Reputation based approach for improved fairness and robustness in P2P protocols
Abstract Peer-to-Peer (P2P) overlay networks have gained popularity due to their
robustness, cost advantage, network efficiency and openness. Unfortunately, the same …
robustness, cost advantage, network efficiency and openness. Unfortunately, the same …
A measurement study of attacks on bittorrent seeds
We study a natural and potentially devastating attack against BitTorrent, namely, attacking
the initial seed in a torrent's early stages. The goal of this attack is to diminish the seed's …
the initial seed in a torrent's early stages. The goal of this attack is to diminish the seed's …
Measurement and mitigation of BitTorrent leecher attacks
In the recent past, anti-P2P companies have successfully curtailed the distribution of
targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey …
targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey …
A general proximity privacy principle
This work presents a systematic study of the problem of protecting general proximity privacy,
with findings applicable to most existing data models. Our contributions are multi-folded: we …
with findings applicable to most existing data models. Our contributions are multi-folded: we …
Stealing bandwidth from BitTorrent seeders
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant
progress has been made in understanding the BitTorrent choking mechanism, its security …
progress has been made in understanding the BitTorrent choking mechanism, its security …
discouraging improper exploitation against seeds in BitTorrent swarms
J Wang, X Wu, N Guo, C Ullrich… - … Conference on Cyber …, 2010 - ieeexplore.ieee.org
Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent
swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some …
swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some …
File Diffusion Control on Super-seed Mode over BitTorrent-like P2P networks
Y Kuwabara, J Funasaka… - 2010 7th International …, 2010 - ieeexplore.ieee.org
Both copyright infringements and information leaks using P2P file sharing software are
becoming big social issues. There are a lot of P2P file sharing software products, and …
becoming big social issues. There are a lot of P2P file sharing software products, and …
Who is going to be the next BitTorrent Peer Idol?
Active measurement studies show that the Peer-to-Peer (P2P) file sharing protocol Bit
Torrent is highly under attack. Moreover, malicious peers can easily exploit the original …
Torrent is highly under attack. Moreover, malicious peers can easily exploit the original …
[PDF][PDF] Swarming: como BitTorrent revolucionou a Internet
M Lehmann, RB Mansilha… - … em Informática. Ed …, 2011 - sites.unipampa.edu.br
BitTorrent is a file sharing Peer-to-Peer (P2P) application that has achieved great popularity,
becoming a de facto standard for swap** files in the Internet. To achieve such popularity …
becoming a de facto standard for swap** files in the Internet. To achieve such popularity …
[PDF][PDF] Attacks and exploits targeting BitTorrent and other P2P file sharing networks
A Hegenberg - Future Internet (FI), 2009 - Citeseer
This proceeding deals with various attacks and exploitations P2P networks have to cope
with. In the last few years BitTorrent became famous for spreading big amounts of data to …
with. In the last few years BitTorrent became famous for spreading big amounts of data to …