Exploiting BitTorrent For Fun
نویسندگان
چکیده
This paper assesses BitTorrent’s robustness against selfish peers, who try to download more than their fair share by abusing existing protocol mechanisms. We design and implement three selfish-peer exploits and evaluate their effectiveness on public and private torrents. In practice, BitTorrent appears quite robust against this kind of exploit: selfish peers can sometimes obtain more bandwidth, and honest peers’ download rates suffer slightly in consequence, but we observe no considerable degradation of the system’s quality of service. We identify private-torrent scenarios in which a selfish peer could benefit more significantly at the expense of honest peers, and discuss the BitTorrent protocol mechanisms that lead to robustness by rendering these scenarios infeasible.
منابع مشابه
Crawling BitTorrent DHTs for Fun and Profit
This paper presents two kinds of attacks based on crawling the DHTs used for distributed BitTorrent tracking. First, we show how pirates can use crawling to rebuild BitTorrent search engines just a few hours after they are shut down (crawling for fun). Second, we show how content owners can use related techniques to monitor pirates’ behavior in preparation for legal attacks and negate any perce...
متن کاملP2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks
In this paper, we demonstrate that the BitTorrent protocol family is vulnerable to distributed reflective denialof-service (DRDoS) attacks. Specifically, we show that an attacker can exploit BitTorrent protocols (Micro Transport Protocol (uTP) [32], Distributed Hash Table (DHT) [30], Message Stream Encryption (MSE) [8]) and BitTorrent Sync (BTSync) [6] to reflect and amplify traffic from peers....
متن کاملOne Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in pra...
متن کاملA Scalable Method for Taking Detailed and Accurate Geo* Snapshots of Large P2P Networks
Peer-to-peer file-sharing systems offer high transfer speed at remarkably low data ownership cost. In many cases, the transfer speed can be increased if the users possess timely and accurate information over the location of other users. Furthermore, robustness and fault tolerance, issues of intense research investigation, are inextricably linked with the location and activity of the network use...
متن کاملPeeking through the BitTorrent Seedbox Hosting Ecosystem
In this paper, we propose a lightweight method for detecting and classifying BitTorrent content providers with a minimal amount of resources. While heavy methodologies are typically used (which require long term observation and data exchange with peers of the swarm and/or a semantic analysis of torrent websites), we instead argue that such complexity can be avoided by analyzing the correlations...
متن کامل