P Dhungel, X Hei, D Wu… - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
We study a natural and potentially devastating attack against BitTorrent, namely, attacking the initial seed in a torrent's early stages. The goal of this attack is to diminish the seed's …
In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey …
T Wang, S Meng, B Bamba, L Liu… - 2009 IEEE 25th …, 2009 - ieeexplore.ieee.org
This work presents a systematic study of the problem of protecting general proximity privacy, with findings applicable to most existing data models. Our contributions are multi-folded: we …
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant progress has been made in understanding the BitTorrent choking mechanism, its security …
M Lehmann, RB Mansilha… - … em Informática. Ed …, 2011 - sites.unipampa.edu.br
BitTorrent is a file sharing Peer-to-Peer (P2P) application that has achieved great popularity, becoming a de facto standard for swapping files in the Internet. To achieve such popularity …
J Wang, X Wu, N Guo, C Ullrich… - … Conference on Cyber …, 2010 - ieeexplore.ieee.org
Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some …
Y Kuwabara, J Funasaka… - 2010 7th International …, 2010 - ieeexplore.ieee.org
Both copyright infringements and information leaks using P2P file sharing software are becoming big social issues. There are a lot of P2P file sharing software products, and …
F Adamsky, SA Khayam, R Jäger… - 2014 12th IEEE …, 2014 - ieeexplore.ieee.org
Active measurement studies show that the Peer-to-Peer (P2P) file sharing protocol Bit Torrent is highly under attack. Moreover, malicious peers can easily exploit the original …
A Hegenberg - Future Internet (FI), 2009 - Citeseer
This proceeding deals with various attacks and exploitations P2P networks have to cope with. In the last few years BitTorrent became famous for spreading big amounts of data to …