Modeling Leechers attack in BitTorrent

Lin Ye, Hongli Zhang, Xiaojiang Du

Research output: Contribution to journalConference articlepeer-review

Abstract

As one of the most widely-used Peer-to-Peer applications, BitTorrent system has gained a lot of successes in last decade. BitTorrent has been extensively studied in the literature. However, few research studies vulnerabilities of BitTorrent, and the abuses of BitTorrent have already impeded the wide adoption of the system. In this paper, we study a common attack on BitTorrent - the Leechers attack, which tries to take over valid connections of legitimate users without paying for them. It is harmful to a swarm if certain percentage of users perform the selfish behavior. We present an analytical model for the Leechers attack and we use the model to estimate the distribution of valid connections. Our model discovers the important factors that determine how harmful the attack is, and it can quantitatively predict the duration of downloading process under the attack. The real-world experimental results match well with our model, which demonstrates that the model is correct and useful.

Original languageEnglish
Article number7036886
Pages (from-to)681-685
Number of pages5
JournalProceedings - IEEE Global Communications Conference, GLOBECOM
DOIs
StatePublished - 2014
Event2014 IEEE Global Communications Conference, GLOBECOM 2014 - Austin, United States
Duration: 8 Dec 201412 Dec 2014

Keywords

  • BitTorrent
  • Leechers attack
  • Model

Fingerprint

Dive into the research topics of 'Modeling Leechers attack in BitTorrent'. Together they form a unique fingerprint.

Cite this