Jian Wang, Xiumei Wu, Na Guo, C. Ullrich, Heng Luo
{"title":"阻止对bt种子群的不当利用","authors":"Jian Wang, Xiumei Wu, Na Guo, C. Ullrich, Heng Luo","doi":"10.1109/CYBERC.2010.50","DOIUrl":null,"url":null,"abstract":"Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some anti-Bit Torrent companies even launch targeted attacks against the seeds. This paper proposes a batch mechanism for proper functioning of the seeds. It applies symmetric-key encryption and chunk mixing to plain chunks of the file, and enforces chunk recipients to do exchanges before they are able to obtain plain chunks. As a result, free-riding behavior and malicious attacks are discouraged. Also, the robustness of the batch mechanism is analyzed in detail under both fully and partial colluding scenarios.","PeriodicalId":315132,"journal":{"name":"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Discouraging Improper Exploitation against Seeds in BitTorrent Swarms\",\"authors\":\"Jian Wang, Xiumei Wu, Na Guo, C. Ullrich, Heng Luo\",\"doi\":\"10.1109/CYBERC.2010.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some anti-Bit Torrent companies even launch targeted attacks against the seeds. This paper proposes a batch mechanism for proper functioning of the seeds. It applies symmetric-key encryption and chunk mixing to plain chunks of the file, and enforces chunk recipients to do exchanges before they are able to obtain plain chunks. As a result, free-riding behavior and malicious attacks are discouraged. Also, the robustness of the batch mechanism is analyzed in detail under both fully and partial colluding scenarios.\",\"PeriodicalId\":315132,\"journal\":{\"name\":\"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"volume\":\"65 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBERC.2010.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERC.2010.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
Bit Torrent可以说是互联网上最流行的文件共享协议。在Bit Torrent群体中,种子通常免费提供文件块,从而诱导搭便车行为。一些反比特Torrent公司甚至对种子发起针对性攻击。本文提出了一种保证种子正常运行的批处理机制。它对文件的普通块应用对称密钥加密和块混合,并强制块接收者在能够获得普通块之前进行交换。因此,不鼓励搭便车行为和恶意攻击。同时,详细分析了批处理机制在完全串通和部分串通两种情况下的鲁棒性。
Discouraging Improper Exploitation against Seeds in BitTorrent Swarms
Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some anti-Bit Torrent companies even launch targeted attacks against the seeds. This paper proposes a batch mechanism for proper functioning of the seeds. It applies symmetric-key encryption and chunk mixing to plain chunks of the file, and enforces chunk recipients to do exchanges before they are able to obtain plain chunks. As a result, free-riding behavior and malicious attacks are discouraged. Also, the robustness of the batch mechanism is analyzed in detail under both fully and partial colluding scenarios.