Research Article
Attacks on BitTorrent – An Experimental Study
@INPROCEEDINGS{10.1007/978-3-642-23602-0_7, author={Marti Ksionsk and Ping Ji and Weifeng Chen}, title={Attacks on BitTorrent -- An Experimental Study}, proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, proceedings_a={E-FORENSICS}, year={2012}, month={10}, keywords={}, doi={10.1007/978-3-642-23602-0_7} }
- Marti Ksionsk
Ping Ji
Weifeng Chen
Year: 2012
Attacks on BitTorrent – An Experimental Study
E-FORENSICS
Springer
DOI: 10.1007/978-3-642-23602-0_7
Abstract
Peer-to-peer (P2P) networks and applications represent an efficient method of distributing various network contents across the Internet. Foremost among these networks is the BitTorrent protocol. While BitTorrent has become one of the most popular P2P applications, attacking BitTorrent applications recently began to arise. Although sources of the attacks may be different, their main goal is to slow down the distribution of files via BitTorrent networks. This paper provides an experimental study on peer attacks in the BitTorrent applications. Real BitTorrent network traffic was collected and analyzed, based on which, attacks were identified and classified. This study aims to better understand the current situation of attacks on BitTorrent applications and provide supports for developing possible approaches in the future to prevent such attacks.