Toward the Next-Generation Peer-to-Peer ServicesView this Special Issue
Research Article | Open Access
Mo Zhou, Yafei Dai, Xiaoming Li, "A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems", Advances in Multimedia, vol. 2007, Article ID 027958, 9 pages, 2007. https://doi.org/10.1155/2007/27958
A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems
The architecture of P2P file-sharing applications has been developing to meet the needs of large scale demands. The structured overlay network, also known as DHT, has been used in these applications to improve the scalability, and robustness of the system, and to make it free from single-point failure. We believe that the measurement study of the overlay network used in the real file-sharing P2P systems can provide guidance for the designing of such systems, and improve the performance of the system. In this paper, we perform the measurement in two different aspects. First, a modified client is designed to provide view to the overlay network from a single-user vision. Second, the instances of crawler programs deployed in many nodes managed to crawl the user information of the overlay network as much as possible. We also find a vulnerability in the overlay network, combined with the character of the DNS service, a more serious DDoS attack can be launched.
- B. Cohen, “Incentives build robustness in bitTorrent,” in Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, Calif, USA, June 2003.
- napster, http://www.napster.com/.
- gnutella, http://www.gnutella.com/.
- eMule, http://www.emule-project.net/.
- Y. Zhao, X. Hou, M. Yang, and Y. Dai, “Measurement study and application of social network in the maze P2P file-sharing system,” in Proceedings of the 1st International Conference on Scalable Information Systems (InfoScale '06), p. 57, ACM Press, Hong Kong, May 2006.
- Pplive, http://www.pplive.com/.
- D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer, “SETI@home: an experiment in public-resource computing,” Communications of the ACM, vol. 45, no. 11, pp. 56–61, 2002.
- I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, “Chord: a scalable peer-to-peer lookup service for internet applications,” in Proceedings of the International Conference on Applications, Technologies, Architectures, and Protocols for Computers Communications (SIGCOMM '01), pp. 149–160, ACM Press, San Diego, Calif, USA, August 2001.
- A. I. T. Rowstron and P. Druschel, “Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems,” in Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg (Middleware '01), pp. 329–350, Springer, Heidelberg, Germany, November 2001.
- B. Zhao, L. Huang, J. Stribling, S. Rhea, A. Joseph, and J. Kubiatowicz, “Tapestry: a resilient global-scale overlay for service deployment,” IEEE Journal on Selected Areas in Communications, vol. 22, no. 1, pp. 41–53, 2004.
- P. Maymounkov and D. Mazieres, “Kademlia: a peer-to-peer information system based on the XOR metric,” in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), pp. 53–62, Cambridge, Mass, USA, March 2002.
- S. Saroiu, P. K. Gummadi, and S. D. Gribble, “A measurement study of peer-to-peer file sharing systems,” in Multimedia Computing and Networking (MMCN '02), vol. 4673 of Proceedings of SPIE, pp. 156–170, San Jose, Calif, USA, January 2002.
- Y. Qiao and F. E. Bustamante, “Structured and unstructured overlays under the microscope: a measurement-based view of two P2P systems that people use,” in Proceedings of USENIX Annual Technical Conference, pp. 341–355, Boston, Mass, USA, May-June 2006.
- Overnet, http://en.wikipedia.org/wiki/Overnet/.
- eDonkey, http://en.wikipedia.org/wiki/Edonkey2000.
- Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker, “Search and replication in unstructured peer-to-peer networks,” in Proceedings of the 16th International Conference on Supercomputing (ICS '02), pp. 84–95, ACM Press, New York, NY, USA, June 2002.
- K. Sripanidkulchai, B. Maggs, and H. Zhang, “Efficient content location using interest-based locality in peer-to-peer systems,” in Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), vol. 3, pp. 2166–2176, San Francisco, Calif, USA, March-April 2003.
- R. Bhagwan, S. Savage, and G. Voelker, “Understanding availability,” in Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), pp. 256–267, Berkeley, Calif, USA, February 2003.
- J. Yang, H. Ma, W. Song, J. Cui, and C. Zhou, “Crawling the eDonkey network,” in Proceedings of the 5th International Conference on Grid and Cooperative Computing Workshops (GCCW '06), pp. 133–136, Hunan, China, October 2006.
- K. Tutschku, “A measurement-based traffic profile of the eDonkey filesharing service,” in Proceedings of the 5th anuual Passive and Active Measurement Workshop (PAM '04), pp. 12–21, Antibes Juanles-Pins, France, April 2004.
- D. Stutzbach and R. Rejaie, “Improving lookup performance over a widely-deployed DHT,” in Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM '06), pp. 1–12, Barcelona, Spain, April 2006.
- M. Zhou, Y. Dai, and X. Li, “A measurement study of the structured overlay network in P2P file-sharing applications,” in Proceedings of the 8th IEEE International Symposium on Multimedia (ISM '06), pp. 621–628, San Diego, Calif, USA, December 2006.
- B. Chun, D. Culler, T. Roscoe et al., “PlanetLab: an overlay testbed for broad-coverage services,” ACM SIGCOMM Computer Communication Review, vol. 33, no. 3, pp. 3–12, 2003.
- amule, http://www.amule.org/.
- Rfc1034, http://www.ietf.org/rfc/rfc1034.txt.
- Rfc1035, http://www.ietf.org/rfc/rfc1035.txt.
- N. Naoumov and K. Ross, “Exploiting P2P systems for DDoS attacks,” in Proceedings of the 1st International Conference on Scalable Information Systems (InfoScale '06), vol. 152, p. 47, ACM Press, Hong Kong, May-June 2006.
- J. Liang, N. Naoumov, and K. W. Ross, “The index poisoning attack in P2P file sharing systems,” in Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM '06), pp. 1–12, Barcelona, Spain, April 2006.
Copyright © 2007 Mo Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.