International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 137 | Views: 260

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Rating: 6.7 / 10


Bit Torrent (Peer to Peer Network): Antipiracy and Anonymity

Ashish Kumar Sharma [4] | A. Prof. Neetu Sharma


Abstract: In this paper we have thoroughly analyzed Peer to Peer network and one of the most prominent file sharing Bit-Torrent protocol based on P2P network architecture which has been used as a major platform of pirating the copyrighted materials and imposing a threat of security as well, besides being a worthy tool of file sharing that supports almost all type and formats of data. It is also have been analyzed that P2P network is not a piracy but how it can help to reduce piracy so that antipiracy could be secured. Available tools and techniques used to support Antipiracy and Security are deeply analyzed that have been used so far by the law enforcement agencies and practitioners. So many attacks are discovered on the torrent systems and have been used to secure the antipiracy but there are also some legal complexities come into the system while addressing the issues depending upon to which country they belong. On the other hand the anonymity of the user (peer, client or node) on the Peer to peer networks is deeply discussed and further analyzed its need and methods to ensure the privacy of the users of Bit-Torrent (P2P) network. As it is important to know the source and destination pair information but new methods are also discovered for being Anonymous, used by legal and illegal way both and there are still new terminologies are being discovered to provide some solid solutions to these issues.


Keywords: Peer to Peer, BitTorrent, Torrent Poisoning, Antipiracy, Anonymity, Tor Networks


Edition: Volume 4 Issue 7, July 2015,


Pages: 253 - 256


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top