Monitoring the Bittorrent Monitors: A Bird’s Eye View
Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as not ’politically’ correct, since it is associated with the controversial issue of detecting agencies that monitor Bittorrent for copyright infringement. However, deviant behavior detection and its associated blacklists might prove crucial for the well being of Bittorrent as there are other deviant entities in Bittorrent besides monitors. Our goal is to provide some initial heuristics that can be used to automatically detect deviant clients. We analyze for 45 days the top 600 torrents of Pirate Bay. We show that the empirical observation of Bittorrent clients can be used to detect deviant behavior, and consequently, it is possible to automatically build dynamic blacklists.
- 2.The Pirate Bay. Top 100 torrents per category, http://thepiratebay.org/top
- 3.Defrawy, K.E., Gjoka, M., Markopoulou, A.: Bottorrent: misusing bittorrent to launch ddos attacks. In: SRUTI 2007: Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet, Santa Clara, CA, pp. 1–6. USENIX Association (2007)Google Scholar
- 4.Dhungel, P., Di Wu, B.S., Ross, K.W.: A measurement study of attacks on bittorrent leechers. In: Proc. IPTPS (2008)Google Scholar
- 5.iBlocklists. iblocklists, http://iblocklist.com/lists.php
- 7.Piatek, M., Kohno, T., Krishnamurthy, A.: Challenges and directions for monitoring p2p file sharing networks or why my printer received a DMCA takedown notice. In: Proc. of 3rd USENIX Workshop on Hot Topics in Security (HotSec 2008) (2008)Google Scholar
- 8.Siganos, G., Rodriguez, P.: APOLLO: Network transparency through a pirate’s spyglass. under preparation (2009), http://research.tid.es/georgos/images/apollo_client.pdf