Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services

Prakhar Pandey, Maxwell Aliapoulios, Damon McCoy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Large scale, subscription based, Internet Protocol Television (IPTV) media piracy is occurring despite current copy-right enforcement efforts. Cybercriminals are abusing legitimate services to setup and maintain illegitimate business operations offering pirated media content on a subscription basis. Due to the underground aspect of these pirated IPTV operations, these services are not well understood and so current enforcement action against them appear to not be effective. In this paper, we empirically measure the network infrastructure, payment, and order intermediary services that are used by a subset of the infringing IPTV ecosystem. We demonstrate how the measurements we make in this paper give insight into the business behind subscription based pirated media. Lastly, we show how these measurements can lead to potentially more informed policy decisions and intervention measures against subscription based IPTV piracy.

    Original languageEnglish (US)
    Title of host publicationProceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages423-432
    Number of pages10
    ISBN (Electronic)9781728130262
    DOIs
    StatePublished - Jun 2019
    Event4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019 - Stockholm, Sweden
    Duration: Jun 17 2019Jun 19 2019

    Publication series

    NameProceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019

    Conference

    Conference4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019
    Country/TerritorySweden
    CityStockholm
    Period6/17/196/19/19

    Keywords

    • Cybercrime
    • IPTV
    • Media piracy

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Information Systems and Management
    • Safety, Risk, Reliability and Quality

    Fingerprint

    Dive into the research topics of 'Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services'. Together they form a unique fingerprint.

    Cite this