LeechLock: Preventing Selfish Clients in the BitTorrent Protocol
نویسندگان
چکیده
Although the BitTorrent protocol incentivizes sharing by increasing a peer’s download rate, tools have demonstrated that the tit-for-tat mechanism alone is insufficient to prevent peers from downloading content without reciprocation. We propose an enhancement to the BitTorrent protocol, called Leechlock, which uses globally shared tables to track peers’ ratings over time within the swarm. The selfish peers who contribute sufficiently little to the swarm will be marked as non-contributors, and denied further requests for pieces. We show that with LeechLock enabled in a BitTorrent swarm, selfish peers are able to download only a small amount of data before they are locked out of the swarm with 100% accuracy. Finally, we run simulation tests to explore the effects of additional swarm parameters in a controlled fashion.
منابع مشابه
Selfish strategies affecting the BitTorrent protocol
Nowadays, peer to peer is one of the fastest ways to exchange files on the internet. The use of peer-topeer applications is slightly decreasing, especially when large video and audio files are considered. The reasons for this trend can be mainly identified in the alternative sources of data available on the internet, like video-sharing and music communities. In a well-designed peer to peer file...
متن کاملFree-riding in BitTorrent Networks with the Large View Exploit
This paper presents an experimental study on the behavior of BitTorrent networks when selfish peers attempt to maintain high download rates without uploading. We modified a BitTorrent client so that it acquires a larger than normal view of a BitTorrent swarm and connects to all peers in its view. At the same time, the modified client does not upload any data to its peers. Our experimental resul...
متن کاملBeyond Music File Sharing: A Technical Introduction to P2P Networks
Peer-to-peer systems have largely replaced the client-server architecture. There are different solutions for the arising problems of efficient object location, scalability, and robustness, resulting in different approaches. We give a short overview of the concepts of structured and unstructured peer-to-peer networks and discuss the handling of those problems in each case. In particular, the Bit...
متن کاملExploiting BitTorrent For Fun
This paper assesses BitTorrent’s robustness against selfish peers, who try to download more than their fair share by abusing existing protocol mechanisms. We design and implement three selfish-peer exploits and evaluate their effectiveness on public and private torrents. In practice, BitTorrent appears quite robust against this kind of exploit: selfish peers can sometimes obtain more bandwidth,...
متن کاملMitigating the Effect of Free-Riders in BitTorrent using Trusted Agents
Even though Peer-to-Peer (P2P) systems present a cost-effective and scalable solution to content distribution, most entertainment, media and software, content providers continue to rely on expensive, centralized solutions such as Content Delivery Networks. One of the main reasons is that the current P2P systems cannot guarantee reasonable performance as they depend on the willingness of users t...
متن کامل