Skip to main content

Monitoring the Bittorrent Monitors: A Bird’s Eye View

  • Conference paper
Passive and Active Network Measurement (PAM 2009)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5448))

Included in the following conference series:

Abstract

Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as not ’politically’ correct, since it is associated with the controversial issue of detecting agencies that monitor Bittorrent for copyright infringement. However, deviant behavior detection and its associated blacklists might prove crucial for the well being of Bittorrent as there are other deviant entities in Bittorrent besides monitors. Our goal is to provide some initial heuristics that can be used to automatically detect deviant clients. We analyze for 45 days the top 600 torrents of Pirate Bay. We show that the empirical observation of Bittorrent clients can be used to detect deviant behavior, and consequently, it is possible to automatically build dynamic blacklists.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Banerjee, A., Faloutsos, M., Bhuyan, L.: The p2p war: Someone is monitoring your activities. Comput. Netw. 52(6), 1272–1280 (2008)

    Article  Google Scholar 

  2. The Pirate Bay. Top 100 torrents per category, http://thepiratebay.org/top

  3. Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: misusing bittorrent to launch ddos attacks. In: SRUTI 2007: Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet, Santa Clara, CA, pp. 1–6. USENIX Association (2007)

    Google Scholar 

  4. Dhungel, P., Di Wu, B.S., Ross, K.W.: A measurement study of attacks on bittorrent leechers. In: Proc. IPTPS (2008)

    Google Scholar 

  5. iBlocklists. iblocklists, http://iblocklist.com/lists.php

  6. Liang, J., Naoumov, N., Ross, K.W.: Efficient blacklisting and pollution-level estimation in P2P file-sharing systems. In: Cho, K., Jacquet, P. (eds.) AINTEC 2005. LNCS, vol. 3837, pp. 1–21. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Piatek, M., Kohno, T., Krishnamurthy, A.: Challenges and directions for monitoring p2p file sharing networks or why my printer received a DMCA takedown notice. In: Proc. of 3rd USENIX Workshop on Hot Topics in Security (HotSec 2008) (2008)

    Google Scholar 

  8. Siganos, G., Rodriguez, P.: APOLLO: Network transparency through a pirate’s spyglass. under preparation (2009), http://research.tid.es/georgos/images/apollo_client.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Siganos, G., Pujol, J.M., Rodriguez, P. (2009). Monitoring the Bittorrent Monitors: A Bird’s Eye View. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds) Passive and Active Network Measurement. PAM 2009. Lecture Notes in Computer Science, vol 5448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00975-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00975-4_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00974-7

  • Online ISBN: 978-3-642-00975-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics