Torrent extermination refers to the exercise of presenting false torrents, sometimes engaged by piracy protecting organizations in order to collect IP addresses of all downloader’s and also to protect the distribution of copyrighted contents. This misleading to share files with fake names by the use of BitTorrent procedure or unprotected data which is used by its users so that they can get “a free ride”, using clients like Bit Thief. By the use of this method, the users can be able to download files without mutual uploading contributions.
Content pollution or decoy insertion is the most important procedure where specific versions of corrupted files are included into the internet. This restricts users from getting their desired results and similarly, raises the amount of corrupted files. The files are normally converted into other format by an undesired user who causes pollution in corrupted files. The included files might have the same metadata that is also present in uncorrupted files.
Files that can cause poison in the torrent can be made available through high bandwidth network connections to attract the users to download entice. Lots of computing sources are utilized by this procedure, since a malicious server should answer to the requests of the users. In the result of this, the corrupted contents are exchanged for inquiries like, an empty file or executable copy that can be affected by a virus.
Second method that can cause torrent poisoning aims the index which is in P2P file systems. The index allows users to allocate IP addresses of their desired contents. For internet users, this method causes difficulties in searching. The aggressor gets access into the index and inserts a huge amount of corrupted data files hindering them from selecting and finding their correct sources. Invalid information might consist of invalid port numbers, content identifiers or IP addresses.
The server is not more able to launch a network connection because of the large volume of incorrect information when the users try to download invalid content. The users waste their time in trying to launch connections with invalid sources thus, increasing the normal time that is taken for downloading. The poisoning attacks need lesser amount of server and bandwidth sources as compared to the decoy insertion. In addition, the aggressor does not need to set up actions for transferring files nor have to answer the requests. This type of torrent poisoning requires less amount of effort as compared to the other methods.
For some companies, there are some P2P file system programs that create their own applications which are used to redirect the users to fake locations through invalid search results. Because every user searches and opens top 5 results, this method forces the users to persist although their first 5 results do not allocate their desired results. The basic idea behind this method is to exhaust the users so that they stop to search their wanted files.
In the end, you have to be experienced so that you can be able to indentify fake torrents. Number of people who are attached with file sharing, can easily spot fake torrents but for novice it is not so easy.