Torrent Crawler: a tool for collecting information from BitTorrent networks
نویسنده
چکیده
BitTorrent is a free peer-to-peer (P2P) content-sharing application with a complex and dynamic overlay structure due to loose coupling, high churn rate, and varying responsiveness of nodes. The complexity and the dynamic nature of the overlay structure can mask the problems in the network, making errors difficult to detect and diagnosis in a timely manner. Furthermore, the heavy reliance of clients on the node local views compounds the problems such as partitioning in the network or load imbalance due to biased peer selection. In an effort to provide the network with partial global information to resolve the network problems, this project looks into introducing a tool that efficiently collects global information from BitTorrent network. The tool, called Torrent Crawler (TC) uses a number of techniques to efficiently find all participating peers of the swarm, collecting global information from the network. The crawler also collects the information unobtrusively to the network traffic. In this paper, we describe the design, the implementation, and the evaluation of TC.
منابع مشابه
Is BitTorrent Unstoppable?
Anti-P2P companies have begun to launch Internet attacks against BitTorrent swarms. We use passive and active Internet measurements to study how successful these attacks are at curtailing the distribution of targeted content. For our active measurements, we develop a crawler that contacts all the peers in any given torrent, determines whether leechers in the torrent are under attack, and identi...
متن کاملThe Pirate Bay Torrent Analysis and Visualization
Using C# as a parser, we process about 3.4 million pieces of data over 680 thousand torrents from thepiratebay.org, and create a graphical representation of the data by infographic. Info-graphic presents the information in an easily readable format, and also can be distributed across many webmediums. Based on the representation/analysis of the data, we are able to determine some interesting cha...
متن کاملA Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client
The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the artifacts left by the BitTorrent client. We prop...
متن کاملDesign of a Crawler for Online Social Networks Analysis
The growths of online Social Networks in scale and amount of information are immense in recent years. The analyses of the structure of online social networks have thus drawn much research interests. Before the analyses, the information and the characteristics of the structure have to be obtained. However, the complexity of today’s web technologies imposes challenges for collecting the data. In ...
متن کاملA Fuzzy Swarm Optimized Approach for Piece Selection in Bit Torrent Like Peer to Peer Network
Every machine plays roles of client and server simultaneously in a peer-to-peer (P2P) network. Though a P2P network has many advantages over traditional client-server models regarding efficiency and fault-tolerance, it also faces additional security threats. Users/IT administrators should be aware of risks from malicious code propagation, downloaded content legality, and P2P software’s vulnerab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009