Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Incentives in BitTorrent induce free riding
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Exploiting P2P systems for DDoS attacks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent
P2P '07 Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing
Peer-to-peer botnets: overview and case study
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
BotTorrent: misusing BitTorrent to launch DDoS attacks
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
DDoS Attacks by Subverting Membership Management in P2P Systems
NPSEC '07 Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
A measurement study of attacks on BitTorrent leechers
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Do incentives build robustness in bit torrent
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
The bittorrent p2p file-sharing system: measurements and analysis
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Misusing unstructured p2p systems to perform dos attacks: the network that never forgets
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Defending against Sybil nodes in BitTorrent
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT
Computer Communications
Denial-of-service attacks and countermeasures on BitTorrent
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.24 |
In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In this paper, we analyze the resilience of BitTorrent leechers to two different kinds of attacks: the connection attack and the piece attack. We present the results of both passive and active measurements. Using passive measurements, we performed a detailed analysis of a recent album that is under attack, and identified the behavior of attackers. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Based on the measurement results, we discovered that BitTorrent architecture is fundamentally resilient to Internet leecher attacks. Finally, we also propose defense mechanisms to further mitigate the attacks and evaluate their effectiveness using trace-driven simulation.