A Reputation System for Bittorrent Peer-To-Peer File-Sharing Networks

Total Page:16

File Type:pdf, Size:1020Kb

A Reputation System for Bittorrent Peer-To-Peer File-Sharing Networks University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year A reputation system for BitTorrent peer-to-peer file-sharing networks Lan Yu University of Wollongong Yu, Lan, A reputation system for BitTorrent peer-to-peer file-sharing networks, M.Comp.Sc. thesis, Information Technology and Computer Science, University of Wollongong, 2006. http://ro.uow.edu.au/theses/637 This paper is posted at Research Online. http://ro.uow.edu.au/theses/637 NIVERSITY U OF WOLLONGONG A Reputation System for BitTorrent Peer-to-Peer File-sharing Networks A thesis submitted in fulfillment of the requirements for the award of the degree Master of Computer Science by Research from UNIVERSITY OF WOLLONGONG by Lan YU Faculty of Informatics August 2006 c Copyright 2006 by Lan YU All Rights Reserved ii Dedicated to My family iii Declaration This is to certify that the work reported in this thesis was done by the author, unless specified otherwise, and that no part of it has been submitted in a thesis to any other university or similar institution. Lan YU August 31, 2006 iv Abstract Over the past few years, Peer-to-Peer (P2P) networks have grown extensively and dramatically changed large-scale file transfer. One of the most popular P2P network is the BitTorrent system. BitTorrent can efficiently distribute large files by optimiz- ing the use of network bandwidth and providing scalability. Due to the open and anonymous nature of P2P systems BitTorrent also provides an ideal environment for distribution of malicious, low quality, or doctored information. A number of reputation systems, including P2PRep with its successors XRep and X2Rep, had been proposed to address security weaknesses of Gnutella P2P file sharing networks. Although it has been claimed that these methods are also applicable to the other file sharing networks, it is not clear how to achieve this task. Moreover, some of the shortcomings of these reputation systems such as online-polling only and cold-start may be exploited by ma- licious attackers. In this paper, we propose a reputation system, called X2BTRep, which is an extension of the X2Rep and for BitTorrent network. We show that the proposed system improves the security and the quality of information distributed over P2P networks. v Acknowledgements First of all, I would like to make a grateful acknowledgement to Rei Safavi-Naini, my supervisor, for pointing me to the right direction on my research, Network Security in Peer to Peer System. During this research, she provided me many valuable advices and constant support. Also, my sincere appreciation goes to Willy Susilo, my co-supervisor, for his guidance through the past two years of chaos and confusion on my study and life. Moreover, I am thankful to Juliet Richardson, International Study Program Coor- dinator, for her carefully reading the draft and offering grammar correcting and writing suggestions. Additionally, my thanks go to all staff in my Faculty, School of Information Tech- nology and Computer Science, for their offering many facilities, including space,soft and hardware, telephone, etc. to support my research. Furthermore, I appreciated my family and friends for their encouragement helping me to finish this research. vi Publications L. Yu. X2BTRep trusted reputation system: A robust mechanism for P2P networks. HDR Student Conference, University of Wollongong, Australia, August 2006. L. Yu, W. Susilo, and R. Safavi-Naini. X2BTRep trusted reputation system: A robust mechanism for P2P networks. The 5th International Conference on Cryptology and Network Security, China, August 2006. vii Contents Abstract v Acknowledgements vi Publications vii 1 Introduction 1 1.1 AimsandObjectives ............................ 2 1.2 StructureoftheThesis ........................... 3 1.3 OurContribution .............................. 3 1.4 Glossary................................... 4 1.5 Notations .................................. 4 2 Peer-to-Peer: Now and the Future 6 2.1 WhatisaP2PNetwork?.......................... 6 2.2 Generational Evolution of P2P Networks . ... 8 2.2.1 FirstGeneration–CentralisedP2P . 8 2.2.2 Second Generation – Decentralised P2P . 11 2.2.3 ThirdGeneration–HybridP2P . 14 2.2.4 CurrentDevelopments . 17 2.3 Advantages and Weaknesses of P2P Networks . .. 20 2.4 Summary .................................. 22 3 Previous Studies of Reputation Systems 23 3.1 Introduction................................. 23 3.2 eBay..................................... 23 3.3 P2PRep ................................... 25 3.4 XRep..................................... 29 3.5 X2Rep.................................... 31 viii 3.6 Credence................................... 33 3.7 Summary .................................. 35 4 Overview of BitTorrent Network 37 4.1 Introduction................................. 37 4.2 Architecture................................. 37 4.3 ProtocolSpecification. 39 4.3.1 Bencoding.............................. 39 4.3.2 MetainfoFile(.torrentfile). 40 4.3.3 TrackerHTTPprotocol . 41 4.3.4 PeerTCPProtocol ......................... 43 4.4 StrengthsofBitTorrent. 45 4.5 ShortcomingsofBitTorrent . 46 4.5.1 Distributionoffalseinformation . .. 46 4.5.2 Man-in-middleattack. 47 4.5.3 IPharvesting ............................ 47 4.6 Summary .................................. 48 5 A Robust Reputation Management System – X2BTRep 49 5.1 Introduction................................. 49 5.2 Principle of our Management Model . 49 5.2.1 Assumptions............................. 49 5.2.2 DistributedRepositories . 50 5.2.3 Voting ................................ 50 5.2.4 CentralisedRepositories . 51 5.2.5 SecureSocketsLayer . 51 5.3 Further Discussion of Two Novel Algorithms . .... 51 5.3.1 Credibility Award Algorithm . 52 5.3.2 Credibility Chain Exchange . 52 5.4 ProtocolDesigns .............................. 53 5.4.1 Initialisation Phase: Enhanced Torrent Creation . ...... 53 5.4.2 Phase1:TorrentSearch . 54 5.4.3 Phase2:ExchangeofVotes . 54 5.4.4 Phase3:VotesEvaluation.. 55 5.4.5 Phase4:TrackerQueries. 57 5.4.6 Phase 5: Pieces and Credibility Chain Exchange . ... 57 ix 5.4.7 Phase 6: Updating and Voting Reputation Value . 58 5.5 Summary .................................. 59 6 Critical Evaluation of X2BTRep 60 6.1 Introduction................................. 60 6.2 Assessment of X2BTRep.......................... 60 6.3 Attacks on BitTorrent-like systems . ... 62 6.3.1 Defectionattack........................... 62 6.3.2 Poisoning attack & Insertion of viruses in carried data ..... 62 6.3.3 Denialofserviceattack. 62 6.3.4 Malware software in BitTorrent networks . .. 63 6.3.5 Identityattack ........................... 63 6.3.6 Spamming.............................. 63 6.4 Attacks on Reputation-based Systems . ... 63 6.4.1 Pseudospoofing ........................... 63 6.4.2 Reputationspoofing . .. .. 64 6.4.3 Whitewashingattack . 64 6.4.4 Reputationattackbycollectives . 64 6.4.5 Referralattack ........................... 65 6.5 Summary .................................. 65 7 Implementation and Interpretation of Experiment 67 7.1 Introduction................................. 67 7.2 Implementation of X2BTRep in the BitTorrent Environment . 67 7.2.1 X2BTRepExtensionstoBitTorrent . 67 7.2.2 RepositorySchema . .. .. 69 7.2.3 AdditionalProtocolMessages . 70 7.3 Experiment ................................. 71 7.3.1 I.IntentionofExperiment . 71 7.3.2 II.ExperimentSetting . 71 7.3.3 III.WorkingPrinciple . 72 7.3.4 IV.MaliciousStrategies . 73 7.3.5 V.SimulationResult . 75 7.3.6 VI. Conclusion of Our Experiment . 77 7.4 Comparison with other Reputation Systems . ... 78 7.5 Summary .................................. 80 x 8 Conclusions and Future Work 81 Bibliography 84 xi List of Tables 2.1 The definition of five descriptors in the Gnutella protocol........ 13 3.1 The basic polling protocol in P2PRep system . ... 27 3.2 The enhanced polling protocol in P2PRep system . .... 28 3.3 The X2Repreputationsystemprotocol . 32 3.4 The summary of various trusted reputation mechanisms . ....... 36 7.1 The summary of a comparison between X2BTRep and other trust rep- utationmechanisms............................. 79 xii List of Figures 2.1 First Generation – Centralised P2P Architecture . ....... 9 2.2 Sequence of operations in the Napster protocol . ...... 10 2.3 Second Generation – Decentralised P2P Architecture . ....... 12 2.4 Sequence of operations in the Gnutella v0.4 protocol . ....... 13 2.5 Third Generation – Hybrid P2P Architecture . ... 15 4.1 BitTorrentArchitecture. 38 4.2 A glance at torrent files of Linux from mininova.org webpage. 39 5.1 Sequence of messages in enhanced torrent creation phase ........ 53 5.2 Number of active peers over time (sourced from [26]) . ...... 55 5.3 Sequence of messages and operations in X2BTRep protocol . 56 7.1 BitTorrent’s Information Flow with X2BTRep protocol extensions . 68 7.2 Basic working principle based on a genuine resource and honest clients 72 7.3 Working principle based on a milicious resource and honest clients . 74 7.4 Working principle based on a malicious resource and several dishonest pollers .................................... 75 7.5 Simulation results in different situations . ...... 76 xiii Chapter 1 Introduction Peer-to-peer (P2P) file sharing is one of the most significant technical models of the internet. Rather than traditional client-server architecture, P2P networks equip each node with an equivalent capability or responsibility and they can share computer re- sources and services via direct connections. Over
Recommended publications
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Interconnexion Et Routage Dans Les Systèmes Pair À Pair Salma Ktari
    Interconnexion et routage dans les systèmes pair à pair Salma Ktari To cite this version: Salma Ktari. Interconnexion et routage dans les systèmes pair à pair. domain_other. Télécom ParisTech, 2009. English. pastel-00005737 HAL Id: pastel-00005737 https://pastel.archives-ouvertes.fr/pastel-00005737 Submitted on 19 May 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Thèse présentée pour obtenir le grade de Docteur de l’École Nationale Supérieure des Télécommunications Spécialité : Informatique et Réseaux SALMA KTARI Interconnexion et routage dans les systèmes pair à pair Soutenue le 14 Décembre 2009 devant le jury composé de Isabelle Chrisment Rapporteurs Pascal Lorenz Maurice Gagnaire Examinateurs Sami Tabbane Yutaka Takahashi Invité Houda Labiod Directeur de thèse Artur Hecker Co-directeur de thèse ii À mon cher époux, À ma famille. iv Merci, Au terme de ce travail, je tiens à remercier mes directeurs de thèse, madame Houda Labiod et monsieur Artur Hecker qui m'ont accompagné dans ma recherche ces trois années. Un grand merci à Artur pour sa grande disponibilité et son suivi sérieux et parfois exigeant, qui m’ont été d’une aide précieuse.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Replication Strategies for Streaming Media
    “replication-strategies” — 2007/4/24 — 10:56 — page 1 — #1 Research Report No. 2007:03 Replication Strategies for Streaming Media David Erman Department of Telecommunication Systems, School of Engineering, Blekinge Institute of Technology, S–371 79 Karlskrona, Sweden “replication-strategies” — 2007/4/24 — 10:56 — page 2 — #2 °c 2007 by David Erman. All rights reserved. Blekinge Institute of Technology Research Report No. 2007:03 ISSN 1103-1581 Published 2007. Printed by Kaserntryckeriet AB. Karlskrona 2007, Sweden. This publication was typeset using LATEX. “replication-strategies” — 2007/4/24 — 10:56 — page i — #3 Abstract Large-scale, real-time multimedia distribution over the Internet has been the subject of research for a substantial amount of time. A large number of mechanisms, policies, methods and schemes have been proposed for media coding, scheduling and distribution. Internet Protocol (IP) multicast was expected to be the primary transport mechanism for this, though it was never deployed to the expected extent. Recent developments in overlay networks has reactualized the research on multicast, with the consequence that many of the previous mechanisms and schemes are being re-evaluated. This report provides a brief overview of several important techniques for media broad- casting and stream merging, as well as a discussion of traditional IP multicast and overlay multicast. Additionally, we present a proposal for a new distribution system, based on the broadcast and stream merging algorithms in the BitTorrent distribution and repli- cation system. “replication-strategies” — 2007/4/24 — 10:56 — page ii — #4 ii “replication-strategies” — 2007/4/24 — 10:56 — page iii — #5 CONTENTS Contents 1 Introduction 1 1.1 Motivation .
    [Show full text]
  • Bittorrent Files Hace Stopped Downloading
    bittorrent files hace stopped downloading Why Some Torrents Don’t Download? A torrent that doesn’t start downloading or one that suddenly stops can be very frustrating. You check your Internet connection, the cables, and everything looks good. So what can be the reasons for those torrents that don’t seem to work? Some Torrents Don’t Download. The main reason behind a torrent file that doesn’t even start downloading is the lack of seeders and peers. In other words, there is no one seeding that file, meaning there’s no place where you can download it from. That’s why it’s very important that you have a look at the number of seeders and peers every time you start a new download. Seeders are the users who already finished downloading and are only sharing. The peers are the ones like you, the ones who are downloading and uploading at the same time. Some Files Suddenly Stop Downloading. This is another common scenario. We’ve all been there when a torrent stops at some moment, such as 99%. That usually happens when there are only peers, but no seeders . If you think about it, it makes total sense. The peers have many parts of the torrent in common, and they will share those between them. But because there are zero seeders, no one has the entire file , and everyone will share the same parts and stop in the same percentage point. A Dead Torrent. Both of the situations we just saw are what users in the community call a “dead torrent”.
    [Show full text]
  • Get Real: Print This
    Get Real: Print This http://www.corante.com/getreal/archives/032237print.html from Get Real by Marc Eisenstadt January 11, 2005 BitTorrent, eXeem, Meta-Torrent, Podcasting: "What? So What?" SUMMARY: The index that facilitates the sharing of files on a large scale is also the Achilles heel of peer-to-peer file-sharing, because it is vulnerable to litigation and closure. So what happens if the index is itself distributed? I try to get my head around the latest in peer-to-peer file sharing, and explain a bit about what I've learned, including the fact that BitTorrent's power rests in its 'swarm' distribution model, but not necessarily in your end-user download speed. What has this got to do with podcasting? (Answer: invisible P2P plumbing helps the podcasting wheel go round). [Warning: lengthy article follows]. First, some history (skip ahead to the next section if you're already bored with the Napster, Gnutella, KaZaa, and BitTorrent saga). Napster opened our eyes to the power of distributed file sharing on a massive scale. But it was closed down by lawsuits to stop it from listing copyrighted works for which the owners would naturally have preferred to collect royalties (there are thousands of commentaries on the pros and cons of such royalties, but that's not the focus of this posting). Successive generations of tools such as Gnutella, KaZaa, and now BitTorrent have created their own buzz, their own massive followings, their own headaches, and their own solutions to others' headaches. Here's my rundown of the 'big ideas' (and the people behind them): Napster (Shawn Fanning): This was the Mother of big-time peer-to-peer (P2P) file transfers, i.e.
    [Show full text]
  • Improving Fairness in Peer-To-Peer Networks by Separating the Role of Seeders in Network Infrastructures
    Turkish Journal of Electrical Engineering & Computer Sciences Turk J Elec Eng & Comp Sci (2016) 24: 2255 { 2266 http://journals.tubitak.gov.tr/elektrik/ ⃝c TUB¨ ITAK_ Research Article doi:10.3906/elk-1402-304 Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures Alireza NAGHIZADEH∗, Reza EBRAHIMI ATANI Department of Computer Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran Received: 27.02.2014 • Accepted/Published Online: 08.07.2014 • Final Version: 15.04.2016 Abstract:Fairness is one of the most important challenges that should be considered as a priority when designing a P2P file-sharing network. An unfair P2P network may attract free-riders, frustrate the majority of users, and consequently shorten the longevity of files. When BitTorrent protocol was first introduced, by suggesting new algorithms like tit-for- tat or rarest-first and combining them with methods like choking and unchoking, it pushed fairness one step forward. However, BitTorrent did not bring a plenary solution and has its own shortcomings. For instance, neither this protocol nor other P2P protocols that we are aware of precisely indicate how seeders should be treated in their networks. Most of the time they dictate that seeders upload as much as possible. With this approach, seeders can easily be abused by free-riders. It gets even worse when we realize that for lack of a good infrastructure a lawful user may become a free-rider unknowingly. The purpose of this paper is to address this problem by suggesting a novel and universal method that can be implemented in current P2P networks.
    [Show full text]
  • Time-Limited Data Storing in Peer to Peer Networks Scherbakov Konstantin Spbsu Saint Petersburg, Russia [email protected]
    Time-limited data storing in peer to peer networks Scherbakov Konstantin SPbSU Saint Petersburg, Russia [email protected] coefficient of node’s usefulness for the whole network. ABSTRACT So nodes, that are more useful for the network, should have opportunity to use these mechanisms more often Different techniques of using peer to peer networks are and more completely. mentioned. The process of data distribution in peer to peer network by the single node’s initiative for purpose of further downloading by this node’s owner is UDD P2P network model described. A common model of special peer to peer Let’s assume that one person or group of persons have network (UDD network), developed for single node some u-data, that is very useful for this person or group initiated data distribution, with its main characteristics of persons, but not interesting for other participants of and used algorithms is introduced. Some ways of our future u-data distribution (UDD) p2p network. This improving existing peer to peer networks for the person wants to have access to this data from any place, purpose of compliance to UDD network specification where he can connect to internet (and to our UDD p2p are mentioned. Experimental results of single node’s network too). He also wants to have ability to extend his initiated data distribution in one of the existing peer to data storing time and he expects that there is some peer networks (with our improvements applied) are mechanism used in this network that prevents with high analyzed. probability his data from being deleted from all network nodes during its limited storing time.
    [Show full text]
  • P2P File Sharing P2P File Sharing
    P2P File Sharing P2P file sharing Alice chooses one of the peers, Bob. File is copied from Bob’s PC to Example Alice’s notebook: HTTP Alice runs P2P client While Alice downloads, other application on her notebook users uploading from Alice. computer Alice’s peer is both a Web client Intermittently connects to and a transient Web server. Internet; gets new IP address All peers are servers = highly for each connection scalable! Asks for “Hey Jude” Application displays other peers that have copy of Hey Jude. P2P: centralized directory (Napster’s Approach) Bob centralized directory server original “Napster” design 1 1) when peer connects, it peers 1 informs central server: IP address 1 3 content 2 1 2) Alice queries for “Hey Jude” 3) Alice requests file from Alice Bob P2P: problems with centralized directory file transfer is Single point of failure decentralized, but locating content is Performance highly decentralized bottleneck Copyright infringement Query flooding: Gnutella overlay network: graph edge between peer X fully distributed and Y if there’s a TCP no central server connection public domain all active peers and protocol edges is overlay net many Gnutella clients Edge is not a physical implementing protocol link Given peer will typically be connected with < 10 overlay neighbors Gnutella: protocol Ì File transfer: Query message HTTP sent over existing TCP connections Query Ì peers forward QueryHit Query message Ì QueryHit sent over reverse Query path QueryHit Scalability: limited scope flooding Gnutella: Peer joining 1. Joining peer X must find some other peer in Gnutella network: use list of candidate peers 2.
    [Show full text]
  • Compsci 514: Computer Networks Lecture 21-2: from Bittorrent to Bittyrant Problem Statement
    CompSci 514: Computer Networks Lecture 21-2: From BitTorrent to BitTyrant Problem Statement ... Server • One-to-many content distribution – Millions of clients downloading from the same server Evolving Solutions • Observation: duplicate copies of data are sent • Solutions – IP multicast – End system multicast – Content distribution networks e.g. Akamai – P2P cooperative content distribution • Bittorrent etc. IP multicast • End systems join a multicast group • Routers set up a multicast tree • Packets are duplicated and forwarded to multiple next hops at routers • Multicast pros and cons End system multicast • End systems rather than routers organize into a tree, forward and duplicate packets • Pros and cons Content distribution networks • Akamai – Works well but expensive, requires infrastructure support Peer-to-Peer Cooperative Content Distribution u Use the client’s uplink bandwidth u New problem: incentives for cooperation or how to motivate clients to upload The Gnutella approach u All nodes are true peers u A peer is the publisher, the uploader and the downloader. u No single point of failure. u Efficiency and scalability issue: u File searches span across a large number of nodes generating lots of traffic. u Integrity, i.e.content pollution issue: u Anyone can claim that he publishes valid content u No guarantee of quality of objects u Incentive issue: u No incentives for cooperation (free-riding in Gnutella) Outline u Problem of Content Distribution u The BitTorrent approach u BitTyrant BitTorrent overview Tracker 1 2 3 Leecher A Seeder Leecher C Leecher B u File is divided into chunks (e.g. 256KB) uShA1 hashes of all the pieces are included in the .torrent file for integrity check uA chunk is divided into sub-pieces to improve efficiency u Seeders have all chunks of the file u Leechers have some or no chunks of the file BitTorrent overview Tracker 1 2 3 Leecher A Seeder Leecher C Leecher B u File is divided into chunks (e.g.
    [Show full text]
  • Exploiting Bittorrent for Fun (But Not Profit)
    Exploiting BitTorrent For Fun (But Not Profit) Nikitas Liogkas, Robert Nelson, Eddie Kohler, and Lixia Zhang University of California, Los Angeles fnikitas, rlnelson, kohler, [email protected] ABSTRACT the file can be downloaded from different peers. A meta- This paper assesses BitTorrent’s robustness against selfish peers, data file is associated with every download. This file con- who try to download more than their fair share by abusing existing tains information necessary for the download process, in- protocol mechanisms. We design and implement three selfish-peer cluding the number of pieces and hashes for all the pieces; exploits and evaluate their effectiveness on public and private tor- the hashes are used by peers to verify that a piece has been rents. In practice, BitTorrent appears quite robust against this kind received correctly. This metadata file is typically created by of exploit: selfish peers can sometimes obtain more bandwidth, and the content provider, who must also launch at least one client honest peers’ download rates suffer slightly in consequence, but we offering the entire file for download. In order to join the observe no considerable degradation of the system’s quality of ser- download process, a client retrieves the metadata file out of vice. We identify private-torrent scenarios in which a selfish peer band, usually either from a well-known website or by email. could benefit more significantly at the expense of honest peers, and It then contacts the tracker, a centralized component that discuss the BitTorrent protocol mechanisms that lead to robustness by rendering these scenarios infeasible. keeps track of all the peers participating in the download.
    [Show full text]