A measurement study of attacks on BitTorrent leechers

نویسندگان

  • Prithula Dhungel
  • Di Wu
  • Brad Schonhorst
  • Keith W. Ross
چکیده

Anti-P2P companies have begun to launch Internet attacks against BitTorrent swarms. In this paper, we analyze how successful these attacks are at impeding the distribution of targeted files. We present the results of both passive and active measurements. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Using passive measurements, we performed a detailed analysis of a recent album that is under attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Is BitTorrent Unstoppable?

Anti-P2P companies have begun to launch Internet attacks against BitTorrent swarms. We use passive and active Internet measurements to study how successful these attacks are at curtailing the distribution of targeted content. For our active measurements, we develop a crawler that contacts all the peers in any given torrent, determines whether leechers in the torrent are under attack, and identi...

متن کامل

Stealing bandwidth from BitTorrent seeders

BitTorrent continues to comprise the largest fraction of Internet traffic. While significant progress has been made in understanding the BitTorrent choking mechanism, its security vulnerabilities have not been investigated thoroughly. This paper presents an experimental analysis of bandwidth attacks against different choking algorithms in the BitTorrent seed state. We reveal a simple exploit th...

متن کامل

The Seed Attack: Can BitTorrent be Nipped in the Bud?

We study a natural and potentially devastating attack against BitTorrent, namely, attacking the initial seed in a torrent’s early stages. The goal of this attack is to diminish the seed’s ability to upload blocks. If the attacker can discover and react quickly enough to the new torrent, it can possibly nip the torrent in its bud, preventing all of the leechers from obtaining the entire file. We...

متن کامل

Optimal Peer-Assisted File Distribution: Single and Multi-Class Problems

With the emergence of BitTorrent, Swarmcast, and CDNs, peer-assisted file distribution has become a prominent Internet application, both in terms of user popularity and traffic volumes. We consider the following fundamental problem for peer-assisted file distribution. There are seed nodes, each of which has a copy of the file, and leecher nodes, each of which wants a copy the file. The goal is ...

متن کامل

RatFish: A File Sharing Protocol Provably Secure against Rational Users

The proliferation of P2P computing has recently been propelled by popular applications, most notably file sharing protocols such as BitTorrent. These protocols provide remarkable efficiency and scalability, as well as adaptivity to dynamic situations. However, none of them is secure against attacks from rational users, i.e., users that misuse the protocol if doing so increases their benefits (e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008