Monitoring the Bittorrent Monitors: A Bird’s Eye View

  • Georgos Siganos
  • Josep M. Pujol
  • Pablo Rodriguez
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5448)


Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as not ’politically’ correct, since it is associated with the controversial issue of detecting agencies that monitor Bittorrent for copyright infringement. However, deviant behavior detection and its associated blacklists might prove crucial for the well being of Bittorrent as there are other deviant entities in Bittorrent besides monitors. Our goal is to provide some initial heuristics that can be used to automatically detect deviant clients. We analyze for 45 days the top 600 torrents of Pirate Bay. We show that the empirical observation of Bittorrent clients can be used to detect deviant behavior, and consequently, it is possible to automatically build dynamic blacklists.


Autonomous System Deviant Behavior Deviant Peer Copyright Infringement Multiple Client 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Banerjee, A., Faloutsos, M., Bhuyan, L.: The p2p war: Someone is monitoring your activities. Comput. Netw. 52(6), 1272–1280 (2008)CrossRefGoogle Scholar
  2. 2.
    The Pirate Bay. Top 100 torrents per category,
  3. 3.
    Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: misusing bittorrent to launch ddos attacks. In: SRUTI 2007: Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet, Santa Clara, CA, pp. 1–6. USENIX Association (2007)Google Scholar
  4. 4.
    Dhungel, P., Di Wu, B.S., Ross, K.W.: A measurement study of attacks on bittorrent leechers. In: Proc. IPTPS (2008)Google Scholar
  5. 5.
    iBlocklists. iblocklists,
  6. 6.
    Liang, J., Naoumov, N., Ross, K.W.: Efficient blacklisting and pollution-level estimation in P2P file-sharing systems. In: Cho, K., Jacquet, P. (eds.) AINTEC 2005. LNCS, vol. 3837, pp. 1–21. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Piatek, M., Kohno, T., Krishnamurthy, A.: Challenges and directions for monitoring p2p file sharing networks or why my printer received a DMCA takedown notice. In: Proc. of 3rd USENIX Workshop on Hot Topics in Security (HotSec 2008) (2008)Google Scholar
  8. 8.
    Siganos, G., Rodriguez, P.: APOLLO: Network transparency through a pirate’s spyglass. under preparation (2009),

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Georgos Siganos
    • 1
  • Josep M. Pujol
    • 1
  • Pablo Rodriguez
    • 1
  1. 1.Telefonica ResearchSpain

Personalised recommendations