We classify the
different manifestations of the darknet that have come into existence in recent
years with respect to the five infrastructure requirements described and
analyze weaknesses and points of attack.
As a system,
the darknet is subject to a variety of attacks. Legal action continues to be
the most powerful challenge to the darknet. However, the darknet is also
subject to a variety of other common threats (e.g. viruses, spamming) that, in
the past, have lead to minor disruptions of the darknet, but could be
considerably more damaging.
In this section
we consider the potential impact of legal developments on the darknet. Most of
our analysis focuses on system robustness, rather than on detailed legal
questions. We regard legal questions only with respect to their possible
effect: the failure of certain nodes or links (vertices and edges of the graph
defined above). In this sense, we are investigating a well known problem in
distributed systems.
Early Small-Worlds
Networks
Prior to the
mid 1990s, copying was organized around groups of friends and
acquaintances. The copied objects were music
on cassette tapes and computer programs. The rendering devices were
widely-available tape players and the computers of the time – see Fig. 1.
Content injection was trivial, since most objects were either not copy
protected or, if they were equipped with copy protection mechanisms, the
mechanisms were easily defeated. The distribution network was a “sneaker net”
of floppy disks and tapes (storage), which were handed in person between
members of a group or were sent by postal mail. The bandwidth of this network –
albeit small by today’s standards – was sufficient for the objects of the time.
The main limitation of the sneaker net with its mechanical transport layer was
latency. It could take days or weeks to obtain a copy of an object. Another
serious limitation of these networks was the lack of a sophisticated search
engine.
There were
limited attempts to prosecute individuals who were trying to sell copyrighted
objects they had obtained from the darknet (commercial piracy). However, the
darknet as a whole was never under significant legal threat. Reasons may have
included its limited commercial impact and the protection from legal
surveillance afforded by sharing amongst friends.
The sizes of
object libraries available on such networks are strongly influenced by the
interconnections between the networks.
For example, schoolchildren may copy content from their “family network”
to their “school network” and thereby increase the size of the darknet object
library available to each. Such networks
have been studied extensively and are classified as “interconnected small-worlds
networks.” [24] There
are several popular examples of the characteristics of such systems. For
example, most people have a social group of a few score of people. Each of these people has a group of friends
that partly overlap with their friends’ friends, and also introduces more
people. It is estimated that, on
average, each person is connected to every other person in the world by a chain
of about six people from which arises the term “six degrees of separation”.
These findings
are remarkably broadly applicable (e.g. [20,3]). The chains are on average so short because
certain super-peers have many links. In our
example, some people are gregarious and have lots of friends from different
social or geographical circles.
We suspect that
these findings have implications for sharing on darknets, and we will return to
this point when we discuss the darknets of the future later in this paper.
The small-worlds darknet continues to exist. However,
a number of technological advances have given rise to new forms of the darknet
that have superseded the small-worlds for some object types (e.g. audio).
Central Internet Servers
By 1998, a new
form of the darknet began to emerge from technological advances in several
areas. The internet had become mainstream, and as such its protocols and
infrastructure could now be relied upon by anyone seeking to connect users with
a centralized service or with each other. The continuing fall in the price of
storage together with advances in compression technology had also crossed the
threshold at which storing large numbers of audio files was no longer an
obstacle to mainstream users.
Additionally, the power of computers had crossed
the point at which they could be used as rendering devices for multimedia
content. Finally, “CD ripping” became a trivial method for content injection.
The first
embodiments of this new darknet were central internet servers with large
collections of MP3 audio files. A fundamental change that came with these
servers was the use of a new distribution network: The internet displaced the
sneaker net – at least for audio content. This solved several problems of the
old darknet. First, latency was reduced
drastically.
Secondly, and
more importantly, discovery of objects became much easier because of simple and
powerful search mechanisms – most importantly the general-purpose
world-wide-web search engine. The local view of the small world was replaced by
a global view of the entire collection accessible by all users. The main
characteristic of this form of the darknet was centralized storage and search –
a simple architecture that mirrored mainstream internet servers.
Centralized or
quasi-centralized distribution and service networks make sense for legal online
commerce. Bandwidth and infrastructure
costs tend to be low, and having customers visit a commerce site means the
merchant can display adverts, collect profiles, and bill efficiently. Additionally, management, auditing, and
accountability are much easier in a centralized model.
However, centralized
schemes work poorly for illegal object
distribution because large, central servers are large single points of failure:
If the distributor is breaking the law, it is relatively easy to force him to
stop. Early MP3 Web and FTP sites were
commonly “hosted” by universities, corporations, and ISPs. Copyright-holders or their representatives
sent “cease and desist” letters to these web-site operators and web-owners
citing copyright infringement and in a few cases followed up with legal action [15]. The threats of legal action were successful
attacks on those centralized networks, and MP3 web and FTP sites disappeared
from the mainstream shortly after they appeared.
0 komentar:
Posting Komentar