The objective of the paper is to propose and describe a possible defense mechanism that can be taken up to prevent exploitation of Bit torrent in a peer-to-peer network.
Keywords
Bit Torrent, Torrent, Lechers, Seeds, Tracker
User
Information