An Ising-based approach for tracking illegal P2P content distributors

Thumbnail Image
Date
2010-01-01
Authors
Dai, Lu
Major Professor
Advisor
Lei Ying
Committee Member
Journal Title
Journal ISSN
Volume Title
Publisher
Altmetrics
Authors
Research Projects
Organizational Units
Organizational Unit
Electrical and Computer Engineering

The Department of Electrical and Computer Engineering (ECpE) contains two focuses. The focus on Electrical Engineering teaches students in the fields of control systems, electromagnetics and non-destructive evaluation, microelectronics, electric power & energy systems, and the like. The Computer Engineering focus teaches in the fields of software systems, embedded systems, networking, information security, computer architecture, etc.

History
The Department of Electrical Engineering was formed in 1909 from the division of the Department of Physics and Electrical Engineering. In 1985 its name changed to Department of Electrical Engineering and Computer Engineering. In 1995 it became the Department of Electrical and Computer Engineering.

Dates of Existence
1909-present

Historical Names

  • Department of Electrical Engineering (1909-1985)
  • Department of Electrical Engineering and Computer Engineering (1985-1995)

Related Units

Journal Issue
Is Version Of
Versions
Series
Department
Electrical and Computer Engineering
Abstract

This thesis focuses on the problem of tracking illegal P2P content distributors. By viewing the collection of files of a peer as a relatively precise reflection of its owner, we use the Ising model which originates from statistical physics to mathematically model the behavior of P2P networks and identify the relationships of peers. Based on it, we develop an effective approach to track the behavioral-based structures of P2P networks and use it as a guidance to narrow down the search scope for illegal P2P content distributors. The sum-product algorithm and mean field algorithm which are based on the Ising model are then used to efficiently compute the marginal distribution of peers that are holding or held a particular file of known contraband. Experimental results have shown that this behavioral-based approach significantly outperforms several tracking algorithms that ignore the relationships of peers in P2P networks.

Comments
Description
Keywords
Citation
Source
Copyright
Fri Jan 01 00:00:00 UTC 2010