Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Research Article

Attacks on BitTorrent – An Experimental Study

Download
655 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_7,
        author={Marti Ksionsk and Ping Ji and Weifeng Chen},
        title={Attacks on BitTorrent -- An Experimental Study},
        proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={10},
        keywords={},
        doi={10.1007/978-3-642-23602-0_7}
    }
    
  • Marti Ksionsk
    Ping Ji
    Weifeng Chen
    Year: 2012
    Attacks on BitTorrent – An Experimental Study
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-23602-0_7
Marti Ksionsk1,*, Ping Ji1,*, Weifeng Chen2,*
  • 1: City University of New York
  • 2: California University of Pennsylvania
*Contact email: glassnickels@gmail.com, pji@jjay.cuny.edu, chen@calu.edu

Abstract

Peer-to-peer (P2P) networks and applications represent an efficient method of distributing various network contents across the Internet. Foremost among these networks is the BitTorrent protocol. While BitTorrent has become one of the most popular P2P applications, attacking BitTorrent applications recently began to arise. Although sources of the attacks may be different, their main goal is to slow down the distribution of files via BitTorrent networks. This paper provides an experimental study on peer attacks in the BitTorrent applications. Real BitTorrent network traffic was collected and analyzed, based on which, attacks were identified and classified. This study aims to better understand the current situation of attacks on BitTorrent applications and provide supports for developing possible approaches in the future to prevent such attacks.