8,515 research outputs found

    Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent

    Get PDF
    This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and that those content providers are located in foreign data centers. We also show that an adversary can compromise the privacy of any peer in BitTorrent and identify the big downloaders that we define as the peers who subscribe to a large number of contents. This infringement on users' privacy poses a significant impediment to the legal adoption of BitTorrent

    Incidence of components of metabolic syndrome in the metabolically healthy obese over 9 years follow-up: the Atherosclerosis Risk In Communities study.

    Get PDF
    BackgroundSome obese adults are not afflicted by the metabolic abnormalities often associated with obesity (the 'metabolically healthy obese' (MHO)); however, they may be at increased risk of developing cardiometabolic abnormalities in the future. Little is known about the relative incidence of individual components of metabolic syndrome (MetSyn).MethodsWe used data from a multicenter, community-based cohort aged 45-64 years at recruitment (the Atherosclerosis Risk In Communities study) to examine the first appearance of any MetSyn component, excluding waist circumference. Body mass index (BMI, kg m-2) and cardiometabolic data were collected at four triennial visits. Our analysis included 3969 adults who were not underweight and free of the components of MetSyn at the initial visit. Participants were classified as metabolically healthy normal weight (MHNW), overweight (MHOW) and MHO at each visit. Adjusted hazard ratios (HR) and 95% confidence intervals were estimated with proportional hazards regression models.ResultsThe relative rate of developing each risk factor was higher among MHO than MHNW, with the strongest association noted for elevated fasting glucose (MHO vs MHNW, HR: 2.33 (1.77, 3.06)). MHO was also positively associated with elevated triglycerides (HR: 1.63 (1.27, 2.09)), low high-density lipoprotein-cholesterol (HR: 1.68 (1.32, 2.13)) and elevated blood pressure (HR: 1.54 (1.26, 1.88)). A similar, but less pronounced pattern was noted among the MHOW vs MHNW.ConclusionsWe conclude that even among apparently healthy individuals, obesity and overweight are related to more rapid development of at least one cardiometabolic risk factor, and that elevations in blood glucose develop most rapidly

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy

    Get PDF
    In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user. We focus our study on Skype, although other real-time communication applications may have similar privacy issues. We first design a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT. By calling the user periodically, we can then observe the mobility of the user. We show how to scale the scheme to observe the mobility patterns of tens of thousands of users. We also consider the linkability threat, in which the identified user is linked to his Internet usage. We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the file-sharing usage of identified users. We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents. We conclude that any Internet user can leverage Skype, and potentially other real-time communication systems, to observe the mobility and file-sharing usage of tens of millions of identified users.Comment: This is the authors' version of the ACM/USENIX Internet Measurement Conference (IMC) 2011 pape

    Perception and Barriers to Indoor Air Quality and Perceived Impact on Respiratory Health: An Assessment in Rural Honduras

    Get PDF
    Objective. The aim of this study was to identify household-specific factors associated with respiratory symptoms and to study the perceived impact of indoor air pollution (IAP) as a health issue. Methods. An IRB-approved, voluntary, anonymous 23-item survey was conducted in Spanish at a medical outreach clinic in June 2012 and at the homes of survey respondents (N = 79). Comparative analyses were performed to investigate relationships between specific house characteristics and respiratory complaints. Results. Seventy-nine surveys were completed. Respiratory symptoms were frequently reported by survey respondents: 42% stated that smoke in their household caused them to have watery eyes, 42% reported household members with coughs within the past two weeks, and 25% stated that there were currently household members experiencing difficulty in breathing. Stove location and kitchen roof construction material were significantly associated with frequency of respiratory symptoms. The vast majority used firewood as their major fuel type. Most respondents indicated that neither indoor air quality was a problem nor did it affect their daily life. Conclusions. Respiratory complaints are common in Yoro, Honduras. Stove location and kitchen roof construction material were significantly associated with frequency of respiratory symptoms; this may have implications for efforts to improve respiratory health in the region

    Pushing BitTorrent Locality to the Limit

    Get PDF
    Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality have been introduced. However, several fundamental issues on locality still need to be explored. In particular, how far can we push locality, and what is, at the scale of the Internet, the reduction of traffic that can be achieved with locality? In this paper, we perform extensive experiments on a controlled environment with up to 10 000 BitTorrent clients to evaluate the impact of high locality on inter-ISP links traffic and peers download completion time. We introduce two simple mechanisms that make high locality possible in challenging scenarios and we show that we save up to several orders of magnitude inter-ISP traffic compared to traditional locality without adversely impacting peers download completion time. In addition, we crawled 214 443 torrents representing 6 113 224 unique peers spread among 9 605 ASes. We show that whereas the torrents we crawled generated 11.6 petabytes of inter-ISP traffic, our locality policy implemented for all torrents would have reduced the global inter-ISP traffic by 40%

    Compromising Tor Anonymity Exploiting P2P Information Leakage

    Get PDF
    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

    Get PDF
    Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practice to trace a significant number of streams originating from secure (i.e., proxied) applications. In this paper, we show that linkability allows us to trace 193% of additional streams, including 27% of HTTP streams possibly originating from "secure" browsers. In particular, we traced 9% of Tor streams carried by our instrumented exit nodes. Using BitTorrent as the insecure application, we design two attacks tracing BitTorrent users on Tor. We run these attacks in the wild for 23 days and reveal 10,000 IP addresses of Tor users. Using these IP addresses, we then profile not only the BitTorrent downloads but also the websites visited per country of origin of Tor users. We show that BitTorrent users on Tor are over-represented in some countries as compared to BitTorrent users outside of Tor. By analyzing the type of content downloaded, we then explain the observed behaviors by the higher concentration of pornographic content downloaded at the scale of a country. Finally, we present results suggesting the existence of an underground BitTorrent ecosystem on Tor

    Clustering in P2P exchanges and consequences on performances.

    Get PDF
    We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term of data exchanged by peers having provided or queried at least one data in common. We introduce a method to capture these correlations (namely the data clustering), and study it in detail. We then use it to propose a very simple and efficient way to group data into clusters and show the impact of this underlying structure on search in typical P2P systems. Finally, we use these results to evaluate the relevance and limitations of a model proposed in a previous publication. We indicate some realistic values for the parameters of this model, and discuss some possible improvements

    Statistical analysis of a P2P query graph based on degrees and their time-evolution

    Get PDF
    Despite their crucial impact on the performances of peer-to-peer systems, very few is known on peers behaviors in such networks. We propose here a study of these of these behaviors in a running environment using a semi-centralised p2p system (edonkey). To achieve this, we use a trace of the queries made to a large server managing up to fifty thousands peers simultaneously, and a few thousands query per second. We analyse these data using complex network methods, and focus in particular on the degrees, their correlations, and their time-evolution. Results show a large variety of observed phenomena, including the variety of peers behaviors and heterogeneity of data queries, which should be taken into account when designing p2p systems

    Composition, distribution and supposed origin of mineral inclusions in sessile oak wood - consequences for microdensitometrical analysis

    Get PDF
    SEM and light-microscopical observations, supported by chemical microanalysis with an EDXA system, revealed that light-saturated pixels observed in X-ray negatives of sessile oak (Quercus petraea Liebl.) wood were caused by inorganic deposits present inside multiseriate ray and axial parenchyma cells. Calcium oxalate crystals, silica grains and amorphous granules with varied mineral compositions have been identified. The wood strips of three out of six sampled trees contained measurable amounts of mineral inclusions which were quantified using image analysis. Based on the variations of mineral content observed between trees and within and between annual rings of the same tree, some hypotheses were formulated concerning the factors involved in the formation of inorganic deposits in oak wood. Their occurrence varies depending on the mineral concerned and seems to be controlled largely by a tree effect. The time of formation appears to coincide with a shifting of the oak wood’s functions as a result of heartwood formation processes (inter-annual scale) or changes in leaf phenology and climate (intra-annual scale). In addition, the technical consequences of their presence as well as their effects on wood density measurements through microdensitometry are discussedComposition, distribution et origine supposée d’inclusions minérales dans le bois de chêne sessile – conséquences pour l’analyse microdensitométrique. Des observations à l’aide de microscopes électronique à balayage et optique, appuyées par des analyses élémentaires au moyen d’un système EDXA, ont révélé que les points-images saturés en niveau de gris, constatés dans les négatifs de radiographies de bois de chêne sessile (Quercus petraea Liebl.), étaient dus à des dépôts inorganiques présents à l’intérieur des cellules parenchymateuses des rayons ligneux multisériés et du parenchyme axial. Des cristaux d’oxalate de calcium, des grains de silice et des granules amorphes ayant des compositions minérales variées ont été identifiés. Des barrettes de trois sur six arbres échantillonnés contenaient des quantités mesurables d’inclusions minérales qui ont été quantifiées par analyse d’images. En se basant sur les variations du contenu en dépôts minéraux observées entre arbres ainsi qu’à l’intérieur d’un arbre, aux niveaux intra- et intercerne, quelques hypothèses ont été avancées concernant les facteurs potentiellement responsables de la formation de dépôts minéraux chez le chêne. Leur présence dépend du minéral concerné et semble être contrôlée par un fort effet arbre. L’apparition des minéraux coïncide apparemment avec des changements de fonctions du bois relatifs aux processus de duraminisation (échelle interannuelle) ou correspondant à des évolutions phénologiques ou climatiques (échelle intra-annuelle). Enfin, les conséquences techniques ainsi que les effets de leur présence sur des mesures de la densité du bois par analyse microdensitométrique sont discuté
    corecore