Measurement and mitigation of BitTorrent leecher attacks

Prithula Dhungel, Di Wu, Keith Ross

    Research output: Contribution to journalArticle

    Abstract

    In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In this paper, we analyze the resilience of BitTorrent leechers to two different kinds of attacks: the connection attack and the piece attack. We present the results of both passive and active measurements. Using passive measurements, we performed a detailed analysis of a recent album that is under attack, and identified the behavior of attackers. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Based on the measurement results, we discovered that BitTorrent architecture is fundamentally resilient to Internet leecher attacks. Finally, we also propose defense mechanisms to further mitigate the attacks and evaluate their effectiveness using trace-driven simulation.

    Original languageEnglish (US)
    Pages (from-to)1852-1861
    Number of pages10
    JournalComputer Communications
    Volume32
    Issue number17
    DOIs
    StatePublished - Nov 15 2009

    Fingerprint

    Industry
    Internet

    Keywords

    • BitTorrent Attack
    • Defense Mechanism
    • Security

    ASJC Scopus subject areas

    • Computer Networks and Communications

    Cite this

    Measurement and mitigation of BitTorrent leecher attacks. / Dhungel, Prithula; Wu, Di; Ross, Keith.

    In: Computer Communications, Vol. 32, No. 17, 15.11.2009, p. 1852-1861.

    Research output: Contribution to journalArticle

    Dhungel, Prithula ; Wu, Di ; Ross, Keith. / Measurement and mitigation of BitTorrent leecher attacks. In: Computer Communications. 2009 ; Vol. 32, No. 17. pp. 1852-1861.
    @article{e92379c0916341c784c08620b6b776d2,
    title = "Measurement and mitigation of BitTorrent leecher attacks",
    abstract = "In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In this paper, we analyze the resilience of BitTorrent leechers to two different kinds of attacks: the connection attack and the piece attack. We present the results of both passive and active measurements. Using passive measurements, we performed a detailed analysis of a recent album that is under attack, and identified the behavior of attackers. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Based on the measurement results, we discovered that BitTorrent architecture is fundamentally resilient to Internet leecher attacks. Finally, we also propose defense mechanisms to further mitigate the attacks and evaluate their effectiveness using trace-driven simulation.",
    keywords = "BitTorrent Attack, Defense Mechanism, Security",
    author = "Prithula Dhungel and Di Wu and Keith Ross",
    year = "2009",
    month = "11",
    day = "15",
    doi = "10.1016/j.comcom.2009.07.006",
    language = "English (US)",
    volume = "32",
    pages = "1852--1861",
    journal = "Computer Communications",
    issn = "0140-3664",
    publisher = "Elsevier",
    number = "17",

    }

    TY - JOUR

    T1 - Measurement and mitigation of BitTorrent leecher attacks

    AU - Dhungel, Prithula

    AU - Wu, Di

    AU - Ross, Keith

    PY - 2009/11/15

    Y1 - 2009/11/15

    N2 - In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In this paper, we analyze the resilience of BitTorrent leechers to two different kinds of attacks: the connection attack and the piece attack. We present the results of both passive and active measurements. Using passive measurements, we performed a detailed analysis of a recent album that is under attack, and identified the behavior of attackers. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Based on the measurement results, we discovered that BitTorrent architecture is fundamentally resilient to Internet leecher attacks. Finally, we also propose defense mechanisms to further mitigate the attacks and evaluate their effectiveness using trace-driven simulation.

    AB - In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In this paper, we analyze the resilience of BitTorrent leechers to two different kinds of attacks: the connection attack and the piece attack. We present the results of both passive and active measurements. Using passive measurements, we performed a detailed analysis of a recent album that is under attack, and identified the behavior of attackers. For our active measurements, we developed a crawler that contacts all the peers in any given swarm, determines whether the swarm is under attack, and identifies the attack peers in the swarm. We used the crawler to analyze 8 top box-office movies. Based on the measurement results, we discovered that BitTorrent architecture is fundamentally resilient to Internet leecher attacks. Finally, we also propose defense mechanisms to further mitigate the attacks and evaluate their effectiveness using trace-driven simulation.

    KW - BitTorrent Attack

    KW - Defense Mechanism

    KW - Security

    UR - http://www.scopus.com/inward/record.url?scp=69249230879&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=69249230879&partnerID=8YFLogxK

    U2 - 10.1016/j.comcom.2009.07.006

    DO - 10.1016/j.comcom.2009.07.006

    M3 - Article

    VL - 32

    SP - 1852

    EP - 1861

    JO - Computer Communications

    JF - Computer Communications

    SN - 0140-3664

    IS - 17

    ER -