Preventing piracy content propagation in peer-to-peer networks

Hongli Zhang, Lin Ye, Jiantao Shi, Xiaojiang Du, Hsiao-Hwa Chen

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Peer-to-Peer (P2P) networks have been widely used in various Internet applications. However, P2P networks also cause serious concerns of copyrighted contents piracy: P2P helps to pirate copyrighted contents, which impedes wide application of P2P networks. In this paper, we investigate several important issues on the ways to prevent pirated content propagation in P2P networks. We propose a system to stop pirated content propagation by utilizing several attacks to BitTorrent (BT). First, we design a system that can handle a large number of concurrent connections to reduce bandwidth consumption. Second, we build two mathematical models for BT attacks, including leechers behavior model and fake-block behavior model, and we analyze the performance of the system using these models. Third, we optimize BT clients by taking into account different implementations and counter-measure designs. We conducted several experiments in real networks, the results of which verified that our system is suitable for most current BT clients, and BT clients' download duration is extended at least three times longer, which is much better than the results reported in the literature.

Original languageEnglish
Article number6560045
Pages (from-to)105-114
Number of pages10
JournalIEEE Journal on Selected Areas in Communications
Volume31
Issue number9
DOIs
Publication statusPublished - 2013 Sep 9

Fingerprint

Peer to peer networks
Internet
Mathematical models
Bandwidth
Experiments

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Zhang, Hongli ; Ye, Lin ; Shi, Jiantao ; Du, Xiaojiang ; Chen, Hsiao-Hwa. / Preventing piracy content propagation in peer-to-peer networks. In: IEEE Journal on Selected Areas in Communications. 2013 ; Vol. 31, No. 9. pp. 105-114.
@article{c137a85460804026b56b9aea96039e9f,
title = "Preventing piracy content propagation in peer-to-peer networks",
abstract = "Peer-to-Peer (P2P) networks have been widely used in various Internet applications. However, P2P networks also cause serious concerns of copyrighted contents piracy: P2P helps to pirate copyrighted contents, which impedes wide application of P2P networks. In this paper, we investigate several important issues on the ways to prevent pirated content propagation in P2P networks. We propose a system to stop pirated content propagation by utilizing several attacks to BitTorrent (BT). First, we design a system that can handle a large number of concurrent connections to reduce bandwidth consumption. Second, we build two mathematical models for BT attacks, including leechers behavior model and fake-block behavior model, and we analyze the performance of the system using these models. Third, we optimize BT clients by taking into account different implementations and counter-measure designs. We conducted several experiments in real networks, the results of which verified that our system is suitable for most current BT clients, and BT clients' download duration is extended at least three times longer, which is much better than the results reported in the literature.",
author = "Hongli Zhang and Lin Ye and Jiantao Shi and Xiaojiang Du and Hsiao-Hwa Chen",
year = "2013",
month = "9",
day = "9",
doi = "10.1109/JSAC.2013.SUP.0513010",
language = "English",
volume = "31",
pages = "105--114",
journal = "IEEE Journal on Selected Areas in Communications",
issn = "0733-8716",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "9",

}

Preventing piracy content propagation in peer-to-peer networks. / Zhang, Hongli; Ye, Lin; Shi, Jiantao; Du, Xiaojiang; Chen, Hsiao-Hwa.

In: IEEE Journal on Selected Areas in Communications, Vol. 31, No. 9, 6560045, 09.09.2013, p. 105-114.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Preventing piracy content propagation in peer-to-peer networks

AU - Zhang, Hongli

AU - Ye, Lin

AU - Shi, Jiantao

AU - Du, Xiaojiang

AU - Chen, Hsiao-Hwa

PY - 2013/9/9

Y1 - 2013/9/9

N2 - Peer-to-Peer (P2P) networks have been widely used in various Internet applications. However, P2P networks also cause serious concerns of copyrighted contents piracy: P2P helps to pirate copyrighted contents, which impedes wide application of P2P networks. In this paper, we investigate several important issues on the ways to prevent pirated content propagation in P2P networks. We propose a system to stop pirated content propagation by utilizing several attacks to BitTorrent (BT). First, we design a system that can handle a large number of concurrent connections to reduce bandwidth consumption. Second, we build two mathematical models for BT attacks, including leechers behavior model and fake-block behavior model, and we analyze the performance of the system using these models. Third, we optimize BT clients by taking into account different implementations and counter-measure designs. We conducted several experiments in real networks, the results of which verified that our system is suitable for most current BT clients, and BT clients' download duration is extended at least three times longer, which is much better than the results reported in the literature.

AB - Peer-to-Peer (P2P) networks have been widely used in various Internet applications. However, P2P networks also cause serious concerns of copyrighted contents piracy: P2P helps to pirate copyrighted contents, which impedes wide application of P2P networks. In this paper, we investigate several important issues on the ways to prevent pirated content propagation in P2P networks. We propose a system to stop pirated content propagation by utilizing several attacks to BitTorrent (BT). First, we design a system that can handle a large number of concurrent connections to reduce bandwidth consumption. Second, we build two mathematical models for BT attacks, including leechers behavior model and fake-block behavior model, and we analyze the performance of the system using these models. Third, we optimize BT clients by taking into account different implementations and counter-measure designs. We conducted several experiments in real networks, the results of which verified that our system is suitable for most current BT clients, and BT clients' download duration is extended at least three times longer, which is much better than the results reported in the literature.

UR - http://www.scopus.com/inward/record.url?scp=84883314050&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883314050&partnerID=8YFLogxK

U2 - 10.1109/JSAC.2013.SUP.0513010

DO - 10.1109/JSAC.2013.SUP.0513010

M3 - Article

VL - 31

SP - 105

EP - 114

JO - IEEE Journal on Selected Areas in Communications

JF - IEEE Journal on Selected Areas in Communications

SN - 0733-8716

IS - 9

M1 - 6560045

ER -