Hijacking the Vuze BitTorrent network: all your hop are belong to us

Cited 2 time in webofscience Cited 2 time in scopus
  • Hit : 861
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorChan-Tin, Ericko
dc.contributor.authorHeorhiadi, Victorko
dc.contributor.authorHopper, Nicholasko
dc.contributor.authorKim, Yongdaeko
dc.date.accessioned2015-07-22T04:45:31Z-
dc.date.available2015-07-22T04:45:31Z-
dc.date.created2015-07-08-
dc.date.created2015-07-08-
dc.date.created2015-07-08-
dc.date.issued2015-07-
dc.identifier.citationIET INFORMATION SECURITY, v.9, no.4, pp.203 - 208-
dc.identifier.issn1751-8709-
dc.identifier.urihttp://hdl.handle.net/10203/199988-
dc.description.abstractVuze is a popular file-sharing client. When looking for content, Vuze selects from its list of neighbours, a set of 20 nodes to be contacted; the selection is performed such that the neighbours closest to the content in terms of Vuze ID are contacted first. To improve efficiency of its searches, Vuze implements a network coordinate system: from the set of 20 to-be-contacted nodes, queries are sent to the closest nodes in terms of network distance, which is calculated by the difference in network coordinates. However, network coordinate systems are inherently insecure and a malicious peer can lie about its coordinate to appear closest to every peer in the network. This allows the malicious peer to bias next-hop choices for victim peers such that queries will be sent to the attacker, thus hijacking every search query. In our experiments, almost 20% of the search queries are hijacked; the cost of performing this attack is minimal - less than $112/month.-
dc.languageEnglish-
dc.publisherINST ENGINEERING TECHNOLOGY-IET-
dc.titleHijacking the Vuze BitTorrent network: all your hop are belong to us-
dc.typeArticle-
dc.identifier.wosid000356230800001-
dc.identifier.scopusid2-s2.0-84931027340-
dc.type.rimsART-
dc.citation.volume9-
dc.citation.issue4-
dc.citation.beginningpage203-
dc.citation.endingpage208-
dc.citation.publicationnameIET INFORMATION SECURITY-
dc.identifier.doi10.1049/iet-ifs.2014.0337-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.nonIdAuthorChan-Tin, Eric-
dc.contributor.nonIdAuthorHeorhiadi, Victor-
dc.contributor.nonIdAuthorHopper, Nicholas-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 2 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0