Exploiting BitTorrent For Fun (But Not Profit) Nikitas Liogkas, Robert Nelson, Eddie Kohler, Lixia Zhang University of California, Los Angeles.

Slides:



Advertisements
Similar presentations
Optimal Scheduling in Peer-to-Peer Networks Lee Center Workshop 5/19/06 Mortada Mehyar (with Prof. Steven Low, Netlab)
Advertisements

Rarest First and Choke Algorithms Are Enough
Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent Author: Bram Cohen Presenter: Brian Liao.
Incentives Build Robustness in BitTorrent- Bram Cohen Presented by Venkatesh Samprati.
The BitTorrent protocol A peer-to-peer file sharing protocol.
Incentives Build Robustness in BitTorrent Bram Cohen.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
Presented by: Su Yingbin. Outline Introduction SocialSwam Design Notations Algorithms Evaluation Conclusion.
Presentation by Manasee Conjeepuram Krishnamoorthy.
Kangaroo: Video Seeking in P2P Systems Xiaoyuan Yang †, Minas Gjoka ¶, Parminder Chhabra †, Athina Markopoulou ¶, Pablo Rodriguez † † Telefonica Research.
Peer-assisted On-demand Streaming of Stored Media using BitTorrent-like Protocols Authors: Niklas Carlsson & Derek L. Eager Published in: Proc. IFIP/TC6.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Seed Scheduling for Peer-to-Peer Networks Flavio Esposito Ibrahim Matta Pietro Michiardi Nobuyuki Mitsutake Damiano Carra.
The BitTorrent content distribution system CS217 Advanced Topics in Internet Research Guest Lecture Nikitas Liogkas, 5/11/2006.
Natural Selection in Peer-to-Peer Streaming: From the Cathedral to the Bazaar Vivek Shrivastava, Suman Banerjee University of Wisconsin-Madison, USA ACM.
Clustering and Sharing Incentives in BitTorrent Systems Arnaud Legout 1, Nikitas Liogkas 2, Eddie Kohler 2, Lixia Zhang 2 1 INRIA, Projet Planète, Sophia.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Analyzing and Improving BitTorrent Ashwin R. Bharambe ( Carnegie Mellon University ) Cormac Herley ( Microsoft Research, Redmond ) Venkat Padmanabhan (
Free-riding in BitTorrent Networks with the Large View Exploit Michael Sirivianos, Jong Han Park, Rex Chen and Xiaowei Yang University of California, Irvine.
CS 554. Peer-to-Peer Systems Faithfulness in Internet Algorithms Haridimos Kondylakis
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Performance Modeling and Engineering Issues of BT-Like File Sharing Systems M.H. Lin, John C.S. Lui, D.M. Chiu The Chinese University of Hong Kong.
A survey of BitTorrent study Jian Liang EL933 Prof. Yong Liu.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
Peer-Assisted Content Distribution Networks: Techniques and Challenges Pei Cao Stanford University.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Modeling and Performance Analysis of Bitorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant University of Illinois, 2004 Presented by : Ran Zivhon.
1 Incentives Build Robustness in BitTorrent? Analysis on Bit Torrent Client performance By Jimmy Wong.
A P2P file distribution system ——BitTorrent Fan Bin Sep,25,2004.
BitTorrent Background. Common Scenario Millions want to download the same popular huge files (for free) –ISO’s –Media (the real example!) Client-server.
Peer-To-Peer Multimedia Streaming Using BitTorrent Purvi Shah, Jehan-François Pâris University of Houston Houston, TX.
Content Overlays (Nick Feamster) February 25, 2008.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,
1 V1-Filename.ppt / yyyy-mm-dd / Initials P2P content distribution T Applications and Services in Internet, Fall 2008 Jukka K. Nurminen.
BitTorrent Internet Technologies and Applications.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
BitTorrent Dr. Yingwu Zhu. Bittorrent A popular P2P application for file exchange!
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani Szabolcs Nagy, ELTE.
1 Insertion of ISP-owned Peer & Locality Awareness in BitTorrent Ioanna Papafili, George D. Stamoulis, Sergios Soursos AUEB EuroNF workshop, Athens October.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 PPSP Protocol Considerations.
MULTI-TORRENT: A PERFORMANCE STUDY Yan Yang, Alix L.H. Chow, Leana Golubchik Internet Multimedia Lab University of Southern California.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
Analyzing and Improving BitTorrent Ashwin R. Bharambe ( Carnegie Mellon University ) Cormac Herley ( Microsoft Research, Redmond ) Venkat Padmanabhan (
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
Peer-to-Peer Networks 10 Fast Download Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Traffic Localization with Information Guidance of Pseudo Peer Agent on BT-P2P Network 學生 : 楊宏昌 指導教授 : 曾黎明教授 在 BT 同儕通訊上利用參與者訊息引導對外流量之區域化節約.
Public and private BitTorrent communities: A measurement study M. Meulpolder, L. D’Acunto, M. Capotă, M. Wojciechowski, J.A. Pouwelse, D.H.J. Epema, H.J.
An example of peer-to-peer application
FairTorrent: BrinGing Fairness to Peer-to-Peer Systems
Introduction to BitTorrent
Designing a new BitTorrent Client
Do incentives build robustness in BitTorrent?
Managing Inter-domain Traffic in the Presence of BitTorrent File-Sharing Srinivasan Seetharaman and Mostafa Ammar School of Computer Science Objective:
Small Is Not Always Beautiful
Do incentives build robustness in BitTorrent?
Simplified Explanation of “Do incentives build robustness in BitTorrent?” By James Hoover.
The BitTorrent Protocol
Pure P2P architecture no always-on server
Presentation transcript:

Exploiting BitTorrent For Fun (But Not Profit) Nikitas Liogkas, Robert Nelson, Eddie Kohler, Lixia Zhang University of California, Los Angeles

Motivation  Robustness: system always provides useful service to all connected peers depends on peers’ willingness to contribute but uploading not in peers’ direct self interest  Fairness: those who do not contribute should not be able to receive good service  Can fairness violations reduce robustness?

Selfish peers  BitTorrent fairness model rules for data exchange between peers “tit-for-tat” for upload decisions  Selfishness: peers violate fairness while evading detection abuse existing protocol mechanisms is it effective (fairness violation)? impact on honest peers (robustness reduction)?

Contributions  Designed and evaluated three selfish exploits tools for measuring robustness  Despite selfishness, BitTorrent quite robust at most 29% higher rates for the selfish peer but no considerable degradation of service  How is this robustness achieved? identify responsible protocol mechanisms propose five guiding design principles

Presentation outline  BitTorrent operation  Implementation and methodology  Design and evaluation of exploits  Discussion  Conclusions  Future work

new leecher BitTorrent – joining a torrent Peers divided into:  seeds: have the entire file  leechers: still downloading data request peer list metadata file join seed/leecherwebsitetracker 1. obtain the metadata file 2. contact the tracker 3. obtain a peer list (contains seeds & leechers) 4. contact peers from that list for data

! BitTorrent – exchanging data I have leecher A ● Verify pieces using hashes ● Download sub-pieces in parallel ● Advertise received pieces to the entire peer list ● Look for the rarest pieces seed leecher Bleecher C

BitTorrent - unchoking leecher Aseed leecher Bleecher Cleecher D ● Periodically calculate data-receiving rates ● Upload to (unchoke) the fastest downloaders ● Optimistic unchoking ▪ periodically select a peer at random and upload to it ▪ continuously look for the fastest partners

Presentation outline  BitTorrent operation  Implementation and methodology  Design and evaluation of exploits  Discussion  Conclusions  Future work

Implementation  implemented all three exploits in the Ctorrent client  ensured that our changes did not interfere with regular protocol operation  exploits do not exhaust all possible selfish behavior…  but prove to be valuable tools for evaluating robustness

Experimental methodology  Private torrents eight leechers & one seed on Planetlab most torrents are small [Guo et al., IMC’05] impose download and upload limits leechers join according to Poisson purpose: measure benefit to selfish (fairness), impact on honest (robustness)  Public torrents two clients join the same torrent together purpose: reveal impact in real settings

new list request peer list Exploit 1 – Downloading only from seeds leecher Aseed leecher Bleecher C tracker ● Repeatedly query the tracker for peer lists ● Distinguish the seeds, and receive data from them ● Download only from seeds; no need to upload ● Violates fairness model; also harmful to honest peers

Evaluation – Exploit 1 in private torrents  Limit bandwidth of leechers 1 to 6. No limit on seed.  Modest fairness violation (22% better rate) when selfish is fast  Robustness does not suffer: most honest slower by <15% min median max 25%ile 75%ile 22% Download rates for all peers

Evaluation – Exploit 1 with modified seed  Seed only unchokes one leecher at a time  Considerable fairness violation: selfish peer faster by 155%  Reduces robustness: honest peers slower by at least 32% Download rates for all peers 155%

Evaluation – Exploit 1 in public torrents  Tested with small ( 150 peers) torrents  Selfish leecher gets consistently higher download rates (7-20%)  Does particularly well in torrents with many seeds  Greater incentive to cheat in popular torrents

Exploit 2 – Downloading only from the fastest peers leecher A leecher Bleecher Cleecher D ● Do not perform optimistic unchokes ● Observe frequency of piece advertisements to infer bandwidth of peers ● Download only from fast peers, never waste time on slow ones ● Especially harmful at the start of a peer’s lifetime !I have

Evaluation – Exploit 2 in private torrents  Selfish peer interacts only with the two fastest leechers in its list  Modest fairness violation: selfish peer faster by 29%  Robustness does not suffer: impact on honest peers small Download rates for all peers 29%

Evaluation – Exploit 2 in public torrents  Exploit fails in public torrents consistently lower download rates (1-30%)  Reasons optimistic unchoking aids in discovering the best partners short-term calculations beat our advertisement-based estimations  Mechanism for continuous adaptation is valuable

Exploit 3 – Advertising false pieces ● Gradually advertise the rarest pieces ● Send garbage when you do not have a piece ● Lie about the pieces you have ▪ pollution is not primary objective leecher A leecher Bleecher C 4 !I have garbage

Evaluation – Exploit 3 in private torrents  Modest fairness violation: selfish peer faster by 22%  Robustness does not suffer; some of the honest peers even improve their rates! Download rates for all peers 22%

Evaluation – Exploit 3 in public torrents  Exploit fails in public torrents modern implementations keep state about the origin of pieces lying leechers easily detected  Remembering past interactions enables defending against false piece advertisements

Presentation outline  BitTorrent operation  Implementation and methodology  Design and evaluation of exploits  Discussion  Conclusions  Future work

Design principles  Parallel downloading  Memory of past interactions  Problem partitioning  Export minimal information  Keep the network connected

Principles #1 and #2  Maintain parallel interactions with multiple peers example: limited impact of the download- only-from-seeds exploit  Maintain memory of past interactions example: failure of the false-advertisements exploit in public torrents trade-off between robustness and performance

Principle #3  Enforce problem partitioning [Shneidman et al., PODC’04] “No peer should be able to influence another peer’s decision-making by declaring false information” Not enforced by BitTorrent Should decouple data needs (pieces) from the provided service (unchoking) Could harm performance

Principles #4 and #5  Export minimal information necessary example: hide that you are a seed super-seeding policy does just that  Keep the network connected optimistic unchoking: random choice that aids robustness value evident in the failure of the download- from-the fastest exploit in public torrents

Related work  Describes the basic BitTorrent mechanisms [Cohen, P2PECON’03]  Feasibility of selfish behavior in BitTorrent [Shneidman et al., PINS’04]  Theoretical analysis [Qiu et al., SIGCOMM’04]  Simulations [Bharambe et al., MSR-TR-2005]  Measurement studies [Izal et al., PAM’04, Pouwelse et al., Delft TR 2004 and IPTPS’05, Guo et al., IMC’05]

Conclusions  Presented three selfish exploits  BitTorrent quite robust, despite fairness violations  Identified protocol characteristics that enable robustness  Proposed five guiding design principles

Future work  Investigate combinations of exploits  Our exploits do not exhaust the complete space of selfish behavior how to methodically design other (possibly more successful) exploits?  Selfish behavior in multi-torrent systems

Exploiting BitTorrent For Fun (But Not Profit) Nikitas Liogkas, Robert Nelson, Eddie Kohler, Lixia Zhang Questions?

Bonus slide – Exploit 1 all-selfish scenario  Appears as if everyone benefits when everyone is being selfish  Artifact of the imposed bandwidth limits: seed serving similar clients  Degenerates into a client-server model Download rates for all peers