Torrent Poisoning: Antipiracy and Anonymity

dc.creatorYadav, Megha
dc.creatorBhadola, Ms. Shalini
dc.creatorBhatia, Ms. Kirti
dc.creatorSharma, Rohini
dc.date2021-08-28
dc.date.accessioned2023-08-21T07:41:35Z
dc.date.available2023-08-21T07:41:35Z
dc.descriptionA P2P network architecture based on Bit Torrent is one of the most popular protocols today, which has been used as a popular method of copyright infringement by pirates and as a method of file transfer that works with almost any data type and format. An evaluation of the tools and techniques utilized by law enforcement agencies and practitioners to support antipiracy and security is performed. There are a number of legal complexities to consider when dealing with torrent systems that have been attacked many times and used to secure antipiracy, but there are also certain geographic differences that come into play on which country they belong to and how they're handled. However, there are also new ways to remain anonymous even with the source and destination pair information. A new set of terms have been discovered to aid in coming up with good solutions to these problems, and they can be used legally as well as illegally.en-US
dc.formatapplication/pdf
dc.identifierhttps://openaccessjournals.eu/index.php/ijiaet/article/view/146
dc.identifier.urihttp://dspace.umsida.ac.id/handle/123456789/13626
dc.languageeng
dc.publisherOpen Access Journalsen-US
dc.relationhttps://openaccessjournals.eu/index.php/ijiaet/article/view/146/143
dc.rightsCopyright (c) 2021 International Journal of Innovative Analyses and Emerging Technologyen-US
dc.sourceInternational Journal of Innovative Analyses and Emerging Technology; Vol. 1 No. 3 (2021): International Journal of Innovative Analyses and Emerging Technology (2792-4025) ; 60-63en-US
dc.source2792-4025
dc.subjectPiracyen-US
dc.subjectPoisoningen-US
dc.titleTorrent Poisoning: Antipiracy and Anonymityen-US
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Articleen-US
Files