Covert Channel in the BitTorrent Tracker Protocol
نویسندگان
چکیده
Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert channels can be used. A botnet should rely on covert channels built on ubiquitous protocols to blend in with legitimate traffic. In this paper, we propose a covert channel built on the BitTorrent peer-to-peer protocol. In a simple application, this covert channel can be used to discretely and covertly send messages between two parties. However, this covert channel can also be used to stealthily distribute commands or the location of a command and control server for use in a botnet.
منابع مشابه
Classification of BitTorrent Attacks from the Protocol’s Operational Viewpoints
As the BitTorrent has become one of the most popular peer-to-peer file sharing systems, various security threats appear based on its operation. In this paper, we analyzed the vulnerabilities of the BitTorrent protocol, and surveyed existing attacks on the protocol. Then, we classified the attacks from the protocol’s operational viewpoints. Basically, the protocols are categorized into two parts...
متن کاملBitTorrent Architecture and Protocol
BitTorrent is a new popular application layer network protocol used to distribute files. BitTorrent is efficient at content delivery by maximizing the upload utilization and by preventing unfairness. This paper discusses the BitTorrent architecture and protocol in great detail by discussing the tracker and all the messages sent between the peers and the tracker and also between peers and peers....
متن کاملNew Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization
Currently, BitTorrent is the most popular protocol that is widely used for P2P file sharing system. Nevertheless, BitTorrent protocol exposes some inefficient processes that are choosing neighbours and selecting pieces. These are mainly based on the knowledge of overlay topology without considering underlying internet topology that might cause of traffic problems such as the bottleneck at some ...
متن کاملPerformance Evaluation of the Advanced Network Tracker for BitTorrent
BitTorrent, a popular Peer-to-Peer (P2P) protocol, has recently engendered considerable controversy. Many P2P applications implement a variant of the protocol due to its cost-effective scalability. However, for Internet Service Providers (ISPs) the protocol is notorious for its high network cost. To reduce these costs, ISPs have deployed network devices to detect and throttle BitTorrent traffic...
متن کاملBitTorrent File Sharing in Mobile Ad-hoc Networks∗
This paper presents an application of the Group-based Service Discovery Protocol (GSD) to implement the BitTorrent file sharing protocol on dynamically variable mobile ad-hoc network (MANET) environments. We used a so called ’trackerless’ extension of the BitTorrent to make our system more efficient on mobile P2P networks. Also we have implemented a discrete event simulator in Java language, to...
متن کامل