Skip to main content
Log in

Analysis of user’s behavior and resource characteristics for private trackers

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In recent years, a novel BitTorrent (BT) technology, Private Tracker (PT), has received extensive attention from both academia and industry. Due to its huge amount of traffic volumes and users, it is essential to understand PT’s characteristics regarding system management. In this paper, by studying the data crawled from a number of well-known PT sites, we performed an in-depth measurement and analysis of the PT system, in terms of resources and users’ behavior characteristics. The analysis of the activity and age distributions of torrents indicates that the sequence of torrent activities followed a power-law distribution while the sequence of torrent’s age followed a linear distribution. It was also found that the resources redundancy between any two PTs was larger than 60 %, which led to a substantial waste of storage space and power energy due to the lack of sharing mechanism among PT sites. Measurements on the users’ behavior show that every PT site had a number of users with stable levels who contributed to the survivability and popularity of the site. Finally, based on the results, several drawbacks of PT system were identified, which are crucial for efficacious system management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Levin D, LaCurts K, Spring N, Bhattacharjee B (2008) Bittorrent is an auction: analyzing and improving bittorrent’s incentives. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, Seattle, WA, USA. ACM, pp 243–254

  2. Kaune S, Rumin RC, Tyson G, Mauthe A, Guerrero C, Steinmetz R (2010) Unraveling BitTorrent’s file unavailability: measurements and analysis. In: Proceedings of IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), Delft, Netherlands, pp 1–9

  3. Pouwelse J, Garbacki P, Epema D, Sips H (2005) The BitTorrent P2P file-sharing system: measurements and analysis. Peer-to-Peer Syst IV 3640:205–216

    Article  Google Scholar 

  4. Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X (2007) A performance study of BitTorrent-like peer-to-peer systems. IEEE J Sel Areas Commun 25:155–169

    Article  Google Scholar 

  5. Costa-Montenegro E, Burguillo-Rial JC, Gil-Castiñeira F, González-Castaño FJ (2011) Implementation and analysis of the BitTorrent protocol with a multi-agent model. J Netw Comput Appl 34:368–383

    Article  Google Scholar 

  6. Qiu D, Srikant R (2004) Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, Portland, Oregon, USA, pp 367–378

  7. Jia AL, D’Acunto L, Meulpolder M, Pouwelse JA, Epema DHJ (2011) BitTorrent’s dilemma: Enhancing reciprocity or reducing inequity. In: Proceedings of IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, pp 705–709

  8. Bernaille L, Teixeira R, Salamatian K (2006) Early application identification. In: Proceedings of the 2006 ACM CoNEXT conference, Lisboa, Portugal, pp 1–12

  9. Meulpolder M, D’Acunto L, Capota M, Wojciechowski M, Pouwelse JA, Epema DHJ, Sips HJ (2010) Public and private bittorrent communities: A measurement study. In: Proceedings of the 9th International Workshop on Peer-to-Peer Systems (IPTPS), San Jose, CA, pp 10–10

  10. Feldman M, Chuang J (2005) Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exch 5:41–50

    Article  Google Scholar 

  11. Mahmoud ME, Xuemin S (2010) PIS: a practical incentive system for multihop wireless networks. IEEE Trans Veh Technol 59:4012–4025

    Article  Google Scholar 

  12. Mahmoud ME, Xuemin S (2011) ESIP: secure incentive protocol with limited use of public-key cryptography for multihop wireless networks. IEEE Trans Mob Comput 10:997–1010

    Article  Google Scholar 

  13. Mahmoud MMEA, Xuemin S (2012) FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks. IEEE Trans Mob Comput 11:753–766

    Article  Google Scholar 

  14. Chen X, Chu X, Liu J (2012) Unveiling popularity of BitTorrent darknets. IET Commun 6:1640–1650

    Article  Google Scholar 

  15. Andrade N, Mowbray M, Lima A, Wagner G, Ripeanu M (2005) Influences on cooperation in BitTorrent communities. In: Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, Philadelphia, Pennsylvania, USA, pp 111–115

  16. Sirivianos M, Park JH, Chen R, Yang X (2007) Free-riding in BitTorrent networks with the large view exploit. In: Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS), Bellevue, WA, USA

  17. Andrade N, Santos-Neto E, Brasileiro F, Ripeanu M (2009) Resource demand and supply in BitTorrent content-sharing communities. Comput Netw 53:515–527

    Article  MATH  Google Scholar 

  18. Zhang C, Dhungel P, Wu D, Liu Z, Ross KW (2010) BitTorrent darknets. In: Proceedings of IEEE INFOCOM, San Diego, CA, USA, pp 1–9

  19. Chen X, Chu X, Liu J (2010) Unveiling popularity of BitTorrent darknets. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), Miami, Florida, USA, pp 1–5

  20. Chen X, Jiang Y, Chu X (2010) Measurements, Analysis and Modeling of Private Trackers. In: Proceedings of IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), Delft, Netherlands, pp 1–10

  21. Chen X, Chu X, Li Z (2011) Improving sustainability of private p2p communities. In: Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Maui, Hawaii, pp 1–6

  22. Jia A, Chen X, Chu X, Pouwelse J, Epema DJ (2013) How to survive and thrive in a private BitTorrent community. In: Proceedings of 14th International Conference on Distributed Computing and Networking (ICDCN), Mumbai, India, pp 270–284

  23. Liu Z, Dhungel P, Wu D, Zhang C, Ross KW (2010) Understanding and improving ratio incentives in private communities. In: Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS), Genoa, Italy, pp 610–621

  24. Jia AL, Rahman R, Vinko T, Pouwelse JA, Epema DHJ (2011) Fast download but eternal seeding: The reward and punishment of Sharing Ratio Enforcement. In: Proceedings of 2011 I.E. International Conference on Peer-to-Peer Computing (P2P), pp 280–289

  25. Jia AL, Rahman R, Vinko T, Pouwelse JA, Epema DHJ (2013) Systemic risk and user-level performance in private P2P communities. IEEE Trans Parallel Distrib Syst 24:2503–2512

    Article  Google Scholar 

  26. Zhao Y, Zhang Z, Guo L, Fang B (2011) Revisiting the swarm evolution: A long term perspective. In: Proceedings of IEEE Symposium on Computers and Communications (ISCC), Kerkyra (Corfu), Greece, pp 1062–1067

  27. Csernai K, Jelasity M, Pouwelse J, Vinkó T (2011) Modeling unconnectable peers in private BitTorrent communities. In: Proceedings of 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Ayia Napa, Cyprus, pp 582–589

  28. Ao NX, Chen CJ (2011) Measurement study of IPv6 users on private BT. Adv Mater Res 267:726–731

    Article  Google Scholar 

  29. Rahman R, Hales D, Vinko T, Pouwelse J, Sips H (2010) No more crash or crunch: Sustainable credit dynamics in a P2P community. In: Proceedings of 2010 International Conference on High Performance Computing and Simulation (HPCS), pp 332–340

  30. Li Q, Qin T, Guan X, Zheng Q, Huang Q (2013) An In-depth Measurement and Analysis of Popular Private Tracker Systems in China. In: Proceedings of IEEE International Conference on Communications (ICC’13), Budapest, Hungary, pp 865–869

Download references

Acknowledgments

The research presented in this paper was partially supported by the National Natural Science Foundation of China (61221063, 61103240, 61103241, 91118005 and 91218301), the National Science & Technology Support Program of China (2011BAK08B02), the Application Foundation Research Program of SuZhou (SYG201227) and Fundamental Research Funds for the Central University. The authors would like to thank all the anonymous reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiang Li.

Additional information

A preliminary version of this paper appeared in IEEE ICC 2013 [30]. This version includes an extended measurement and analysis work on comparison between BT and PT and analysis of drawback in PT system.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, Q., Qin, T., Guan, X. et al. Analysis of user’s behavior and resource characteristics for private trackers. Peer-to-Peer Netw. Appl. 8, 432–446 (2015). https://doi.org/10.1007/s12083-014-0266-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-014-0266-2

Keywords

Navigation