Stealing bandwidth from BitTorrent seeders

نویسندگان

  • Florian Adamsky
  • Syed Ali Khayam
  • Rudolf Jäger
  • Muttukrishnan Rajarajan
چکیده

BitTorrent continues to comprise the largest fraction of Internet traffic. While significant progress has been made in understanding the BitTorrent choking mechanism, its security vulnerabilities have not been investigated thoroughly. This paper presents an experimental analysis of bandwidth attacks against different choking algorithms in the BitTorrent seed state. We reveal a simple exploit that allows malicious peers to receive a considerably higher download rate than contributing leechers, therefore introducing significant efficiency degradations for benign peers. We show the damage caused by the proposed attack in two different environments: a lab testbed comprising 32 peers and a PlanetLab testbed with 300 peers. Our results show that 3 malicious peers can degrade the download rate up to 414.99 % for all peers. Combined with a Sybil attack that consists of as many attackers as leechers, it is possible to degrade the download rate by more than 1000 %. We propose a novel choking algorithm which is immune against bandwidth attacks and a countermeasure against the revealed attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On swarm-level resource allocation in BitTorrent communities

BitTorrent is a peer-to-peer computer network protocol for sharing content in an efficient and scalable way. Modeling and analysis of the popular private BitTorrent communities has become an active area of research. In these communities users are strongly incentivized to contribute their resources, i.e., to share their files. In BitTorrent terminology, users who have finished downloading files ...

متن کامل

BitStore: An Incentive-Compatible Solution for Blocked Downloads in BitTorrent

As many as 30% of all files shared on public BitTorrent networks suffer from the lack of “seeders” (peers that have complete copies of the file being shared); peers attempting to download such a file (“leechers”) may have to wait indefinitely to obtain certain file chunks that are not distributed in the file’s network of peers (the “swarm”). We call this the Blocked Leecher Problem (BLP). To al...

متن کامل

Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics

Despite its existing incentives for leecher cooperation, BitTorrent file sharing fundamentally relies on the presence of seeder peers. Seeder peers essentially operate outside the BitTorrent incentives, with two caveats: slow downlinks lead to increased numbers of “temporary” seeders (who left their console, but will terminate their seeder role when they return), and the copyright liability boo...

متن کامل

Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework

Peer-to-peer (P2P) networks such as Gnutella and BitTorrent have revolutionised Internet based applications. P2P approaches provide a number of benefits, however most cycle stealing projects, such as SETI@home, have concentrated on centralised methods which still require massive amounts of concentrated network bandwidth in order to scale. More recent P2P research has developed the concept of di...

متن کامل

On the Role of Helpers in Peer-to-Peer File Download Systems: Design, Analysis and Simulation

While BitTorrent has been successfully used in peerto-peer content distribution, its performance is limited by the fact that typical internet users have much lower upload bandwidths than download bandwidths. This asymmetry in bandwidth results in the overall average download speed of a BitTorrent-like file download system to be bottle-necked by the much lower upload capacity. This motivates our...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 46  شماره 

صفحات  -

تاریخ انتشار 2014