Exploiting BitTorrent For Fun

نویسندگان

  • Nikitas Liogkas
  • Robert Nelson
  • Eddie Kohler
  • Lixia Zhang
چکیده

This paper assesses BitTorrent’s robustness against selfish peers, who try to download more than their fair share by abusing existing protocol mechanisms. We design and implement three selfish-peer exploits and evaluate their effectiveness on public and private torrents. In practice, BitTorrent appears quite robust against this kind of exploit: selfish peers can sometimes obtain more bandwidth, and honest peers’ download rates suffer slightly in consequence, but we observe no considerable degradation of the system’s quality of service. We identify private-torrent scenarios in which a selfish peer could benefit more significantly at the expense of honest peers, and discuss the BitTorrent protocol mechanisms that lead to robustness by rendering these scenarios infeasible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Crawling BitTorrent DHTs for Fun and Profit

This paper presents two kinds of attacks based on crawling the DHTs used for distributed BitTorrent tracking. First, we show how pirates can use crawling to rebuild BitTorrent search engines just a few hours after they are shut down (crawling for fun). Second, we show how content owners can use related techniques to monitor pirates’ behavior in preparation for legal attacks and negate any perce...

متن کامل

P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks

In this paper, we demonstrate that the BitTorrent protocol family is vulnerable to distributed reflective denialof-service (DRDoS) attacks. Specifically, we show that an attacker can exploit BitTorrent protocols (Micro Transport Protocol (uTP) [32], Distributed Hash Table (DHT) [30], Message Stream Encryption (MSE) [8]) and BitTorrent Sync (BTSync) [6] to reflect and amplify traffic from peers....

متن کامل

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in pra...

متن کامل

A Scalable Method for Taking Detailed and Accurate Geo* Snapshots of Large P2P Networks

Peer-to-peer file-sharing systems offer high transfer speed at remarkably low data ownership cost. In many cases, the transfer speed can be increased if the users possess timely and accurate information over the location of other users. Furthermore, robustness and fault tolerance, issues of intense research investigation, are inextricably linked with the location and activity of the network use...

متن کامل

Peeking through the BitTorrent Seedbox Hosting Ecosystem

In this paper, we propose a lightweight method for detecting and classifying BitTorrent content providers with a minimal amount of resources. While heavy methodologies are typically used (which require long term observation and data exchange with peers of the swarm and/or a semantic analysis of torrent websites), we instead argue that such complexity can be avoided by analyzing the correlations...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006