Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
The growing popularity of cyberlocker service has led to significant impact on the Internet that it is considered as one of the biggest contributors to the global Internet traffic estimated to be illegally traded content. Due to the anonymity property of cyberlocker, it is difficult for investigators to track user identity directly on cyberlocker site. In order to find the potential relationships between cyberlocker users, we propose a framework to collect cyberlocker related data from public forums where cyberlocker users usually distribute cyberlocker links for others to download and identity information can be gathered easily. Different kinds of sharing behaviors of forum user are extracted to build the profile, which is then analyzed with statistical techniques. The experiment results demonstrate that the framework can effectively detect profiles with similar behaviors for identity tracking and produce a taxonomy of forum users to provide insights for investigating cyberlocker-based piracy.
References
Alexa. (2015). Top sites in Hong Kong. Retrieved from http://www.alexa.com/topsites/countries/HK.
Bamrah, N. H., Satpute, B. S., & Patil, P. (2014). Web Forum Crawling Techniques. International Journal of Computer Applications, 85(17).
Envisional Ltd. (2011). Technical report: an estimate of infringing use of the Internet. Retrieved from http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf.
Fan, X., Chow, K. P., & Xu, F. (2015).Profiling and tracking a cyberlocker link sharer in a public web forum. In Advances in Digital Forensics XI (pp. 97-113). Springer Berlin Heidelberg.
Hickey, E. W. (2012). Serial murderers and their victims. Cengage Learning.
Kruskal, J. B. (1964). Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika, 29(1), 1-27.
Liu, M., Zhang, Z., Hui, P., Qin, Y., & Kulkarni, S. R. (2013). Measurement and understanding of Cyberlocker URL-sharing sites: Focus on movie files. In Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp. 902-909). IEEE.
Murtagh, F., & Legendre, P. (2011). Ward's hierarchical clustering method: Clustering criterion and agglomerative algorithm. arXiv preprint arXiv:1111.6285.
Wickelmaier, F. (2003). An introduction to MDS. Sound Quality Research Unit, Aalborg University, Denmark.
Zhao, N., Baud, L., & Bellot, P. (2013). Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier. In Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for (pp. 176-181). IEEE.
Recommended Citation
Fan, Xiao-Xi and Chow, Kam-Pui
(2015)
"Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis,"
Journal of Digital Forensics, Security and Law: Vol. 10
, Article 2.
DOI: https://doi.org/10.15394/jdfsl.2015.1208
Available at:
https://commons.erau.edu/jdfsl/vol10/iss4/2
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons