Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007) 2007
DOI: 10.1109/p2p.2007.4343462
|View full text |Cite
|
Sign up to set email alerts
|

Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2009
2009
2012
2012

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 0 publications
0
5
0
1
Order By: Relevance
“…In an online social network (OSN) where users are associated with unique numeric IDs, uniform node sampling is performed by querying randomly generated IDs. In a P2P network like Bittorrent, uniform node sampling is performed by querying a tracker server [14]. In practice, however, these samples are expensive (resource-wise) operations (the ID space in an OSN, such as Facebook and MySpace, is large and sparse and tracker queries can be rate-limited [14]).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In an online social network (OSN) where users are associated with unique numeric IDs, uniform node sampling is performed by querying randomly generated IDs. In a P2P network like Bittorrent, uniform node sampling is performed by querying a tracker server [14]. In practice, however, these samples are expensive (resource-wise) operations (the ID space in an OSN, such as Facebook and MySpace, is large and sparse and tracker queries can be rate-limited [14]).…”
Section: Introductionmentioning
confidence: 99%
“…In a P2P network like Bittorrent, uniform node sampling is performed by querying a tracker server [14]. In practice, however, these samples are expensive (resource-wise) operations (the ID space in an OSN, such as Facebook and MySpace, is large and sparse and tracker queries can be rate-limited [14]). For instance, in MySpace we expect only 10% the IDs to belong to valid users [10], i.e., only one in every ten queries successfully finds a valid MySpace account.…”
Section: Introductionmentioning
confidence: 99%
“…Malicious peers will cheat the seeder and the tracker [3]. Figure 1 shows Sybil nodes can annoy participants with the following attacks.…”
Section: Threat Modelsmentioning
confidence: 99%
“…The original seeder hashes each block in the file with k hash functions, and marks the corresponding k bits in the filter. After processing all blocks, the seeder adds this B F ilter to the torrent metadata 3 . After obtaining the torrent file, leechers do not need to download it again when they rejoin the swarm.…”
Section: Golf Schemementioning
confidence: 99%
See 1 more Smart Citation