Torrent Poisoning: Antipiracy and Anonymity

Authors

  • Megha Yadav Master of Technology in Computer Science, MDU, India
  • Ms. Shalini Bhadola Depatrment of Computer Science & Engineering, Satkabir Institute of Technology And Management, MDU, India
  • Ms. Kirti Bhatia Depatrment of Computer Science & Engineering, Satkabir Institute of Technology And Management, MDU, India
  • Rohini Sharma Assistant Professor, Government College for Women, Rohtak, India

Keywords:

Piracy, Poisoning

Abstract

A P2P network architecture based on Bit Torrent is one of the most popular protocols today, which has been used as a popular method of copyright infringement by pirates and as a method of file transfer that works with almost any data type and format.

An evaluation of the tools and techniques utilized by law enforcement agencies and practitioners to support antipiracy and security is performed. There are a number of legal complexities to consider when dealing with torrent systems that have been attacked many times and used to secure antipiracy, but there are also certain geographic differences that come into play on which country they belong to and how they're handled. However, there are also new ways to remain anonymous even with the source and destination pair information. A new set of terms have been discovered to aid in coming up with good solutions to these problems, and they can be used legally as well as illegally.

Downloads

Published

2021-08-28

How to Cite

Yadav, M., Bhadola, M. S., Bhatia, M. K., & Sharma, R. (2021). Torrent Poisoning: Antipiracy and Anonymity. International Journal of Innovative Analyses and Emerging Technology, 1(3), 60–63. Retrieved from https://oajournals.net/index.php/ijiaet/article/view/146

Issue

Section

Articles