CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Pollution Measurement in Bittorent

by G. N. Purohit, Deepika Sainani, Urmil Malik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 2
Year of Publication: 2016
Authors: G. N. Purohit, Deepika Sainani, Urmil Malik

G. N. Purohit, Deepika Sainani, Urmil Malik . Pollution Measurement in Bittorent. International Journal of Computer Applications. 149, 2 ( Sep 2016), 8-12. DOI=10.5120/ijca2016911351

@article{ 10.5120/ijca2016911351,
author = { G. N. Purohit, Deepika Sainani, Urmil Malik },
title = { Pollution Measurement in Bittorent },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 2 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016911351 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:53:36.589434+05:30
%A G. N. Purohit
%A Deepika Sainani
%A Urmil Malik
%T Pollution Measurement in Bittorent
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 2
%P 8-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Since the invent of Napster an earlier version of peer–to- peer [P2P] network , P2P has emerged as the most significant technique for sharing content across the network[1].The traffic volume exchanged among the peers and the number of member peers in a P2P network has risen to a significant level .The reason for this significant rise is a absence of a centralized authority and distributed nature of the network .However, these reasons for significant rise of P2P network also makes the P2P networks vulnerable to various pollution attacks such as denial of service attack, content poisoning, collusion sybil etc. Liang et. al [2] has discussed pollution attacks in the Fast Track file sharing network. This network has also been used for distributing copy-righted material illegally, and their legal owners thought that their assets are distributed illegally through P2P network. Since the file distribution through P2P network is very fast, the producers/developers of multimedia data like music, films, television etc are much concerned with the apprehension that their assets are distributed illegally through P2P network. For controlling the illegal distribution of their assets, they fought legal battles in courts, but could not succeed in it .Then they employed the same P2P network, using P2P pollution attack, to stop the illegal distribution of their data files. In this paper, an evaluation is done to measure the damage to the BitTorrent distributing pirated files under certain pollution attacks, specifically Index poisoning and Uncooperative peer attacks, and to assess whether this strategy is successful..

  1. L. Hu and Z. X. Lu, “Downloading Trace study for BitTorrent P2P performance measurement and analysis,” Peer-to-Peer Networking and applications, Vol. 5, Issue 4, pp.384-397, 2012.
  2. J. Laing, R. Kumar, Y Xi and K. W. Ross, “Pollution in P2P files sharing systems,” 24th IEEE International conference INFOCOM Miami, Florida, USA pp. 1566-1590, 2005.
  3. Jie Kong, Wandong Cai, Lei Wang and Qiushi Zhao, “A study of pollution on BitTorrent”, The 2nd International Conference on Computer and Automation Engineering (ICCAE), Vol. 3, 2010.
  4. M. Yoshida, S. Ohzahata, A. Nakao, and K. Kawashima, “Controlling file distribution in winny network through index poisoning” in Proc. of International Conference on Information Networking (ICOIN), 2009.
  5. J. Liang, J.N.Naoumov and K. W. Ross, “The Index Poisoning Attack in P2P File sharing systems,” Proceedings of IEEE INFOCOM-2006.
  6. Lian, Q., Peng, Y., Yang, M., Zhang, Z., Dai, Y., Li, X., “Robust incentives via multi-level tit-for-tat,” research articles in Concurr. Comput. Pract. Exper, pp. 167–178, 2008.
  7. Shi, J, Zhang H., “A protocol based countermeasure to BitTorrent Fake-Block Attack,” J. Computational Inform. Sys. Vol. 12, No.8, pp 5211-18, 2012.
  8. B. Cohen,”Incentives Build Robustness in BitTorret,” Proc. of the Ist workshop on the Economics of Peer-to-Peer systems, Berkley, CA, June 5-6, 2003.
  9. S. Kim, S. Choi, B. Roh., “A survey of attacks on the BitTorrent protocol from its operational viewpoints,” research notes in Information science (RNIS) Vol. 14, June 2013.
  10. Hyunggon Park, Rafit Izhak Ratzin and Mihaela van der Schaar, “Peer-to-Peer Networks: Protocols, Cooperation and Competition,” Streaming Media Architectures, Techniques, and Applications: Recent Advances, 2010.
  11. V. atlidakis, M. Rousspoulos and A. Dellis, “Changing the unchoking policy for an Enhanced BitTorrent,” Parrallel processing Springer Berlin Heider berg, 2012.
  12. K. C. Sia, “DDOS vulnerability analysis of BitTorrent protocol,” University of California, Las Angeles, USA, 2007.
  13. K. E.Defrawy, M. Groka and A. Markupoulou, “BitTorrent misusing BitTorrent to launch DDOS attack,” USENIX, June 2007.
  14. Yuusuke Oookita & Santoshi Fujita, “Index Poisoning Scheme for P2P file sharing system with Low spatial and Network cost,” Bulletin of networking, computing systems and software, Vol. 4, No.1, pp. 27-33, 2015.
  15. Marti Ksionsk, Ping Ji, Weifeng Chen, “Attacks on BitTorrent – An Experimental Study,” e-Forensics-2010 LNICST 56, pp. 79-89, 2011.
Index Terms

Computer Science
Information Sciences


P2P networks Index poisoning Uncooperative peer BitTorrent.