Protegendo BitTorrent: projeto e avaliação de contra-medidas eficazes para ataques DoS
Abstract
BitTorrent is a P2P file-sharing protocol that can be used to efficiently distribute files such as software updates and digital content to very large numbers of users. In a previous paper, we have shown that vulnerabilities can be exploited to launch Denial-of-Service (Dos) attacks against BitTorrent swarms. In this paper, we review the three most damaging attacks, and propose two algorithms as countermeasures to effectively tackle them. We implemented the attacks and countermeasures in TorrentSim, a packet-level BitTorrent simulator. The results indicate that our proposed approach is effective when there is an ongoing attack while at the same time efficient when the countermeasure is active but there is no attack.References
(2007). Azureus website. http://azureus.sourceforge.net/.
Barcellos, M. P., Mansilha, R. B., and Brasileiro, F. V. (2008). Torrentlab: investigating bittorrent through simulation and live experiments. IEEE Symposium on Computers and Communications (ISCC’08), pages 1–6.
Christin, N., Weigend, A. S., and Chuang, J. (2005). Content availability, pollution and poisoning in file sharing peer-to-peer networks. In 6th ACM conference on Electronic commerce (EC ’05), pages 68–77, New York, NY, USA. ACM Press.
Cohen, B. (2003). Incentives build robustness in bittorrent. In Proceedings of the 1st Workshop on the Economics of Peer-to-Peer Systems, pages 116–121, Berkeley, CA.
Douceur, J. R. (2002). The sybil attack. In 1st International Workshop on Peer-to-Peer Systems, pages 251–260, Cambridge, MA, USA.
Konrath, M. A., Barcellos, M. P., and Mansilha, R. B. (2007). Attacking a swarm with a band of liars: evaluating the impact of attacks on bittorrent. In The Seventh IEEE International Conference on Peer-to-Peer Computing (IEEE P2P 2007). IEEE.
Liogkas, N., Nelson, R., Kohler, E., and Zhang, L. (2006). Exploiting bittorrent for fun (but not profit). In 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006).
Locher, T., Moor, P., Schmid, S., and Wattenhofer, R. (2006). Free riding in bittorrent is cheap. In Fifth Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, US.
Mansilha, R. B., Barcellos, M. P., and Brasileiro, F. V. (2008). Torrentlab: Um ambiente para avaliação do protocolo bittorrent. XXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2008), pages 1–14.
Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., and Venkataramani, A. (2007). Do incentives build robustness in bittorrent? In Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation (NSDI 2007), Cambridge, MA. USENIX.
Schmitt, C., Barcellos, M. P., and Mansilha, R. B. (2008). Um estudo experimental sobre ataques ao sistema de compartilhamento p2p bittorrent. XXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2008), pages 1–14.
Shneidman, J., Parkes, D., and Massoulie, L. (2004). Faithfulness in internet algorithms. In Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS’04), Portland, OR, USA. ACM SIGCOMM.
Sirivianos, M., Park, J. H., Chen, R., and Yang, X. (2007). Free-riding in bittorrent with the large view exploit. In 6th International Workshop on Peer-to-Peer Systems (IPTPS 2007), Bellevue, WA, US.
Barcellos, M. P., Mansilha, R. B., and Brasileiro, F. V. (2008). Torrentlab: investigating bittorrent through simulation and live experiments. IEEE Symposium on Computers and Communications (ISCC’08), pages 1–6.
Christin, N., Weigend, A. S., and Chuang, J. (2005). Content availability, pollution and poisoning in file sharing peer-to-peer networks. In 6th ACM conference on Electronic commerce (EC ’05), pages 68–77, New York, NY, USA. ACM Press.
Cohen, B. (2003). Incentives build robustness in bittorrent. In Proceedings of the 1st Workshop on the Economics of Peer-to-Peer Systems, pages 116–121, Berkeley, CA.
Douceur, J. R. (2002). The sybil attack. In 1st International Workshop on Peer-to-Peer Systems, pages 251–260, Cambridge, MA, USA.
Konrath, M. A., Barcellos, M. P., and Mansilha, R. B. (2007). Attacking a swarm with a band of liars: evaluating the impact of attacks on bittorrent. In The Seventh IEEE International Conference on Peer-to-Peer Computing (IEEE P2P 2007). IEEE.
Liogkas, N., Nelson, R., Kohler, E., and Zhang, L. (2006). Exploiting bittorrent for fun (but not profit). In 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006).
Locher, T., Moor, P., Schmid, S., and Wattenhofer, R. (2006). Free riding in bittorrent is cheap. In Fifth Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, US.
Mansilha, R. B., Barcellos, M. P., and Brasileiro, F. V. (2008). Torrentlab: Um ambiente para avaliação do protocolo bittorrent. XXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2008), pages 1–14.
Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., and Venkataramani, A. (2007). Do incentives build robustness in bittorrent? In Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation (NSDI 2007), Cambridge, MA. USENIX.
Schmitt, C., Barcellos, M. P., and Mansilha, R. B. (2008). Um estudo experimental sobre ataques ao sistema de compartilhamento p2p bittorrent. XXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2008), pages 1–14.
Shneidman, J., Parkes, D., and Massoulie, L. (2004). Faithfulness in internet algorithms. In Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS’04), Portland, OR, USA. ACM SIGCOMM.
Sirivianos, M., Park, J. H., Chen, R., and Yang, X. (2007). Free-riding in bittorrent with the large view exploit. In 6th International Workshop on Peer-to-Peer Systems (IPTPS 2007), Bellevue, WA, US.
Published
2008-09-01
How to Cite
BAUERMANN, Daniel; LEHMANN, Matheus; MANSILHA, Rodrigo; BARCELLOS, Marinho P..
Protegendo BitTorrent: projeto e avaliação de contra-medidas eficazes para ataques DoS. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 8. , 2008, Gramado.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2008
.
p. 215-228.
DOI: https://doi.org/10.5753/sbseg.2008.20899.
