Bitstalker: Accurately and efficiently monitoring bittorrent traffic

Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    BitTorrent is currently the most popular peer-to-peer network for file sharing. However, experience has shown that Bit-Torrent is often used to distribute copyright protected movie and music files illegally. Consequently, copyright enforcement agencies currently monitor BitTorrent swarms to identify users participating in the illegal distribution of copyrightprotected files. These investigations rely on passive methods that are prone to a variety of errors, particularly false positive identification. To mitigate the potential for false positive peer identification, we investigate the feasibility of using active methods to monitor extremely large BitTorrent swarms. We develop an active probing framework called Bit Stalker that identifies active peers and collects concrete forensic evidence that they were involved in sharing a particular file. We evaluate the effectiveness of this approach through a measurement study with real, large torrents consisting of over 186,000 peers. We find that the current investigative methods produce at least 11% false positives, while we show that false positives are rare with our active approach.

    Original languageEnglish (US)
    Title of host publicationProceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009
    Pages181-185
    Number of pages5
    DOIs
    StatePublished - Dec 1 2009
    Event2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009 - London, United Kingdom
    Duration: Dec 6 2009Dec 9 2009

    Publication series

    NameProceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009

    Other

    Other2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009
    CountryUnited Kingdom
    CityLondon
    Period12/6/0912/9/09

      Fingerprint

    Keywords

    • Data mining for forensic evidence

    ASJC Scopus subject areas

    • Computer Science Applications
    • Information Systems
    • Information Systems and Management
    • Safety, Risk, Reliability and Quality

    Cite this

    Bauer, K., McCoy, D., Grunwald, D., & Sicker, D. (2009). Bitstalker: Accurately and efficiently monitoring bittorrent traffic. In Proceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009 (pp. 181-185). [5386457] (Proceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009). https://doi.org/10.1109/WIFS.2009.5386457