首页 | 本学科首页   官方微博 | 高级检索  
     


Measurement and mitigation of BitTorrent leecher attacks
Authors:Prithula Dhungel  Di Wu  Keith W Ross  
Affiliation:aDepartment of Computer & Information Science, Polytechnic Institute of New York University, Brooklyn, NY 11201, United States;bSchool of Information Science & Technology, Sun Yat-Sen University, Guangzhou, 510275, China
Abstract:In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In this paper, we analyze the resilience of BitTorrent leechers to two different kinds of attacks: the connection attack and the piece attack. We present the results of both passive and active measurements. Using passive measurements, we performed a detailed analysis of a recent album that is under attack, and identified the behavior of attackers. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Based on the measurement results, we discovered that BitTorrent architecture is fundamentally resilient to Internet leecher attacks. Finally, we also propose defense mechanisms to further mitigate the attacks and evaluate their effectiveness using trace-driven simulation.
Keywords:BitTorrent Attack  Security  Defense Mechanism
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号