A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack on Bittorrent Networks

A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack on Bittorrent Networks

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 13, NO. 5, SEPTEMBER/OCTOBER 2016 509 A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack on BitTorrent Networks Ali Fattaholmanan, Member, IEEE and Hamid R. Rabiee, Senior Member, IEEE Abstract—The peer to peer (P2P) file sharing applications have allocated a significant amount of today’s Internet traffic. Among various P2P file sharing protocols, BitTorrent is the most common and popular one that attracts monthly a quarter of a billion users from all over the world. Similar to other P2P file sharing protocols, BitTorrent is mostly used for illegal sharing of copyright protected files such as movies, music and TV series. To impede this huge amount of illegal file distributions, anti-P2P companies have arisen to stand against these applications (specially the BitTorrent). To this end, they have begun to fire large-scale Internet attacks against BitTorrent networks. In this paper, we are going to actively measure the impact of the piece-attack against BitTorrent networks. Our measurement is divided into five scenarios in order to figure out the constraint factors that influence the success of the attack. To be able to evaluate the attack in different experiments, we defined attack effectiveness to quantitatively verify the success of the attack. Based on the measurement results, we discovered how it is possible to achieve significant outcome with modest amount of resources used by the attackers in hampering the illegal distribution of files in BitTorrent networks. Index Terms—Peer-to-peer, BitTorrent network, piece-attack, measurement study, internet attack Ç 1INTRODUCTION N recent years, peer to peer (P2P) applications and proto- current BitTorrent traffic belongs to illegal sharing of copy- Icols have been widely spread all over the world and right protected files [1] such as music, movies or software. gained a considerable popularity among Internet users. As Consequently, movies and music industries have started to stated in [1], about 25 percent of overall Internet bandwidth hire anti-P2P companies [7] to impede the distribution of is allocated to the P2P traffic. Among all the P2P protocols, targeted music, movies and other products protected by BitTorrent is the most well-known protocol [2], which is copyright over P2P file sharing networks (i.e., BitTorrent). widely used for sharing large files such as movies, music Those anti-P2P companies are attempting to alleviate the and TV series. Currently, BitTorrent has 150 million concur- illegal distribution of copyright protected products using rent active users and about a quarter of a billion users two different techniques: monthly [3]. This considerable amount of users contributes to more than 17 percent of overall Internet bandwidth [1] 1) Monitoring BitTorrent networks. As stated in [8], there which obviously reveals the outstanding features of this are some agencies (e.g., Media Defender [9]), which P2P file sharing protocol. consequently monitor BitTorrent networks, espe- BitTorrent either can provide an inexpensive and scal- cially networks with popular contents. By monitor- able technique for file distribution, as used by some not-for- ing, they can send digital millennium copyright act profit software corporations (e.g., Eclipse [4] and Linux [5]), (DMCA) takedown notice to the end-users contribut- or can be used for downloading copyright protected files, ing to sharing of copyright protected materials. As illegitimately. Since BitTorrent protocol and its client appli- an evidence of the activeness of this technique, it is cations were not designed and developed by a single corpo- worth noting that most of the US universities have ration, it is impossible to settle a lawsuit against them. established rules about DMCA takedown notification Moreover, in most popular BitTorrent clients such as uTor- received by college students (e.g., [10], [11], [12]). rent, Vuze (Azureus) and FlashGet, Peer Discovery can This is because of the increasing demand for illegal be handled in a distributed manner [6] without the existence music downloading among US college students [13]. of any centralized entity (i.e., tracker) which makes it even Unfortunately, it is possible to easily bypass the mon- harder for copyright enforcement agencies to hamper itoring agencies without worrying about DMCA BitTorrent lawfully. Unfortunately, nearly two-thirds of takedown notifications. For instance, as stated in [8], there are some available IP block lists in order to preserve BitTorrent end-users from establishing con- The authors are with the AICT Innovation Center, Department of Computer Engineering, Sharif University of Technology (SUT), Tehran 145888, Iran. nection to anti-P2P companies (e.g., Media Defender) E-mail: [email protected], [email protected]. or government related domains (e.g., DoD). In addi- Manuscript received 1 Apr. 2014; revised 20 Nov. 2014; accepted 25 Mar. tion, many copyright holder agencies currently use 2015. Date of publication 6 Apr. 2015; date of current version 2 Sept. 2016. inconclusive methods for identifying BitTorrent end- For information on obtaining reprints of this article, please send e-mail to: users contributing to illegal distribution of copyright [email protected], and reference the Digital Object Identifier below. Digital Object Identifier no. 10.1109/TDSC.2015.2420561 protected files. The authors in [14] demonstrated 1545-5971 ß 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Authorized licensed use limited to: UniversitaSee http://www.ieee.org/publications_standards/publications/rights/index.html della Svizzera Italiana. Downloaded on February 16,2021 at for 23:05:49 more information. UTC from IEEE Xplore. Restrictions apply. 510 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 13, NO. 5, SEPTEMBER/OCTOBER 2016 a simple practical technique for implicating innocent for the attack. In other words, our model helps anti- end-users in illegal content sharing. P2P companies to calculate the attack’s cost (i.e., num- 2) Internet attack against BitTorrent networks. Since Moni- ber of attackers, number of public IP addresses toring BitTorrent Networks cannot successfully stop and the amount of required data bandwidth) for a end-users from downloading copyright protected specific result. content illegally, anti-P2P companies went beyond In order to launch numerous numbers of attackers just monitoring BitTorrent networks and attempted against a targeted BitTorrent network, we designed to begin attacks against them. There are various and developed an innovative Semi-Nat [15] protocol kinds of attacks against BitTorrent networks based in order to provide multiple IP addresses for torrent on the victim entity [7] (such as attacks on leechers, client applications, running on our attack host. seeders, peer discovery and torrent discovery). In The rest of this paper is organized as follows: Section 2 [7], it was observed that the BitTorrent networks of discusses related work, while Section 3 briefly introduces top popular movies are under various kinds of the Piece-Attack and gives a simple model on the effective- attacks including Piece-Attack and Connection- ness and cost of the attack on BitTorrent networks. Section 4 Attack. However, according to the significant pro- addresses our large-scale active measurement scenarios, portion of illegally traffic allocated by BitTorrent which was intended to evaluate the impact of Piece-Attack end-users, their results are not promising. Here, a on various types of BitTorrent networks. Finally, Section 5 question arises: “How can we get more impressive draws conclusions. results from those attacks?” and consecutively “How much resources and equipment is necessary to have ELATED ORK such a worthy outcome?” 2R W In this paper, we actively measure the effectiveness of BitTorrent is one of the most popular P2P protocols widely Piece-Attack on BitTorrent networks. Piece-Attack is one of used by a huge number of Internet users all over the world. the attacks against leechers in BitTorrent networks that was However, there are a few works about the attacks on Bit- first observed against real torrent swarms in [7]. However Torrent networks. This is mainly because of its open design the effectiveness of the attack has not been actively mea- specification along with many popular open source client sured yet. The contributions of this paper include: applications. In contrast, there are numerous amounts of research papers in P2P literature on both introducing and We actively measure the effectiveness of Piece-Attack identifying diverse kinds of attacks against P2P networks by launching it against different kind of real BitTor- which are orthogonal to the BitTorrent environment. rent networks. We have fired large-scale Piece- As one of the early papers concerned with attacks against Attacks, via numerous public IP addresses used by BitTorrent networks, [16] has discussed the Piece Lying and hundreds of attacker peers. We repeated our meas- Eclipse attacks to hinder distribution of data in BitTorrent urements in several Scenarios to see the results of the swarms. The authors evaluated the effectiveness of those attack against different kinds of BitTorrent networks. attacks by launching them against their own implemented We point out the constraint factors that anti-P2P BitTorrent protocol, using a discrete-event simulator. They companies should consider in using this kind of concluded that BitTorrent protocol is susceptible to those attack against peers who contribute to public distri- attacks and the targeted torrent networks can be taken bution of copyright protected materials in BitTorrent down by attackers with even modest amounts of resources. networks. To accurately measure the factors that can They assumed an identical behavior for all the BitTorrent affect the intensity of Piece-Attack, in each scenario, clients in their simulation which is not practically true we have fired lots of attacks with variant number of in real torrent swarms. Today, there are different kinds of public IP addresses used by our attacker peers and BitTorrent client applications that are well configured to get also diverse number of attackers.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us