Abstract
Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as not ’politically’ correct, since it is associated with the controversial issue of detecting agencies that monitor Bittorrent for copyright infringement. However, deviant behavior detection and its associated blacklists might prove crucial for the well being of Bittorrent as there are other deviant entities in Bittorrent besides monitors. Our goal is to provide some initial heuristics that can be used to automatically detect deviant clients. We analyze for 45 days the top 600 torrents of Pirate Bay. We show that the empirical observation of Bittorrent clients can be used to detect deviant behavior, and consequently, it is possible to automatically build dynamic blacklists.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Banerjee, A., Faloutsos, M., Bhuyan, L.: The p2p war: Someone is monitoring your activities. Comput. Netw. 52(6), 1272–1280 (2008)
The Pirate Bay. Top 100 torrents per category, http://thepiratebay.org/top
Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: misusing bittorrent to launch ddos attacks. In: SRUTI 2007: Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet, Santa Clara, CA, pp. 1–6. USENIX Association (2007)
Dhungel, P., Di Wu, B.S., Ross, K.W.: A measurement study of attacks on bittorrent leechers. In: Proc. IPTPS (2008)
iBlocklists. iblocklists, http://iblocklist.com/lists.php
Liang, J., Naoumov, N., Ross, K.W.: Efficient blacklisting and pollution-level estimation in P2P file-sharing systems. In: Cho, K., Jacquet, P. (eds.) AINTEC 2005. LNCS, vol. 3837, pp. 1–21. Springer, Heidelberg (2005)
Piatek, M., Kohno, T., Krishnamurthy, A.: Challenges and directions for monitoring p2p file sharing networks or why my printer received a DMCA takedown notice. In: Proc. of 3rd USENIX Workshop on Hot Topics in Security (HotSec 2008) (2008)
Siganos, G., Rodriguez, P.: APOLLO: Network transparency through a pirate’s spyglass. under preparation (2009), http://research.tid.es/georgos/images/apollo_client.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Siganos, G., Pujol, J.M., Rodriguez, P. (2009). Monitoring the Bittorrent Monitors: A Bird’s Eye View. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds) Passive and Active Network Measurement. PAM 2009. Lecture Notes in Computer Science, vol 5448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00975-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-00975-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00974-7
Online ISBN: 978-3-642-00975-4
eBook Packages: Computer ScienceComputer Science (R0)