Covert Channel in the BitTorrent Tracker Protocol

نویسندگان

  • Joseph Desimone
  • Daryl Johnson
  • Bo Yuan
  • Peter Lutz
چکیده

Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert channels can be used. A botnet should rely on covert channels built on ubiquitous protocols to blend in with legitimate traffic. In this paper, we propose a covert channel built on the BitTorrent peer-to-peer protocol. In a simple application, this covert channel can be used to discretely and covertly send messages between two parties. However, this covert channel can also be used to stealthily distribute commands or the location of a command and control server for use in a botnet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classification of BitTorrent Attacks from the Protocol’s Operational Viewpoints

As the BitTorrent has become one of the most popular peer-to-peer file sharing systems, various security threats appear based on its operation. In this paper, we analyzed the vulnerabilities of the BitTorrent protocol, and surveyed existing attacks on the protocol. Then, we classified the attacks from the protocol’s operational viewpoints. Basically, the protocols are categorized into two parts...

متن کامل

BitTorrent Architecture and Protocol

BitTorrent is a new popular application layer network protocol used to distribute files. BitTorrent is efficient at content delivery by maximizing the upload utilization and by preventing unfairness. This paper discusses the BitTorrent architecture and protocol in great detail by discussing the tracker and all the messages sent between the peers and the tracker and also between peers and peers....

متن کامل

New Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization

Currently, BitTorrent is the most popular protocol that is widely used for P2P file sharing system. Nevertheless, BitTorrent protocol exposes some inefficient processes that are choosing neighbours and selecting pieces. These are mainly based on the knowledge of overlay topology without considering underlying internet topology that might cause of traffic problems such as the bottleneck at some ...

متن کامل

Performance Evaluation of the Advanced Network Tracker for BitTorrent

BitTorrent, a popular Peer-to-Peer (P2P) protocol, has recently engendered considerable controversy. Many P2P applications implement a variant of the protocol due to its cost-effective scalability. However, for Internet Service Providers (ISPs) the protocol is notorious for its high network cost. To reduce these costs, ISPs have deployed network devices to detect and throttle BitTorrent traffic...

متن کامل

BitTorrent File Sharing in Mobile Ad-hoc Networks∗

This paper presents an application of the Group-based Service Discovery Protocol (GSD) to implement the BitTorrent file sharing protocol on dynamically variable mobile ad-hoc network (MANET) environments. We used a so called ’trackerless’ extension of the BitTorrent to make our system more efficient on mobile P2P networks. Also we have implemented a discrete event simulator in Java language, to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016