TY - JOUR
T1 - Modeling Leechers attack in BitTorrent
AU - Ye, Lin
AU - Zhang, Hongli
AU - Du, Xiaojiang
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - As one of the most widely-used Peer-to-Peer applications, BitTorrent system has gained a lot of successes in last decade. BitTorrent has been extensively studied in the literature. However, few research studies vulnerabilities of BitTorrent, and the abuses of BitTorrent have already impeded the wide adoption of the system. In this paper, we study a common attack on BitTorrent - the Leechers attack, which tries to take over valid connections of legitimate users without paying for them. It is harmful to a swarm if certain percentage of users perform the selfish behavior. We present an analytical model for the Leechers attack and we use the model to estimate the distribution of valid connections. Our model discovers the important factors that determine how harmful the attack is, and it can quantitatively predict the duration of downloading process under the attack. The real-world experimental results match well with our model, which demonstrates that the model is correct and useful.
AB - As one of the most widely-used Peer-to-Peer applications, BitTorrent system has gained a lot of successes in last decade. BitTorrent has been extensively studied in the literature. However, few research studies vulnerabilities of BitTorrent, and the abuses of BitTorrent have already impeded the wide adoption of the system. In this paper, we study a common attack on BitTorrent - the Leechers attack, which tries to take over valid connections of legitimate users without paying for them. It is harmful to a swarm if certain percentage of users perform the selfish behavior. We present an analytical model for the Leechers attack and we use the model to estimate the distribution of valid connections. Our model discovers the important factors that determine how harmful the attack is, and it can quantitatively predict the duration of downloading process under the attack. The real-world experimental results match well with our model, which demonstrates that the model is correct and useful.
KW - BitTorrent
KW - Leechers attack
KW - Model
UR - http://www.scopus.com/inward/record.url?scp=84949922572&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84949922572&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2014.7036886
DO - 10.1109/GLOCOM.2014.7036886
M3 - Conference article
AN - SCOPUS:84949922572
SN - 2334-0983
SP - 681
EP - 685
JO - Proceedings - IEEE Global Communications Conference, GLOBECOM
JF - Proceedings - IEEE Global Communications Conference, GLOBECOM
M1 - 7036886
T2 - 2014 IEEE Global Communications Conference, GLOBECOM 2014
Y2 - 8 December 2014 through 12 December 2014
ER -