LeechLock: Preventing Selfish Clients in the BitTorrent Protocol

نویسندگان

  • John Locke
  • Russell Moriarty
چکیده

Although the BitTorrent protocol incentivizes sharing by increasing a peer’s download rate, tools have demonstrated that the tit-for-tat mechanism alone is insufficient to prevent peers from downloading content without reciprocation. We propose an enhancement to the BitTorrent protocol, called Leechlock, which uses globally shared tables to track peers’ ratings over time within the swarm. The selfish peers who contribute sufficiently little to the swarm will be marked as non-contributors, and denied further requests for pieces. We show that with LeechLock enabled in a BitTorrent swarm, selfish peers are able to download only a small amount of data before they are locked out of the swarm with 100% accuracy. Finally, we run simulation tests to explore the effects of additional swarm parameters in a controlled fashion.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selfish strategies affecting the BitTorrent protocol

Nowadays, peer to peer is one of the fastest ways to exchange files on the internet. The use of peer-topeer applications is slightly decreasing, especially when large video and audio files are considered. The reasons for this trend can be mainly identified in the alternative sources of data available on the internet, like video-sharing and music communities. In a well-designed peer to peer file...

متن کامل

Free-riding in BitTorrent Networks with the Large View Exploit

This paper presents an experimental study on the behavior of BitTorrent networks when selfish peers attempt to maintain high download rates without uploading. We modified a BitTorrent client so that it acquires a larger than normal view of a BitTorrent swarm and connects to all peers in its view. At the same time, the modified client does not upload any data to its peers. Our experimental resul...

متن کامل

Beyond Music File Sharing: A Technical Introduction to P2P Networks

Peer-to-peer systems have largely replaced the client-server architecture. There are different solutions for the arising problems of efficient object location, scalability, and robustness, resulting in different approaches. We give a short overview of the concepts of structured and unstructured peer-to-peer networks and discuss the handling of those problems in each case. In particular, the Bit...

متن کامل

Exploiting BitTorrent For Fun

This paper assesses BitTorrent’s robustness against selfish peers, who try to download more than their fair share by abusing existing protocol mechanisms. We design and implement three selfish-peer exploits and evaluate their effectiveness on public and private torrents. In practice, BitTorrent appears quite robust against this kind of exploit: selfish peers can sometimes obtain more bandwidth,...

متن کامل

Mitigating the Effect of Free-Riders in BitTorrent using Trusted Agents

Even though Peer-to-Peer (P2P) systems present a cost-effective and scalable solution to content distribution, most entertainment, media and software, content providers continue to rely on expensive, centralized solutions such as Content Delivery Networks. One of the main reasons is that the current P2P systems cannot guarantee reasonable performance as they depend on the willingness of users t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011