Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example

碩士 === 國立屏東教育大學 === 資訊科學系 === 99 === This thesis focuses on a framework of the BitTorrent file sharing system, and uses Snort to monitor feature strings in packets while the BitTorrent file sharing system was operated and to record the current users IPs. Then, an IP geographical position database is...

Full description

Bibliographic Details
Main Authors: CHIH-JEN CHIU, 邱志仁
Other Authors: Cheng-Hsing Yang
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/43754273038379345189
id ndltd-TW-099NPTT5394004
record_format oai_dc
spelling ndltd-TW-099NPTT53940042015-10-13T20:13:50Z http://ndltd.ncl.edu.tw/handle/43754273038379345189 Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example 非法下載IP來源分析-以BitTorrent為例 CHIH-JEN CHIU 邱志仁 碩士 國立屏東教育大學 資訊科學系 99 This thesis focuses on a framework of the BitTorrent file sharing system, and uses Snort to monitor feature strings in packets while the BitTorrent file sharing system was operated and to record the current users IPs. Then, an IP geographical position database is used to analyze and classify these users’ IPs, and the orientating and drafting function of the Google Map API are joined to analyze the positions these users’ IPs and the influence situation of illegal downloading and uploading of pirated movies all over the globe. Finally, a traffic control system is used to monitor and analyze the traffic of BitTorrent. Herewith we can understand the distributive situation of piratical behaviors and the experimental results can be offered to perform the successive litigation. Cheng-Hsing Yang 楊政興 2011 學位論文 ; thesis 55 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立屏東教育大學 === 資訊科學系 === 99 === This thesis focuses on a framework of the BitTorrent file sharing system, and uses Snort to monitor feature strings in packets while the BitTorrent file sharing system was operated and to record the current users IPs. Then, an IP geographical position database is used to analyze and classify these users’ IPs, and the orientating and drafting function of the Google Map API are joined to analyze the positions these users’ IPs and the influence situation of illegal downloading and uploading of pirated movies all over the globe. Finally, a traffic control system is used to monitor and analyze the traffic of BitTorrent. Herewith we can understand the distributive situation of piratical behaviors and the experimental results can be offered to perform the successive litigation.
author2 Cheng-Hsing Yang
author_facet Cheng-Hsing Yang
CHIH-JEN CHIU
邱志仁
author CHIH-JEN CHIU
邱志仁
spellingShingle CHIH-JEN CHIU
邱志仁
Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example
author_sort CHIH-JEN CHIU
title Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example
title_short Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example
title_full Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example
title_fullStr Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example
title_full_unstemmed Analysis of Illegal downloading Source IP - Taking BitTorrent as an Example
title_sort analysis of illegal downloading source ip - taking bittorrent as an example
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/43754273038379345189
work_keys_str_mv AT chihjenchiu analysisofillegaldownloadingsourceiptakingbittorrentasanexample
AT qiūzhìrén analysisofillegaldownloadingsourceiptakingbittorrentasanexample
AT chihjenchiu fēifǎxiàzàiipláiyuánfēnxīyǐbittorrentwèilì
AT qiūzhìrén fēifǎxiàzàiipláiyuánfēnxīyǐbittorrentwèilì
_version_ 1718045242774519808