Title | ||
---|---|---|
Dynamic user behavior-based piracy propagation monitoring in wireless peer-to-peer networks |
Abstract | ||
---|---|---|
Wireless peer-to-peer (P2P) networks such as ad hoc networks, have reveived considerable attention due to their potential content sharing applications in the civilian environment. Unfortunately, because of fast and effective content sharing without strict authorization mechanism, wireless P2P networks are abused and suffer from massive copyright infringement problems. To solve this problem, piracy propagation monitoring becomes very necessary. In general, user behaviors should be employed as the base to construct piracy distribution, further predict and analyze the piracy propagation. However, some dynamic user behaviors such as the migration from download to upload, which embody important knowledge on behavior threat, have been largely ignored. In this paper, an approach to monitoring piracy propagation based on dynamic user behavior is proposed, in which fuzzy logic is applied to quantitatively model the behavior threat and piracy propagation ability. Furthermore, a new clustering algorithm named \emph{REGKM} is proposed for piracy propagation analysis. © Springer International Publishing Switzerland 2013. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1007/978-3-319-04048-6_5 | BSI@PAKDD/BSIC@IJCAI |
Keywords | Field | DocType |
content similarity,dynamic user behavior,piracy propagation monitoring,wireless p2p networks | Internet privacy,Wireless,Peer-to-peer,Computer security,Computer science,Fuzzy logic,Upload,Download,Copyright infringement,Wireless ad hoc network,Cluster analysis | Conference |
Volume | Issue | ISSN |
8178 LNAI | null | 16113349 |
Citations | PageRank | References |
0 | 0.34 | 12 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Benke Qu | 1 | 0 | 0.34 |
Wenjia Niu | 2 | 178 | 30.33 |
Tianqing Zhu | 3 | 159 | 27.73 |
Lei Wu | 4 | 73 | 17.47 |
Shijun Liu | 5 | 120 | 33.80 |
Na Wang | 6 | 0 | 0.34 |