Comparing Pedophile Activity in Different P2P Systems

Article, Other literature type English OPEN
Raphaël Fournier ; Thibault Cholez ; Matthieu Latapy ; Isabelle Chrisment ; Clémence Magnien ; Olivier Festor ; Ivan Daniloff (2014)
  • Publisher: MDPI AG
  • Journal: Social Sciences, volume 3, issue 3 7, pages 1-12 (issn: 2076-0760)
  • Related identifiers: doi: 10.3390/socsci3030314
  • Subject: pedophile activity | eDonkey | H | P2P networks; eDonkey; pedophile activity | P2P networks | KAD | [ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] | Social Sciences
    • jel: jel:N | jel:P | jel:Z00 | jel:Y80 | jel:B | jel:A

International audience; Peer-to-peer (P2P) systems are widely used to exchange content over the Internet. Knowledge of pedophile activity in such networks remains limited, despite having important social consequences. Moreover, though there are different P2P systems in use, previous academic works on this topic focused on one system at a time and their results are not directly comparable. We design a methodology for comparing KAD and eDonkey, two P2P systems among the most prominent ones and with different anonymity levels. We monitor two eDonkey servers and the KAD network during several days and record hundreds of thousands of keyword-based queries. We detect pedophile-related queries with a previously validated tool and we propose, for the first time, a large-scale comparison of pedophile activity in two different P2P systems. We conclude that there are significantly fewer pedophile queries in KAD than in eDonkey (approximately 0.09% vs. 0.25%).
  • References (24)
    24 references, page 1 of 3

    1. European Commission. “Safer Internet Programme: Empowering and Protecting Children Online.” 2010. Available online: http://ec.europa.eu/information_society/activities/sip/ index_en.htm (accessed on 4 June 2014).

    2. Declan McCullagh. “RIAA: Child porn rife on P2P networks.” CNet, 9 September 2003. Available online: http://news.cnet.com/RIAA-Child-porn-rife-on-P2P-networks/ 2100-1028_3-5073817.html (accessed on 4 June 2014).

    3. Daniel Hughes, James Walkerdine, Geoff Coulson, and Stephen Gibson. “Peer-to-Peer: Is Deviant Behavior the Norm on P2P File-Sharing Networks?” IEEE Distributed Systems Online 7 (2006): 1-11.

    4. Matthieu Latapy, Clémence Magnien, and Raphaël Fournier. “Quantifying paedophile activity in a large P2P system.” Information Processing & Management 49 (2013): 248-63.

    5. Sandvine Network. “Global Internet Phenomena Report: Spring 2011.” 2012. Available online: http://fr.scribd.com/doc/94722096/Sandvine-Global-Internet-Phenomena-Report-1H-2012 (accessed on 4 June 2014).

    6. Munish Chopra, Miguel Vargas Martin, Luis Rueda, and Patrick C. K. Hung. “Toward New Paradigms to Combating Internet Child Pornography.” Paper Presented at Canadian Conference on Electrical and Computer Engineering (CCECE), Ottawa, ON, Canada. IEEE, 7-10 May 2006, pp. 1012-15.

    7. Asaf Shupo, Miguel Vargas Martin, Luis Rueda, Anasuya Bulkan, Yongming Chen, and Patrick C.K. Hung. “Toward efficient detection of child pornography in the network infrastructure.” IADIS International Journal on Computer Science and Information Systems 1 (2006): 15-31.

    8. Alexander Panchenko, Richard Beaufort, Hubert Naets, and Cedrick Fairon. “Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames.” In Advances in Information Retrieval. Edited by Pavel Serdyukov, Pavel Braslavski, Sergei O. Kuznetsov, Jaap Kamps, Stefan Rüger, Eugene Agichtein, Ilya Segalovich and Emine Yilmaz. Lecture Notes in Computer Science. Springer: Berlin Heidelberg, Germany, 2013, vol. 7814, pp. 776-79.

    9. April Kontostathis, Andy Garron, Kelly Reynolds, Will West, and Lynne Edwards. “Identifying Predators Using ChatCoder 2.0.” Paper Presented at CLEF Conference 2012 Evaluation Labs and Workshop, Rome, Italy, 17-20 September, 2012. Edited by Pamela Forner, Jussi Karlgren and Christa Womser-Hacker.

    10. Nick Pendar. “Toward Spotting the Pedophile Telling Victim from Predator in Text Chats.” Paper Presented at International Conference on Semantic Computing, Irvine, CA, USA, 17-19 September 2007, pp. 235-41.

  • Similar Research Results (6)
  • Metrics
    No metrics available
Share - Bookmark