TY - JOUR
T1 - Preventing piracy content propagation in peer-to-peer networks
AU - Zhang, Hongli
AU - Ye, Lin
AU - Shi, Jiantao
AU - Du, Xiaojiang
AU - Chen, Hsiao Hwa
PY - 2013
Y1 - 2013
N2 - Peer-to-Peer (P2P) networks have been widely used in various Internet applications. However, P2P networks also cause serious concerns of copyrighted contents piracy: P2P helps to pirate copyrighted contents, which impedes wide application of P2P networks. In this paper, we investigate several important issues on the ways to prevent pirated content propagation in P2P networks. We propose a system to stop pirated content propagation by utilizing several attacks to BitTorrent (BT). First, we design a system that can handle a large number of concurrent connections to reduce bandwidth consumption. Second, we build two mathematical models for BT attacks, including leechers behavior model and fake-block behavior model, and we analyze the performance of the system using these models. Third, we optimize BT clients by taking into account different implementations and counter-measure designs. We conducted several experiments in real networks, the results of which verified that our system is suitable for most current BT clients, and BT clients' download duration is extended at least three times longer, which is much better than the results reported in the literature.
AB - Peer-to-Peer (P2P) networks have been widely used in various Internet applications. However, P2P networks also cause serious concerns of copyrighted contents piracy: P2P helps to pirate copyrighted contents, which impedes wide application of P2P networks. In this paper, we investigate several important issues on the ways to prevent pirated content propagation in P2P networks. We propose a system to stop pirated content propagation by utilizing several attacks to BitTorrent (BT). First, we design a system that can handle a large number of concurrent connections to reduce bandwidth consumption. Second, we build two mathematical models for BT attacks, including leechers behavior model and fake-block behavior model, and we analyze the performance of the system using these models. Third, we optimize BT clients by taking into account different implementations and counter-measure designs. We conducted several experiments in real networks, the results of which verified that our system is suitable for most current BT clients, and BT clients' download duration is extended at least three times longer, which is much better than the results reported in the literature.
KW - BitTorrent
KW - Peer-to-peer networking
KW - piracy prevention
UR - http://www.scopus.com/inward/record.url?scp=84883314050&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883314050&partnerID=8YFLogxK
U2 - 10.1109/JSAC.2013.SUP.0513010
DO - 10.1109/JSAC.2013.SUP.0513010
M3 - Article
AN - SCOPUS:84883314050
SN - 0733-8716
VL - 31
SP - 105
EP - 114
JO - IEEE Journal on Selected Areas in Communications
JF - IEEE Journal on Selected Areas in Communications
IS - 9
M1 - 6560045
ER -