Measuring Bittorrent Ecosystem: Techniques, Tips and Tricks

Total Page:16

File Type:pdf, Size:1020Kb

Measuring Bittorrent Ecosystem: Techniques, Tips and Tricks Measuring BitTorrent Ecosystem: Techniques, Tips and Tricks Michal Kryczka∗y, Ruben´ Cuevas∗, Angel´ Cuevas∗, Carmen Guerrero∗ and Arturo Azcorra∗ ∗University Carlos III Madrid yInstitute IMDEA Networks Abstract—BitTorrent is the most successful peer-to-peer ap- ago. Due to the great success of this protocol a complex system plication. In the last years the research community has studied was created around it. In this paper we adopt the terminology the BitTorrent ecosystem by collecting data from real BitTorrent used by Zhang et al. [16] to refer to this complex system as swarms using different measurement techniques. In this paper we present the first survey of these techniques that constitutes a first the BitTorrent Ecosystem. In this section we describe the main step in the design of future measurement techniques and tools players of this ecosystem as well as its functionality. This is for analyzing large scale systems. The techniques are classified summarized in Fig. 1. into Macroscopic, Microscopic and Complementary. Macroscopic techniques allow to collect aggregated information of torrents A. Description of BitTorrent Functional Elements and present a very high scalability being able to monitor up to hundreds of thousands of torrents in short periods of time. • A BitTorrent Portal is a server into which content Rather, Microscopic techniques operate at the peer level and publishers upload .torrent files and BitTorrent clients focus on understanding performance aspects such as the peers’ download those .torrent files. download rates. They offer a higher granularity but do not scale • A BitTorrent Swarm is formed by a set of peers down- as well as the Macroscopic techniques. Finally, Complementary loading a given content using the BitTorrent protocol. techniques utilize recent extensions to the BitTorrent protocol in order to obtain both aggregated and peer level information. The • A BitTorrent Tracker is a server that maintains a list paper also summarizes the main challenges faced by the research of clients forming the BitTorrent swarm associated to a community to accurately measure the BitTorrent ecosystem given content. Furthermore the Tracker is aware of the such as accurately identifying peers or estimating peers’ upload download progress of each peer within the swarm. rates. Furthermore, we provide possible solutions to address the • A BitTorrent Client or Peer is an entity that participates described challenges. in a BitTorrent swarm by downloading and/or uploading I. INTRODUCTION pieces of the content. Two categories of peers may be BitTorrent [5] is the most successful peer-to-peer file- distinguished: A seeder is a client that has a complete sharing application. Indeed, it is responsible for a major copy of the content, thus only uploads pieces to other portion of the Internet traffic share [10] and is daily used by peers. A leecher is a client that does not have a complete dozens of millions of users. This has attracted the interest copy of the content, thus uploads and downloads pieces of the research community that has thoroughly evaluated the to and from other peers respectively. performance and the demographic aspects of BitTorrent. Due • A .torrent file is a meta-information file associated to to the complexity of the system, the most relevant studies have a content shared through BitTorrent. The .torrent file tried to understand different aspects by performing real mea- includes the following information: content name, file surements of BitTorrent swarms in the wild, this is inferring size, number and size of the pieces that form the con- information from real swarms in real time. tent named chunks, torrent infohash (an identifier that Several techniques have been used in order to measure uniquely identifies the swarm associated to the .torrent different aspects of BitTorrent so far, however to the best of file) and IP address(es) of the Tracker(s) managing the the authors knowledge there is no document that compiles, swarm associated to the file. describes and classifies these techniques. In this paper we firstly describe the main aspects and functionality of the com- B. Publishing Content in BitTorrent plete BitTorrent Ecosystem in Section II. Afterwards, Section In order to make available a content C in BitTorrent, the III presents a survey of the existing BitTorrent measurement content publisher creates a .torrent file associated to C. After techniques. Finally, we describe the main challenges that these creating the .torrent file, the content publisher uploads it to a techniques face and the possible solution to them in Section BitTorrent portal. A detailed analysis of the BitTorrent content IV before concluding the paper in Section V. publishing phenomenon can be found at [6]. There are a few BitTorrent portals such as The Pirate Bay1 indexing millions II. BITTORRENT ECOSYSTEM of torrents and receiving millions of daily visits. These portals BitTorrent [5] is the name used by Brian Cohen to define the peer-to-peer file-sharing protocol that he designed one decade 1This is the current largest BitTorrent portal based on Alexa Ranking. 2 Fig. 1: BitTorrent Ecosystem basic functionality: (i) The BitTorrent client contacts a BitTorrent portal to download the .torrent file associated to the desired content (the .torrent file includes the IP address of the Tracker managing the swarm associated to the desired content); (ii) The BitTorrent client contacts the Tracker that provides the IP addresses of a set of peers within the swarm; (iii) The BitTorrent client connects to these peers for downloading the content. are critical for the BitTorrent ecosystem as demonstrated by the Tracker that removes this peer from the list of participants Zhang et al. [16]. They offer detailed information regarding in the swarm. each indexed torrent. This information slightly varies from one It is worth noting that, in practice, the BitTorrent Ecosystem portal to another, but in general it includes: category of the relies in few Trackers that manage a large number (up to a content, number of associated files, size of the whole content few millions) of torrents in parallel. The OpenBitTorrent and in the torrent, complete name of the file, uploading date, PublicBitTorrent Trackers3 are currently the most important username who uploaded the torrent, number of seeders and ones. leechers participating in the torrent swarm (this data is updated D. BitTorrent Delivery Procedure every few minutes) and a description text giving more detailed information regarding the content. Fig. 2 shows an example In BitTorrent two peers communicate using the peer wire of a torrent web-page from the Pirate Bay portal. Finally, it is protocol. Every communication starts with an initial hand- worth noting that some of these major portals offer a Really shake. Just after the handshaking sequence is completed (and Simple Syndication (RSS) feed to announce the new published before any other messages are sent) the peers exchange the torrents. bitfields by using a BITFIELD message. The bitfield indicates which chunks of the file a peer has already downloaded. Furthermore, every time a peer gets a new chunk, it informs to C. Joining a BitTorrent Swarm and Discovering Peers its neighbours by using a HAVE message. Hence, every peer is When a BitTorrent user wants to download a given content aware of the chunks that each neighbour has at any moment. C, it looks for the .torrent file associated to C in a BitTorrent BitTorrent uses the Tit-for-Tat as incentive model for the portal and downloads it. The .torrent file can be opened delivery mechanism; basically each leecher uploads chunks with any of the existing BitTorrent clients2. Upon opening to those other leechers from whom it is downloading more the .torrent file, the BitTorrent client connects to one of the chunks. The Choking Algorithm is responsible for providing Trackers included in this one. A new peer first contacts the this behaviour. It is a periodical operation where every 10 Tracker using an announce started request that is answered seconds a leecher selects (unchoke) n other leechers from by the Tracker with the number of seeders and leechers its neighbourhood to upload chunks to. These n (typically 4) participating in the swarm along with the IP addresses of N unchoked leechers are those from whom the peer downloaded (between 40 and 200) randomly selected peers. These N peers more chunks during the last 20 seconds. The rest of the form the initial neighbourhood of the new node. Furthermore, neighbours are blocked (choked). In the case of a seeder, if a peer’s neighbourhood size falls below a given threshold it unchokes n (typically 4) leechers to whom more chunks (typically 20), it sends again an announce started request to it uploaded in the last 20 seconds (i.e., those with higher the Tracker in order to get new neighbours. Finally, when a download rate)4. In addition to the regular unchoke operation, peer leaves the swarm, it sends an announce stopped request to 3www.openbittorrent.org and www.publicbt.org 4Note that different BitTorrent clients may implement different variations 2http://en.wikipedia.org/wiki/Comparison of BitTorrent clients of the explained unchoke algorithms. 3 Property Portal Crawling Tracker Crawling Peers Crawler Own client/plugin Category Macroscopic Macroscopic Microscopic Microscopic Type of Information Torrents Demographics and High level performance Peer Level Performance Peer Level Performance Cost of Crawler preparation Low Medium High High Scalability Very High High Medium Medium-Low Obtained details Basic Medium Advanced Very Advanced Completeness of Torrent Population - High Very High Low TABLE I: Comparison of main BitTorrent measurement techniques BitTorrent implements the optimistic unchoke operation. Every We classify the Macroscopic techniques into two subcat- 30 seconds (this is, every 3 regular unchoke operations) both egories: BitTorrent portals crawling and BitTorrent Trackers leechers and seeders randomly select one choked neighbour to crawling. upload chunks to. Finally, when a leecher is unchoked by a neighbor, it applies the Rarest First Policy in order to choose -BitTorrent portals crawling: which chunk to request to this neighbor.
Recommended publications
  • A Week in the Life of the Most Popular Bittorrent Swarms
    A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University College Dublin, Belfield, Dublin 4, Ireland {mark.scanlon, alan.hannaway, tahar.kechadi}@ucd.ie AbstractThe popularity of peer-to-peer (P2P) file distribution is c material, which typically commences with a single source sharing large sized files to many downloaders. networks lend themselves well to the unauthorised distribution of To commence the download of the content in a particular copyrighted material due to their ease of use, the abundance of - material available and the apparent anonymity awarded to the downloaders. This paper presents the results of an investigation loaded from an indexing website. This file is then opened conducted on the top 100 most popular BitTorrent swarms over using a BitTorrent client, which proceeds to connect to several the course of one week. The purpose of this investigation is to members of the swarm and download the content. Each quantify the scale of unauthorised distribution of copyrighted BitTorrent swarm is built around a particular piece of content material through the use of the BitTorrent protocol. Each IP which is determined through a unique identifier based on a address, which was discovered over the period of the weeklong SHA-1 hash of the file information contained in this UTF- 8 investigation, is mapped through the use of a geolocation encoded metadata file, e.g., name, piece length, piece hash database, which results in the ability to determine where the values, length and path.
    [Show full text]
  • Downloaded 2021-10-03T02:24:37Z
    Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title A Week in the Life of the Most Popular BitTorrent Swarms Authors(s) Scanlon, Mark; Hannaway, Alan; Kechadi, Tahar Publication date 2010-06-17 Publication information Goel, S. Proceedings of the 5th Annual Symposium on Information Assurance Academic track of the 13th Annual 2009 NYS Cyber Security Conference, 2010 Conference details The 5th Annual Symposium on Information Assurance (ASIA '10): Academic Track of 13th Annual NYS Cyber Security Conference, Albany, New York, USA, 16 - 17 June 2010 Link to online version http://www.albany.edu/iasymposium/proceedings.2010.shtml Item record/more information http://hdl.handle.net/10197/7379 Downloaded 2021-10-03T02:24:37Z The UCD community has made this article openly available. Please share how this access benefits you. Your story matters! (@ucd_oa) © Some rights reserved. For more information, please see the item record link above. A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University College Dublin, Belfield, Dublin 4, Ireland {mark.scanlon, alan.hannaway, tahar.kechadi}@ucd.ie AbstractThe popularity of peer-to-peer (P2P) file distribution is c material, which typically commences with a single source sharing large sized files to many downloaders. networks lend themselves well to the unauthorised distribution of To commence the download of the content in a particular copyrighted material due to their ease of use, the abundance of - material available and the apparent anonymity awarded to the downloaders.
    [Show full text]
  • Track How Many Downloads a Torrent Has Gotten Open and Working Torrent Tracker List for 2020 – Increase Your Download Speeds
    track how many downloads a torrent has gotten Open and working torrent tracker list for 2020 – Increase your download speeds. Another year, another torrent tracker list on my website. In this article, you will once again find the a fresh list of open trackers that are fully working. The general advantage of (manually) adding torrent trackers to your downloads is increase the download speed, because you are potentially connected to more seeds and peers. What is a torrent tracker? A torrent tracker is actually some kind of server. That server is connected to the internet and keeps track of which persons are currently ‘connected’ to a given torrent file: the seeds and the peers. Both a seed and a peer will help you – potentially – gain a higher download speed. Here is a brief explanation of the difference between both: The peers: the people who have not yet have all the full files, so they are both downloading the file(s) and uploading to other peers. The BitTorrent protocol is not for nothing called a ‘P2P’ (Peer to Peer°) communication protocol. The seeds: the seeds already have all the files fully available and are no longer downloading. The main task of the seed is to upload to the peers. A torrent tracker helps you discover these peers and seeds. What are the benefits of adding more torrent trackers? So given a torrent tracker keeps track of who is uploading and downloading that particular torrent, it can be interesting for you to be connected to a whole bunch of torrent trackers. Because more torrent trackers may give you a wider audience of peers and seeds who can upload the file(s) to you: and this will give you a speed advantage compared to when you are connected to a low number of peers/seed.
    [Show full text]
  • Technical Report: an Estimate of Infringing Use of the Internet
    Technical report: An Estimate of Infringing Use of the Internet January 2011 Version 1.8 Envisional Ltd, Betjeman House, 104 Hills Road, Cambridge, CB2 1LQ Telephone: +44 1223 372 400 www.envisional.com [email protected] Envisional: Internet bandwidth usage estimation 2 1 Introduction Envisional was commissioned by NBC Universal to analyse bandwidth usage across the internet with the specific aim of assessing how much of that usage infringed upon copyright. This report provides the results of that analysis and is in three main parts. Part A examines the internet arenas most often used for online piracy – peer-to-peer networks (with a specific focus on bittorrent), cyberlockers (file hosting sites such as Rapidshare), and other web-based piracy venues (such as streaming video) – and estimates the proportion of infringing content found on each. Part B is a critical analysis of recent studies from four network equipment and monitoring companies. These companies measured network traffic at multiple (and different) sites worldwide to characterize overall internet usage. Part C combines the data and analysis from Part A and Part B in an attempt to show what proportion of internet traffic represents unauthorised distribution of copyrighted material. 1.1 Executive Summary . Across all areas of the global internet, 23.76% of traffic was estimated to be infringing. This excludes all pornography, the infringing status of which can be difficult to discern. The level of infringing traffic varied between internet venues and was highest in those areas of the internet commonly used for the distribution of pirated material. BitTorrent traffic is estimated to account for 17.9% of all internet traffic.
    [Show full text]
  • Immediate Classification of IP Flows Using
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 0000; 00:1–16 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem DNS-Class: Immediate classification of IP flows using DNS Paweł Foremski1∗, Christian Callegari2 and Michele Pagano2 1The Institute of Theoretical and Applied Informatics of the Polish Academy of Sciences, Gliwice, Poland 2 Department of Information Engineering, University of Pisa, Italy SUMMARY In the last years, we have witnessed a tremendous growth of the Internet, especially in terms of the amount of data being transmitted through the networks and new protocols being implemented. This poses a challenge for network administrators, who need adequate traffic classification tools for network management, e.g. to implement Quality of Service (QoS) requirements. In this paper, we employ real traffic traces to assess the usefulness of Domain Name System (DNS) information for traffic classification. We show that by inspecting DNS packets, it is possible to immediately classify a highly significant portion of the traffic. We present DNS-Class: an innovative, fast, and reliable flow-based classifier that on average yields 99.2% of True Positives with <0:1% of False Positives. We argue that DNS-Class represents an important development in the field of traffic classification, and that it can be a major element of a modular traffic classification system. Copyright c 0000 John Wiley & Sons, Ltd. Received . KEY WORDS: Network Management, IP Networks, Traffic Classification 1. INTRODUCTION Internet traffic classification—or identification—is the act of matching IP packets to the applications that generated them. It is important for network infrastructures that implement Quality of Service (QoS) requirements.
    [Show full text]
  • Rich Trackers for Torrent Download Torrent Tracker List – August 2021
    rich trackers for torrent download Torrent Tracker List – August 2021. This is a list of open and public torrent trackers. The list contains only stable trackers with good latency. You can add any of the tracker announce URLs listed here to any of your torrents. Are you looking for a list of private torrent trackers? Check out the torrent sites and private trackers directory. Tracker list. Detailed list of stable torrent trackers. Torrent tracker announce URL Port udp://open.stealth.si:80/announce udp 80 udp://tracker.birkenwald.de:6969/announce udp 6969 http://vps02.net.orel.ru:80/announce http 80 http://tracker.bt4g.com:2095/announce http 2095 http://tracker.files.fm:6969/announce http 6969 udp://opentor.org:2710/announce udp 2710 udp://tracker.beeimg.com:6969/announce udp 6969 http://h4.trakx.nibba.trade:80/announce http 80 udp://opentracker.i2p.rocks:6969/announce udp 6969 https://tracker.nitrix.me:443/announce https 443 udp://fe.dealclub.de:6969/announce udp 6969 udp://wassermann.online:6969/announce udp 6969 udp://mail.realliferpg.de:6969/announce udp 6969 udp://movies.zsw.ca:6969/announce udp 6969 udp://bubu.mapfactor.com:6969/announce udp 6969 udp://tracker.blacksparrowmedia.net:6969/announce udp 6969 https://trakx.herokuapp.com:443/announce https 443 udp://tracker.zerobytes.xyz:1337/announce udp 1337 udp://vibe.sleepyinternetfun.xyz:1738/announce udp 1738 https://tr.torland.ga:443/announce https 443 udp://tracker.moeking.eu.org:6969/announce udp 6969 udp://tracker.bitsearch.to:1337/announce udp 1337 udp://tracker.opentrackr.org:1337/announce
    [Show full text]
  • 62091097-Dtecnet-After-Pirate-Bay
    White Paper With Pirate Bay foundering, where have file traders gone? October 2009 Executive Summary After Swedish authorities forced the Internet disconnection of The Pirate Bay, online piracy worldwide dropped substantially on BitTorrent networks as file traders scrambled to find replacement trackers. The shift caused a secondary shutdown among some alternative trackers, which appear to have been temporarily overwhelmed by the unexpected new traffic. But rather than jumping to competing file‐trading protocols, file traders remained on BitTorrent networks. Pirates who are uploading the files are using replacement BitTorrent trackers. Additionally, The Pirate Bay updated their trackers to point to OpenBitTorrent, so content can still be found. Therefore traffic volumes are slowly recovering to previous levels with OpenBitTorrent as a probable Pirate Bay successor, and enforcement target. After Pirate Bay The Pirate Bay has been the world’s most notorious file‐sharing network to date. Its main purpose was to share pirated video, music, games and other content, using the BitTorrent peer‐to‐peer file‐ trading protocol. On Aug. 24, 2009, the Pirate Bay lost its online connection when its Internet service provider, Black Internet, cut off service to avoid Stockholm court fines for helping Pirate Bay infringe on copyrights. The disconnection had an immediate effect on worldwide piracy networks, as Black Internet also hosted nearly all of Pirate Bay’s “tracker” servers, which act as “traffic cops” for people uploading and downloading media files. When the trackers are shut down, BitTorrent programs do not know where to look for files. The impact of the shutdown is strongly obvious in the graph below.
    [Show full text]
  • Heavy-Uploader Tracking System Design in Bittorrent Environment
    International Journal of Information and Education Technology, Vol. 4, No. 5, October 2014 Heavy-Uploader Tracking System Design in BitTorrent Environment Jihah Nah and Jongweon Kim blamed it for enabling infringement, because it allows the Abstract—Copyright infringement using BitTorrent has sharing of digital content with unspecified individuals. become a major problem in the creative industries; however, no Furthermore, files can be transferred effectively although reliable technical means are available to prevent piracy. The under flash crowd and free-rider can be prevented efficiently. packet filtering method, which is used to inspect network traffic For this reason, the use of BitTorrent is rapidly growing. and to detect problems, puts a heavy strain on network resources. At the same time, there is a big controversy over the Online storage services, such as Webhard, combine privacy in communications and the authority to investigate. technical copyright protection with various filtering This paper proposes a tracking system to trace a heavy technologies; P2P services, like those using BitTorrent, do uploader, who illegally shares a significant amount of not provide the same protection. Therefore, it diminishes the copyrighted contents through BitTorrent. The proposed effectiveness of Webhard service provider’s efforts to tracking system analyzes the seed file of an illegal torrent, transition to a legal service. acquires the swarm tracker’s address, and retrieves the IP address or MAC address of a peer from the swarm list, which is In this paper, we propose a heavy uploader tracking a list of peers sharing copyrighted contents from the tracker. algorithm for copyright protection in a BitTorrent Interception and/or inspection of network packets with environment because heavy uploaders need to be purged personal information can be an offense against privacy laws.
    [Show full text]
  • Project Maelstrom: Forensic Analysis of the Bittorrent-Powered Browser
    PROJECT MAELSTROM: FORENSIC ANALYSIS OF THE BITTORRENT-POWERED BROWSER Jason Farina, M-Tahar Kechadi, Mark Scanlon School of Computer Science, University College Dublin, Ireland. [email protected], {tahar.kechadi, mark.scanlon}@ucd.ie ABSTRACT In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores the application, its protocol, sharing Maelstrom content and its new visitor powered “web-hosting” paradigm. Keywords: Project Maelstrom, BitTorrent, Decentralised Web, Alternative Web, Browser Forensics 1. INTRODUCTION • File Synchronisation Service – BitTorrent Sync is a cloudless alternative to the cloud-based, Project Maelstrom was released as a private alpha in multiple-device, file synchronisation services December 2014 [Klinker, 2014] and as a public beta such as Dropbox, OneDrive, iCloud, etc. [Scan- in April 2015 [Klinker, 2015]. Its purpose is to pro- lon et al., 2015]. With a standard BitTorrent vide a decentralised web ecosystem facilitating a new Sync install, users are not limited in the amount parallel to the existing world wide web. Through this of data they can share as there are no replicated decentralisation, users are free to create and share any server-side limitations.
    [Show full text]
  • Game of Thrones Torrent Download Pirate ‘Game of Thrones’ Season 7 Was Pirated More Than One Billion Times
    game of thrones torrent download pirate ‘Game of Thrones’ Season 7 Was Pirated More Than One Billion Times. Game of Thrones managed to set three separate ratings record this past season with 10.1 million live viewers, 10.7 million and then a whopping 12.1 million for the season finale. These numbers were made even more impressive by the fact that two of season seven’s episodes were leaked online beforehand. Just think how high those numbers would have reached had viewers not illegally downloaded episodes countless installments. According to Torrent Freak, Game of Thrones was pirated more than one billion (with a b) times this year. “While it’s hard to measure piracy accurately, streaming in particular, piracy tracking outfit MUSO has just released some staggering numbers. According to the company, the latest season was pirated more than a billion times in total. To put this into perspective, this means that on average each episode was pirated 140 million times, compared to 32 million views through legal channels. The vast majority of the pirate ‘views’ came from streaming services (85%), followed by torrents (9%), and direct downloads (6%).” Per the site, the illegal streaming began with huge numbers—more than 90 million people torrented the season premiere—and continued to snowball from there. Season seven concluded more than a week ago and nine of the 15 most popular torrents on The Pirate Bay are Game of Thrones episodes. While it’s hard to translate all of the illegal downloads to viewers, we can safely assume GoT ‘s viewership numbers would have steadily risen had the Euron Greyjoy-like pirates not gotten their hands on the episodes.
    [Show full text]
  • The World of Peer-To-Peer (P2P)/All Chapters
    The World of Peer-to-Peer (P2P)/All Chapters en.wikibooks.org December 29, 2013 On the 28th of April 2012 the contents of the English as well as German Wikibooks and Wikipedia projects were licensed under Creative Commons Attribution-ShareAlike 3.0 Unported license. A URI to this license is given in the list of figures on page 125. If this document is a derived work from the contents of one of these projects and the content was still licensed by the project under this license at the time of derivation this document has to be licensed under the same, a similar or a compatible license, as stated in section 4b of the license. The list of contributors is included in chapter Contributors on page 123. The licenses GPL, LGPL and GFDL are included in chapter Licenses on page 129, since this book and/or parts of it may or may not be licensed under one or more of these licenses, and thus require inclusion of these licenses. The licenses of the figures are given in the list of figures on page 125. This PDF was generated by the LATEX typesetting software. The LATEX source code is included as an attachment (source.7z.txt) in this PDF file. To extract the source from the PDF file, you can use the pdfdetach tool including in the poppler suite, or the http://www. pdflabs.com/tools/pdftk-the-pdf-toolkit/ utility. Some PDF viewers may also let you save the attachment to a file. After extracting it from the PDF file you have to rename it to source.7z.
    [Show full text]
  • Diplomová Práce Analyzátor Provozu Peer-To-Peer Sítí
    Západočeská univerzita v Plzni Fakulta aplikovaných věd Katedra informatiky a výpočetní techniky Diplomová práce Analyzátor provozu Peer-to-Peer sítí Plzeň 2020 Bc. Antonín Vrba Místo této strany bude zadání práce. Prohlášení Prohlašuji, že jsem diplomovou práci vypracoval samostatně a výhradně s po- užitím citovaných pramenů. V Plzni dne 15. května 2020 Bc. Antonín Vrba Poděkování Děkuji vedoucímu této diplomové práce Ing. Martinovi Šimkovi, Ph.D za jeho rady a čas strávený na konzultacích a také Ing. Jaromírovi Staňkovi za prak- tické poznámky při implementaci. Abstract This diploma thesis deals with the development of a new network analyzer for monitoring Peer-to-Peer traffic of BitTorrent applications. First, funda- mental principles of Peer-to-Peer networks are explained and a comparison of the most used protocols is performed. After that, the thesis is entirely oriented on the BitTorrent network’s features, including all its extensions. A torrent downloading scenario is presented to test existing BitTorrent traffic detection solutions. The results showed shortcomings in all tested cases and therefore a proper solution was designed and implemented. The newly cre- ated analyzer was tested in the same way and their results outperforms other solutions. The analyzer will be deployed and used on University of West Bo- hemia dormitory network. Abstrakt Tato diplomová práce se zabývá vývojem síťového analyzátoru pro monitoro- vání provozu Peer-to-Peer sítě BitTorrent. Nejdříve jsou prozkoumány prin- cipy fungování Peer-to-Peer sítí a je provedeno srovnání nejpoužívanějších protokolů. Práce se následně orientuje výhradně na síť BitTorrent včetně všech jejích rozšíření. K otestování již existujících řešení pro detekci Bit- Torrent provozu je definován jednotný scénář torrent stahování.
    [Show full text]