•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

The growing popularity of cyberlocker service has led to significant impact on the Internet that it is considered as one of the biggest contributors to the global Internet traffic estimated to be illegally traded content. Due to the anonymity property of cyberlocker, it is difficult for investigators to track user identity directly on cyberlocker site. In order to find the potential relationships between cyberlocker users, we propose a framework to collect cyberlocker related data from public forums where cyberlocker users usually distribute cyberlocker links for others to download and identity information can be gathered easily. Different kinds of sharing behaviors of forum user are extracted to build the profile, which is then analyzed with statistical techniques. The experiment results demonstrate that the framework can effectively detect profiles with similar behaviors for identity tracking and produce a taxonomy of forum users to provide insights for investigating cyberlocker-based piracy.

References

Alexa. (2015). Top sites in Hong Kong. Retrieved from http://www.alexa.com/topsites/countries/HK.

Bamrah, N. H., Satpute, B. S., & Patil, P. (2014). Web Forum Crawling Techniques. International Journal of Computer Applications, 85(17).

Envisional Ltd. (2011). Technical report: an estimate of infringing use of the Internet. Retrieved from http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf.

Fan, X., Chow, K. P., & Xu, F. (2015).Profiling and tracking a cyberlocker link sharer in a public web forum. In Advances in Digital Forensics XI (pp. 97-113). Springer Berlin Heidelberg.

Hickey, E. W. (2012). Serial murderers and their victims. Cengage Learning.

Kruskal, J. B. (1964). Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika, 29(1), 1-27.

Liu, M., Zhang, Z., Hui, P., Qin, Y., & Kulkarni, S. R. (2013). Measurement and understanding of Cyberlocker URL-sharing sites: Focus on movie files. In Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp. 902-909). IEEE.

Murtagh, F., & Legendre, P. (2011). Ward's hierarchical clustering method: Clustering criterion and agglomerative algorithm. arXiv preprint arXiv:1111.6285.

Wickelmaier, F. (2003). An introduction to MDS. Sound Quality Research Unit, Aalborg University, Denmark.

Zhao, N., Baud, L., & Bellot, P. (2013). Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier. In Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for (pp. 176-181). IEEE.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.