Abstract
Peer-to-peer (P2P) networks and applications represent an efficient method of distributing various network contents across the Internet. Foremost among these networks is the BitTorrent protocol. While BitTorrent has become one of the most popular P2P applications, attacking BitTorrent applications recently began to arise. Although sources of the attacks may be different, their main goal is to slow down the distribution of files via BitTorrent networks. This paper provides an experimental study on peer attacks in the BitTorrent applications. Real BitTorrent network traffic was collected and analyzed, based on which, attacks were identified and classified. This study aims to better understand the current situation of attacks on BitTorrent applications and provide supports for developing possible approaches in the future to prevent such attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
NetworkMiner, http://sourceforge.net/projects/networkminer/
TorrentLoader 1.5 (October 2007), http://sourceforge.net/projects/torrentloader/
WireShark, http://www.wireshark.org/
Sandvine, Incorporated. 2008 Analysis of Traffic Demographics in North American Broadband Networks (June 2008), http://sandvine.com/general/documents/Traffic_Demographics_NA_Broadband_Networks.pdf
Cohen, B.: The BitTorrent Protocol Specification (February 2008), http://www.bittorrent.org/beps/bep_0003.html
Dhungel, P., Wu, D., Schonhorst, B., Ross, K.: A Measurement Study of Attacks on BitTorrent Leechers. In: The 7th International Workshop on Peer-to-Peer Systems (IPTPS) (February 2008)
Erman, D., Ilie, D., Popescu, A.: BitTorrent Session Characteristics and Models. In: Proceedings of HET-NETs 3rd International Working Conference on Performance Modeling and Evaluation of Heterogeneous Networks, West Yorkshire, U.K (July 2005)
Konrath, M.A., Barcellos, M.P., Mansilha, R.B.: Attacking a Swarm with a Band of Liars: Evaluating the Impact of Attacks on BitTorrent. In: Proceedings of IEEE P2P, Galway, Ireland (September 2007)
ParkerK, A.: P2P Media Summit. CacheLogic Research presentation at the First Annual P2P Media Summit LA, dcia.info/P2PMSLA/CacheLogic.ppt (October 2006)
Pouwelse, J., Garbacki, P., Epema, D.H.J., Sips, H.J.: The bittorrent P2P file-sharing system: Measurements and analysis. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol. 3640, pp. 205–216. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ksionsk, M., Ji, P., Chen, W. (2011). Attacks on BitTorrent – An Experimental Study. In: Lai, X., Gu, D., Jin, B., Wang, Y., Li, H. (eds) Forensics in Telecommunications, Information, and Multimedia. e-Forensics 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23602-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-23602-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23601-3
Online ISBN: 978-3-642-23602-0
eBook Packages: Computer ScienceComputer Science (R0)