Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | en_US |
dc.creator | Luo, Jiaqing | - |
dc.identifier.uri | https://theses.lib.polyu.edu.hk/handle/200/6274 | - |
dc.language | English | en_US |
dc.publisher | Hong Kong Polytechnic University | - |
dc.rights | All rights reserved | en_US |
dc.title | Towards understanding, improving and securing BitTorrent protocol and system | en_US |
dcterms.abstract | BitTorrent (BT) is one of the most common Peer-to-Peer (P2P) file sharing protocols. It was reported that the BT system has on average a day 20 millions users from 120 countries. The study of BT protocol and system has become an important aspect of P2P computing. Towards understanding, improving and securing BT protocol and system, we address several issues including modeling, algorithms and worms. 1) Modeling work provides insights into the BT system performance and the BT protocol improvement. Existing BT models are limited to a certain level peer level, cluster level, or swarm level. We build a bottom-up probabilistic model to analyze the BT system from the individual peer behavior to the overall system performance. 2) Piece-related algorithms play an inherently crucial role in the BT protocol, because the BT system relies upon peers to cooperatively trade their pieces with one another. Although existing algorithms were long believed to be good enough, our understanding of them is still far from complete. We propose a distributed credit method to prevent under-reporting, a utility-driven strategy to balance piece supply and demand, and a possible fix to address the conflict between piece selection and piece queuing. 3) P2P worms have become a serious threat to the Internet security, due to their fast and large-scale propagation in P2P systems. We present a novel Adaptive BitTorrent worm (A-BT worm) to discuss potential ways to design a powerful P2P worm. We then propose a hybrid model to estimate the worm damage, a statistical method to detect the worm behavior, and a safe strategy to slow down the worm propagation. | en_US |
dcterms.extent | xvi, 115 p. : ill. ; 30 cm. | en_US |
dcterms.isPartOf | PolyU Electronic Theses | en_US |
dcterms.issued | 2011 | en_US |
dcterms.educationalLevel | All Doctorate | en_US |
dcterms.educationalLevel | Ph.D. | en_US |
dcterms.LCSH | Peer-to-peer architecture (Computer networks) | en_US |
dcterms.LCSH | Downloading of data. | en_US |
dcterms.LCSH | Hong Kong Polytechnic University -- Dissertations | en_US |
dcterms.accessRights | open access | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
b24625097.pdf | For All Users | 4.82 MB | Adobe PDF | View/Open |
Copyright Undertaking
As a bona fide Library user, I declare that:
- I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
- I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
- I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.
Please use this identifier to cite or link to this item:
https://theses.lib.polyu.edu.hk/handle/200/6274