Computer Science – Networking and Internet Architecture
Scientific paper
2010-04-06
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), San Jose, CA : United States (2010)
Computer Science
Networking and Internet Architecture
Scientific paper
This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and that those content providers are located in foreign data centers. We also show that an adversary can compromise the privacy of any peer in BitTorrent and identify the big downloaders that we define as the peers who subscribe to a large number of contents. This infringement on users' privacy poses a significant impediment to the legal adoption of BitTorrent.
Blond Stevens Le
Dabbous Walid
Fessant Fabrice Le
Kaafar Mohamed Ali
Legout Arnaud
No associations
LandOfFree
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-58606