|Title||A Large-scale Active Measurement Study on the Effectiveness of Piece-Attack on BitTorrent Networks |
|Publication Type||Journal Article |
|Year of Publication||2015 |
|Authors||Fattaholmanan, A., and H. R. Rabiee |
|Journal||IEEE Transactions on Dependable and Secure Computing |
|Start Page||509 - 518 |
|Date Published||04/2015 |
|Accession Number||16269333 |
|Keywords||BitTorrent network, Internet attack., measurement study, peer-to-peer, Piece-Attack |
|Abstract||The peer to peer (P2P) file sharing applications have allocated a significant amount of today's Internet traffic. Among various P2P file sharing protocols, BitTorrent is the most common and popular one that attracts monthly a quarter of a billion users from all over the world. Similar to other P2P file sharing protocols, BitTorrent is mostly used for illegal sharing of copyright protected files such as movies, music and TV series. To impede this huge amount of illegal file distributions, anti-P2P companies have arisen to stand against these applications (specially the BitTorrent). To this end, they have begun to fire large-scale Internet attacks against BitTorrent networks.
In this paper, we are going to actively measure the impact of the Piece-Attack against BitTorrent networks. Our measurement is divided into five scenarios in order to figure out the constraint factors that influence the success of the attack. To be able to evaluate the attack in different experiments, we defined Attack Effectiveness to quantitatively verify the success of the attack.
Based on the measurement results, we discovered how it is possible to achieve significant outcome with modest amount of resources used by the attackers in hampering the illegal distribution of files in BitTorrent networks. |
|URL||<a href="/dmlsite/?q=%3Ca%20href%3D%22/dmlsite/%3Fq%3D%253Ca%2520href%253D%2522/dmlsite/%253Fq%253D%25253Ca%252520href%25253D%252522/dmlsite/%25253Fq%25253D%2525253Ca%25252520href%2525253D%25252522/dmlsite/%2525253Fq%2525253D%252525253Ca%2525252520href%25 |
|DOI||<a href="http://dx.doi.org/10.1109/TDSC.2015.2420561&amp;amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;amp;gt;10.1109/TDSC.2015.2420561&amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;a |