IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Making gnutella-like P2P systems scalable
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Faithfulness in internet algorithms
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Preferential and Strata based P2P Model: Selfishness to Altruism and Fairness
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent
P2P '07 Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing
Bittorrent is an auction: analyzing and improving bittorrent's incentives
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks
SRDS '08 Proceedings of the 2008 Symposium on Reliable Distributed Systems
Measurement and mitigation of BitTorrent leecher attacks
Computer Communications
LADC '09 Proceedings of the 2009 Fourth Latin-American Symposium on Dependable Computing
A measurement study of attacks on BitTorrent leechers
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Do incentives build robustness in bit torrent
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Hi-index | 0.00 |
BitTorrent has been widely used for the efficient distribution of files, such as digital content and media files, to very large numbers of users. However, previous work has exposed vulnerabilities in the protocol and demonstrated that they can be exploited to perform severe Denial-of-Service (DoS) attacks against BitTorrent networks. Earlier, we proposed two novel algorithms as countermeasures to particularly effective attacks, mitigating the problem, and evaluated through simulation. The present paper reviews the attacks previously identified and the countermeasure algorithms, experimentally evaluating their operation through both simulation and experiments on live BitTorrent swarms. Both simulation and experimental results observed with the implementation of attacks and countermeasures indicate that the algorithms are effective in holding DoS attacks and efficient when attacks are not present.