Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
IDA '01 Proceedings of the 4th International Conference on Advances in Intelligent Data Analysis
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
Mining communities in networks: a solution for consistency and its evaluation
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
On finding graph clusterings with maximum modularity
WG'07 Proceedings of the 33rd international conference on Graph-theoretic concepts in computer science
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
Is content publishing in BitTorrent altruistic or profit-driven?
Proceedings of the 6th International COnference
On long-term social relationships in peer-to-peer systems
Proceedings of the Nineteenth International Workshop on Quality of Service
Distribution of digital games via BitTorrent
Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments
Patterns in the distribution of digital games via BitTorrent
International Journal of Advanced Media and Communication
On defining and computing communities
CATS '12 Proceedings of the Eighteenth Computing: The Australasian Theory Symposium - Volume 128
Unveiling the incentives for content publishing in popular BitTorrent portals
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
While P2P systems benefit from large numbers of interconnected nodes, each of these connections provides an opportunity for eavesdropping. Using only the connection patterns gathered from 10,000 BitTorrent (BT) users during a one-month period, we determine whether randomized connection patterns give rise to communities of users. Even though connections in BT require not only shared interest in content, but also concurrent sessions, we find that strong communities naturally form - users inside a typical community are 5 to 25 times more likely to connect to each other than with users outside. These strong communities enable guilt by association, where the behavior of an entire community of users can be inferred by monitoring one of its members. Our study shows that through a single observation point, an attacker trying to identify such communities can uncover 50% of the network within a distance of two hops. Finally, we propose and evaluate a practical solution that mitigates this threat.