analyse various characteristics of file sharing with respect to view count as the evaluation metric. Expand
Insights of file-sharing system forums
TLDR
A pilot study of how links to, and copies of, such content are exchanged via online forums finds that URLs are mostly posted once, presumably by their creators, and that unauthorised content on 1-CFHSs has an availability expectancy of about 40 days before being taken down. Expand
Actively Measuring Personal Cloud Storage
TLDR
This measurement study of three major Personal Clouds, DropBox, Box and SugarSync, is the first to deeply analyze many facets of these popular services and reveals new insights, such as important performance differences among providers, the existence of transfer speed daily patterns or sudden service breakdowns. Expand
Content Sharing Dynamics in the Global File Hosting Landscape
TLDR
This is the largest detailed characterization study of the file hosting landscape from a global viewpoint and analyzes the characteristics of hosted content in the public domain, and the dissemination mechanisms of links. Expand
Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact
TLDR
This paper focuses on three European countries where traffic has been collecting traffic for more than a year and a half through 5 vantage points with different access technologies, and presents an evolving scenario due to the consolidation of new services as Video Streaming and File Hosting and to the adoption of new P2P technologies. Expand
Analysis of YouTube user experience from passive measurements
TLDR
A novel method to track the progress of the video playback that, in contrast to previous works, does not require instrumentation of theVideo player neither browser-based plug-ins and extracts important statistical information about the status of the playback by reverse engineering the metrics in related HTTP requests that are generated during playback. Expand
A five year perspective of traffic pattern evolution in a residential broadband access network
TLDR
The results show that the P2P file-sharing has been dominating the network total traffic, but the dailyfile-sharing traffic volume per end user largely remains the same, and that the lower the access speed, the more diversified the end user traffic tend to be. Expand
A longitudinal analysis of Internet rate limitations
TLDR
The extent to which network, host and application settings define flow throughput over time and across autonomous systems is analyzed, showing that continuing OS upgrades have reduced the influence of host limitations owing both to windowscale deployment, and increased socket buffer sizes. Expand
Uploader Motivations and Consumer Dynamics in the One-Click File Hosting Ecosystem
TLDR
Traditional understandings of Internet piracy are significantly limited in their ability to explain a number of aspects of the current OCH ecosystem; large numbers of users are making negligible money, and aggregate figures show a significant amount of uploaders are failing to take actions to appropriately maximise their hypothetical earnings. Expand
Characterizing cyberlocker traffic flows
TLDR
This work uses a year-long trace collected from a large campus network to present a comprehensive characterization study of cyberlocker traffic at the transport layer, and uses a combination of flow-level and host-level characteristics to provide insights into the behavior of cyberlockeders and their impact on networks. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 34 REFERENCES
A Measurement-Based Traffic Profile of the eDonkey Filesharing Service
TLDR
This report provides a measurement based traffic profile of the eDonkey service and discusses how this type of service increases the ”mice and elephants” phenomenon in the Internet traffic characteristics. Expand
One-click hosting services: a file-sharing hideout
TLDR
This paper presents the first, to the authors' knowledge, detailed study of OCH traffic and services focusing on the most popular such service: RapidShare, and attempts to understand their service architecture, usage patterns, and content characteristics. Expand
Measurement study of peer-to-peer file sharing systems
TLDR
This measurement study seeks to precisely characterize the population of end-user hosts that participate in Napster and Gnutella, and shows that there is significant heterogeneity and lack of cooperation across peers participating in these systems. Expand
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
TLDR
Unlike the Web, whose workload is driven by document change, it is demonstrated that clients' fetch-at-most-once behavior, the creation of new objects, and the addition of new clients to the system are the primary forces that drive multimedia workloads such as Kazaa. Expand
Analyzing peer-to-peer traffic across large networks
  • S. Sen, Jia Wang
  • Computer Science
  • IEEE/ACM Transactions on Networking
  • 2004
TLDR
The high volume and good stability properties of P2P traffic suggests that the P1P workload is a good candidate for being managed via application-specific layer-3 traffic engineering in an ISP's network. Expand
The Bittorrent P2P File-Sharing System: Measurements and Analysis
TLDR
A measurement study of BitTorrent is presented in which it is shown that the system apparently has the right mechanisms to attract a large user community, to provide measurement data that may be useful in modeling P2P systems, and to identify design issues in such systems. Expand
An Experimental Study of the Skype Peer-to-Peer VoIP System
TLDR
An experimental study of Skype VoIP traffic conducted over a five month period, where over 82 million datapoints were collected regarding the population of online clients, the number of supernodes, and their traffic characteristics, indicates that although the structure of the Skype system appears to be similar to other P2P systems, particularly KaZaA, there are several significant differences in traffic. Expand
The New Web: Characterizing AJAX Traffic
TLDR
A traffic study of several Web 2.0 applications including Google Maps, modern web-email, and social networking web sites, and compare their traffic characteristics with the ambient HTTP traffic to elucidate the changing face of one of the most popular application on the Internet: The World Wide Web. Expand
Should internet service providers fear peer-assisted content distribution?
TLDR
It is highlighted how simple "locality-aware" P2P delivery solutions can significantly alleviate the induced cost at the ISPs, while providing an overall performance that approximates that of a perfect world-wide caching infrastructure. Expand
Changes in Web client access patterns: Characteristics and caching implications
TLDR
This study compares two measurements of Web client workloads separated in time by three years, both captured from the same computing facility at Boston University and finds that for the computing facility represented by traces between 1995 and 1998, the benefits of using size‐based caching policies have diminished and the potential for caching requested files in the network has declined. Expand
...
1
2
3
4
...