Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Keyword Search in DHT-Based Peer-to-Peer Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Proof: A DHT-Based Peer-to-Peer Search Engine
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
An Architecture for Hybrid P2P Free-Text Search
CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
LEET'10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Unraveling the BitTorrent Ecosystem
IEEE Transactions on Parallel and Distributed Systems
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Only the good... get pirated: game piracy activity vs. metacritic score
Proceedings of the 6th International Conference on Foundations of Digital Games
Distribution of digital games via BitTorrent
Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments
Patterns in the distribution of digital games via BitTorrent
International Journal of Advanced Media and Communication
Hi-index | 0.00 |
This paper presents two kinds of attacks based on crawling the DHTs used for distributed BitTorrent tracking. First, we show how pirates can use crawling to rebuild BitTorrent search engines just a few hours after they are shut down (crawling for fun). Second, we show how content owners can use related techniques to monitor pi-rates' behavior in preparation for legal attacks and negate any perceived anonymity of the decentralized BitTorrent architecture (crawling for profit). We validate these attacks and measure their performance with a crawler we developed for the Vuze DHT. We find that we can establish a search engine with over one million torrents in under two hours using a single desktop PC. We also track 7.9 million IP addresses downloading 1.5 million torrents over 16 days. These results imply that shifting from centralized BitTorrent tracking to DHT-based tracking will have mixed results for the file sharing arms race. While it will likely make illicit torrents harder to quash, it will not help users hide their activities.