The P2P war: Someone is monitoring your activities
Computer Networks: The International Journal of Computer and Telecommunications Networking
BotTorrent: misusing BitTorrent to launch DDoS attacks
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
A measurement study of attacks on BitTorrent leechers
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Efficient blacklisting and pollution-level estimation in p2p file-sharing systems
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
A collaborative P2P scheme for NAT Traversal Server discovery based on topological information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
BTWorld: towards observing the global BitTorrent file-sharing network
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Pushing BitTorrent locality to the limit
Computer Networks: The International Journal of Computer and Telecommunications Networking
Omnify: investigating the visibility and effectiveness of copyright monitors
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Measuring the validity of peer-to-peer data for information retrieval applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A bird's eye view on the I2P anonymous file-sharing environment
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |
Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as not 'politically' correct, since it is associated with the controversial issue of detecting agencies that monitor Bittorrent for copyright infringement. However, deviant behavior detection and its associated blacklists might prove crucial for the well being of Bittorrent as there are other deviant entities in Bittorrent besides monitors. Our goal is to provide some initial heuristics that can be used to automatically detect deviant clients. We analyze for 45 days the top 600 torrents of Pirate Bay. We show that the empirical observation of Bittorrent clients can be used to detect deviant behavior, and consequently, it is possible to automatically build dynamic blacklists.