Reputation based approach for improved fairness and robustness in P2P protocols

FN Nwebonyi, R Martins, ME Correia - Peer-to-Peer Networking and …, 2019 - Springer
Abstract Peer-to-Peer (P2P) overlay networks have gained popularity due to their
robustness, cost advantage, network efficiency and openness. Unfortunately, the same …

A measurement study of attacks on bittorrent seeds

P Dhungel, X Hei, D Wu… - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
We study a natural and potentially devastating attack against BitTorrent, namely, attacking
the initial seed in a torrent's early stages. The goal of this attack is to diminish the seed's …

Measurement and mitigation of BitTorrent leecher attacks

P Dhungel, D Wu, KW Ross - Computer Communications, 2009 - Elsevier
In the recent past, anti-P2P companies have successfully curtailed the distribution of
targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey …

A general proximity privacy principle

T Wang, S Meng, B Bamba, L Liu… - 2009 IEEE 25th …, 2009 - ieeexplore.ieee.org
This work presents a systematic study of the problem of protecting general proximity privacy,
with findings applicable to most existing data models. Our contributions are multi-folded: we …

Stealing bandwidth from BitTorrent seeders

F Adamsky, SA Khayam, R Jäger, M Rajarajan - Computers & Security, 2014 - Elsevier
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant
progress has been made in understanding the BitTorrent choking mechanism, its security …

[PDF][PDF] Swarming: como BitTorrent revolucionou a Internet

M Lehmann, RB Mansilha… - … em Informática. Ed …, 2011 - sites.unipampa.edu.br
BitTorrent is a file sharing Peer-to-Peer (P2P) application that has achieved great popularity,
becoming a de facto standard for swapping files in the Internet. To achieve such popularity …

discouraging improper exploitation against seeds in BitTorrent swarms

J Wang, X Wu, N Guo, C Ullrich… - … Conference on Cyber …, 2010 - ieeexplore.ieee.org
Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent
swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some …

File Diffusion Control on Super-seed Mode over BitTorrent-like P2P networks

Y Kuwabara, J Funasaka… - 2010 7th International …, 2010 - ieeexplore.ieee.org
Both copyright infringements and information leaks using P2P file sharing software are
becoming big social issues. There are a lot of P2P file sharing software products, and …

Who is going to be the next BitTorrent Peer Idol?

F Adamsky, SA Khayam, R Jäger… - 2014 12th IEEE …, 2014 - ieeexplore.ieee.org
Active measurement studies show that the Peer-to-Peer (P2P) file sharing protocol Bit
Torrent is highly under attack. Moreover, malicious peers can easily exploit the original …

[PDF][PDF] Attacks and exploits targeting BitTorrent and other P2P file sharing networks

A Hegenberg - Future Internet (FI), 2009 - Citeseer
This proceeding deals with various attacks and exploitations P2P networks have to cope
with. In the last few years BitTorrent became famous for spreading big amounts of data to …