Hi! Thanks for the question.
It seems that groups like the RIAA and other companies trying to
protect their networks are already implementing such types of P2P
monitoring software. I will cite here 3 articles that show the
following technologies being implemented to combat P2P file sharing
activities.
Among the most popular network tools today are monitoring systems
that can look inside a data stream and figure out what kind of
protocol is being used to transfer the information. This tactic would
not necessarily give monitors information about the data itself, but
only its wrapper--a little like noting that a car is a Toyota gives
little indication about who is actually driving it.
That protocol information can be used to block or prioritise traffic,
however. Rick Koenig, a network engineer at Concordia University in
Austin, says he's started using tools from Cisco to identify and
de-emphasise file-swapping traffic on his school's networks.
Aveo's software works differently, scanning computers connected to a
company's internal network, looking for specified applications such as
Kazaa, iMesh, BearShare or others that a company has decided to ban,
block, or otherwise regulate.
RIAA turns up heat on file-trading at work
http://www.zdnet.com.au/newstech/security/story/0,2000048600,20272983,00.htm
To underscore the point, Akonix released Rogue Aware, a free
monitoring toola network snifferthat detects and reports on the use
of free instant messaging programsAOL IM, MSN IM, and Yahoo!
Messengeras well as P2P file sharing occurring inside the
organizations networks, scanning for many common P2P applications.
Tackling the File-Swapping Threat
http://www.esj.com/security/article.asp?EditorialsID=562
EMI Recorded Music on Tuesday agreed to use audio fingerprinting
technology from Audible Magic to identify and track licensed and
unlicensed online usage of its song catalog.
Audible Magic's technology aims to get around the problem of matching
digital copies of songs that do not use a universal naming convention
or format
In addition, the technology could be used to track the most popular
songs traded on peer-to-peer networks without leading to direct action
against file traders.
EMI, Audible Magic ink anti-piracy deal
http://news.com.com/2100-1023-963756.html?tag=fd_top
An example of such technology as mentioned above is Audible Magic.
Audible Magic
http://www.audiblemagic.com/
There have been reports of suits already filed by the RIAA against
file swappers but there is still doubt as to the accuracy and
comprehensiveness of reach of such monitoring tools.
Search terms used:
P2P file-swapping file sharing monitoring software tools
I hope these links would help you in your research. Before rating this
answer, please ask for a clarification if you have a question or if
you would need further information.
Thanks for visiting us.
Regards,
Easterangel-ga
Google Answers Researcher |