Abstract

AbstractWireless peer-to-peer (P2P) networks such as ad hoc networks, have reveived considerable attention due to their potential content sharing applications in the civilian environment. Unfortunately, because of fast and effective content sharing without strict authorization mechanism, wireless P2P networks are abused and suffer from massive copyright infringement problems. To solve this problem, piracy propagation monitoring becomes very necessary. In general, user behaviors should be employed as the base to construct piracy distribution, further predict and analyze the piracy propagation. However, some dynamic user behaviors such as the migration from download to upload, which embody important knowledge on behavior threat, have been largely ignored. In this paper, an approach to monitoring piracy propagation based on dynamic user behavior is proposed, in which fuzzy logic is applied to quantitatively model the behavior threat and piracy propagation ability. Furthermore, a new clustering algorithm named \emph{REGKM} is proposed for piracy propagation analysis.KeywordsDynamic User BehaviorWireless P2P NetworksContent SimilarityPiracy Propagation Monitoring

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call