Measurement and mitigation of BitTorrent leecher attacks

被引:14
作者
Dhungel, Prithula [2 ]
Wu, Di [1 ]
Ross, Keith W. [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Polytech Inst New York, Dept Comp & Informat Sci, Brooklyn, NY 11201 USA
关键词
BitTorrent Attack; Security; Defense Mechanism;
D O I
10.1016/j.comcom.2009.07.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In this paper, we analyze the resilience of BitTorrent leechers to two different kinds of attacks: the connection attack and the piece attack. We present the results of both passive and active measurements. Using passive measurements, we performed a detailed analysis of a recent album that is under attack, and identified the behavior of attackers. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Based on the measurement results. we discovered that BitTorrent architecture is fundamentally resilient to Internet leecher attacks. Finally, we also propose defense mechanisms to further mitigate the attacks and evaluate their effectiveness using trace-driven simulation. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1852 / 1861
页数:10
相关论文
共 27 条
[1]  
[Anonymous], LEAKED MEDIADEFENDER
[2]  
[Anonymous], BITTORRENT MORE POPU
[3]  
[Anonymous], PEERGUARDIAN
[4]  
[Anonymous], BITTORRENT CLIENT
[5]  
[Anonymous], BITTORRENT SERVERS A
[6]  
[Anonymous], P2P MONITORING SYSTE
[7]  
[Anonymous], ZIPTORRENT BLACKLIST
[8]  
ATHANASOPOULOS E, 2006, P 4 INT C APPL CRYPT
[9]  
BANERJEE A, 2007, P IFIP NETW ATL GA
[10]  
CHRISTIN N, 2005, P ACM EC