The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users

@article{Johnson2008TheEO,
  title={The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users},
  author={M. Eric Johnson and Daniel Sean McGuire and Nicholas D. Willey},
  journal={Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)},
  year={2008},
  pages={383-383}
}
Peer-to-peer file sharing is a growing security risk for firms and individuals. Users who participate in these networks to share music, pictures, and video are subject to many security risks including inadvertent publishing of private information, exposure to viruses and worms, and the consequences of spyware. In this paper, we examine the peer-to-peer file sharing phenomena, including an overview of the industry, its business models, and evolution. We describe the information security risks… 

Figures and Tables from this paper

Peer-to-Peer File Sharing and the Market for Digital Information Goods
TLDR
The size of the p2p network is characterized as a function of the firm's pricing strategy, and it is shown that the firm may be better off setting high prices, allowing the network to survive, and that the p1p network may work more efficiently in the presence of the company than in its absence.
A STUDY ON PEER TO PEER ENCRYPTEED FILE SHARING IN A ADHOC NETWORK
TLDR
Various encryption techniques available for peer-to-peer file transfer are discussed.
Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy
TLDR
The characteristics of the traffic generated by P2P applications are analysed from the behavioural point of view, and entropy is used to measure the heterogeneity embedded in the packet sizes and the results obtained show evident difference between P1P and non-P2P traffic.
The Nature of Peer-to-Peer Traffic
TLDR
The characteristics of this type of P2P traffic are discussed and explained, and recent studies about traffic characterisation are introduced and analysed from the perspective that may enable their application for traffic classification.
Controlling File Distribution in the Share Network Through Content Poisoning
TLDR
This paper applies content poisoning to “Share”, one of the most popular P2P file sharing applications in Japan, to control its file distribution and evaluates how effective the proposed content poisoning method is to a live Share network composed of over 100,000 active peers.
AN EMPIRICAL STUDY ON DETERMINING FACTORS FOR CONSUMERS' ONLINE STREAMING AND PEER-TO-PEER FILE SHARING
We are living in the world easily getting access to the Internet through desktops, laptops, I-Pad type of touchscreen devices, and smartphones without having any constraint in terms of time and
Detection and classification of peer-to-peer traffic: A survey
TLDR
This article surveys the studies on peer-to-peer traffic detection and classification, making an extended review of the literature and provides a comprehensive analysis of the concepts and strategies for network monitoring.
Resilient privacy protection for location-based services through decentralization
TLDR
This work strengthens the decentralized LBS privacy approach, securing peer-to-peer (P2P) interactions by passing proactively cached Point of Interest (POI) information, and allows P2P responses to be validated with very low fraction of queries affected even if a significant fraction of nodes are compromised.
Resilient Collaborative Privacy for Location-Based Services
TLDR
This work protects user privacy while preserving accountability of user activities, leveraging pseudonymous authentication with mainstream cryptography, and leverages architectures proposed for large scale mobile systems, while it incurs minimal changes to LBS servers as it can be deployed in parallel to the LBS server.
...
...

References

SHOWING 1-10 OF 35 REFERENCES
Why file sharing networks are dangerous?
TLDR
This analysis and experimental results clearly show the security risk of P2P file sharing networks and present experimental evidence of the risk through honey-pot experiments that expose both business and personal financial information and the resulting consequences.
Inadvertent Disclosure - Information Leaks in the Extended Enterprise
TLDR
This work characterize the extent of the security problem for a group of large financial institutions using a direct analysis of leaked documents and finds a statistically significant link between leakage and firm employment base.
Understanding churn in peer-to-peer networks
TLDR
The understanding of churn is advanced by improving accuracy, comparing different P2P file sharingdistribution systems, and exploring new aspects of churn.
A study of malware in peer-to-peer networks
TLDR
A useful insight into filtering malware is provided: filtering downloads based on the most commonly seen sizes of the most popular malware could block a large portion of malicious files with a very low rate of false positives.
Clustering in Peer-to-Peer File Sharing Workloads
TLDR
This paper takes different measurements on Kazaa and Gnutella, and instead of passively recording requests, actively probe peers to get their cache contents information, which provides a map of contents that is used to evaluate the degree of clustering in the system.
Malware prevalence in the KaZaA file-sharing network
TLDR
Using a light-weight crawler built for the KaZaA file-sharing network, this work finds that over 15% of the crawled files were infected by 52 different viruses, many of which open a backdoor through which an attacker can remotely control the compromised machine, send spam, or steal a user's confidential information.
Usability and privacy: a study of Kazaa P2P file-sharing
TLDR
A cognitive walkthrough and a laboratory user study of the KaZaA file sharing user interface suggest that a large number of users appeared to be unwittingly sharing personal and private files, and that some users were indeed taking advantage of this and downloading files containing ostensibly private information.
Transport layer identification of P2P traffic
TLDR
This paper develops a systematic methodology to identify P2P flows at the transport layer, i.e., based on connection patterns of P1P networks, and without relying on packet payload, and believes it is the first method for characterizing P2p traffic using only knowledge of network dynamics rather than any user payload.
Pollution in P2P file sharing systems
  • Jian Liang, R. Kumar, Y. Xi, K. Ross
  • Computer Science
    Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
  • 2005
TLDR
A measurement study of the nature and magnitude of pollution in the FastTrack P2P network, currently the most popular P1P file sharing system, and an automated procedure to detect whether a given version is polluted or not.
Characterizing files in the modern Gnutella network: a measurement study
TLDR
This paper developed a new methodology to capture accurate "snapshots" of available files in a large scale P2P system and conducted three types of analysis on available files: Static analysis, Topological analysis and Dynamic analysis.
...
...