Abstract
In this paper, we propose a lightweight method for detecting and classifying BitTorrent content providers with a minimal amount of resources. While heavy methodologies are typically used (which require long term observation and data exchange with peers of the swarm and/or a semantic analysis of torrent websites), we instead argue that such complexity can be avoided by analyzing the correlations between peers and torrents. We apply our methodology to study over 50K torrents injected in ThePirateBay during one month, collecting more than 400K IPs addresses. Shortly, we find that exploiting the correlations not only enhances the classification accuracy kee** the technique lightweight (our methodology reliably identifies about 150 seedboxes), but also uncovers seeding behaviors that were not previously noticed (e.g., as multi-port and multi-host seeding). Finally, we correlate the popularity of seedbox hosting in our dataset to criteria (e.g., cost, storage space, Web popularity) that can bias the selection process of BitTorrent content providers.
Chapter PDF
Similar content being viewed by others
References
Alcock, S., Nelson, R.: Measuring the Impact of the Copyright Amendment Act on Residential DSL Users. In: ACM IMC (2012)
Piatek, M., Kohno, T., Krishnamurthy, A.: Challenges and directions for monitoring P2P file sharing networks – or why my printer received a DMCA takedown notice. In: USENIX HotSec (2008)
Piatek, M., Isdal, T., Krishnamurthy, A., Anderson, T.: One hop reputations for peer to peer file sharing workloads. In: USENIX NSDI (2008)
Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., Rejaie, R.: Is content publishing in BitTorrent altruistic or profit-driven? In: ACM CoNEXT (2010)
Le Blond, S., Legout, A., Lefessant, F., Dabbous, W., Kaafar, M.A.: Spying the world from your laptop: identifying and profiling content providers and big downloaders in BitTorrent. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET (2010)
Zhang, C., Dhungel, P., Wu, D., Ross, K.W.: Unraveling the BitTorrent ecosystem. IEEE Transactions on Parallel Distributed Systems 22, 1164–1177 (2011)
Han, J., Kim, S., Chung, T., Kwon, T., Kim, H., Choi, Y.: Bundling practice in BitTorrent: what, how, and why. In: ACM SIGMETRICS (2012)
Siganos, G., Pujol, J.M., Rodriguez, P.: Monitoring the bittorrent monitors: A bird’s eye view. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 175–184. Springer, Heidelberg (2009)
Chen, X., Jiang, Y., Chu, X.: Measurements, analysis and modeling of private trackers. In: IEEE Peer-to-Peer, P2P (2010)
Avrachenkov, K., Goncalves, P., Legout, A., Sokol, M.: Classification of content and users in BitTorrent by semi-supervised learning methods. In: IEEE IWCMC (2012)
Kim, S., Han, J., Chung, T., Kim, H.-c., Kwon, T.‘., Choi, Y.: Content publishing and downloading practice in bitTorrent. In: Bestak, R., Kencl, L., Li, L.E., Widmer, J., Yin, H. (eds.) NETWORKING 2012, Part II. LNCS, vol. 7290, pp. 97–110. Springer, Heidelberg (2012)
Zhu, X., Ghahramani, Z.: Learning from labeled and unlabeled data with label propagation. Tech. rep., CMU-CALD-02-107 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rossi, D., Pujol, G., Wang, X., Mathieu, F. (2014). Peeking through the BitTorrent Seedbox Hosting Ecosystem. In: Dainotti, A., Mahanti, A., Uhlig, S. (eds) Traffic Monitoring and Analysis. TMA 2014. Lecture Notes in Computer Science, vol 8406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54999-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-54999-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54998-4
Online ISBN: 978-3-642-54999-1
eBook Packages: Computer ScienceComputer Science (R0)