Abstract

BitTorrent is the most extensively used protocol in peer-to-peer systems. Its clients are widely spread worldwide and account for a large fraction of today’s Internet traffic. This paper will discuss potential attack that exploits a certain vulnerability of BitTorrent based systems. Code injection refers to force a code – which may be malicious - to run inside another benign code, by inserting it into known process name or process ID. Operating systems supply API functions that can be used by third party to inject a few lines of malicious code inside the original running process, which can effectively damage or harm user resources. Ethernet is the most common internetwork layer for Local Area Networks; the shared medium of LAN enables all users on the same broadcasting domain to listen to all exchanged packets through the network (promiscuous mode), so any adversary can easily perform a simple packet sniffing process on the medium access layer of the network. By capturing and analyzing the sent packets from the P2P application, an adversary can use the revealed process ID by BitTorrent protocol to start the code injection action. So the adversary will be able to seize more machines from the network. Controlled machines can be used to perform many attacks. The study revealed that any adversary can exploit the vulnerability of the process communication model used in P2P by injecting any malicious process inside the BitTorrent application itself exposed by sniffing the exchanged BitTorrent packets through LAN.

Highlights

  • P2P or "Peer-to-Peer" is a network of host computers that operate and communicate with each other without the need for a centralized server—the opposite of a client-server network model

  • A peer-to-peer file sharing system is a network of interconnected computers using P2P networking model to share and exchange data between connected computers

  • P2P file sharing system users can exchange and access other users’ media files like books, music, movies, games, software, etc. by using special P2P software program installed on both sender and receiver PCs [1]

Read more

Summary

INTRODUCTION

P2P or "Peer-to-Peer" is a network of host computers that operate and communicate with each other without the need for a centralized server—the opposite of a client-server network model. A peer-to-peer file sharing system is a network of interconnected computers using P2P networking model to share and exchange data (digital documents) between connected computers. Peer-to-peer file sharing technology allows people worldwide to share and exchange their files and data as long as their PCs are connected to the Internet. Peer-to-Peer systems permit clients joined with the Internet to connect their machines with other machines as far and wide as possible. These systems are secured with the end goal of sharing files. Network sniffing refers to capturing packets/frames being transferred over a network using sniffer software. Modern sniffers offer capabilities to analyze www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 6, No 4, 2015 captured packets in order to extract useful information in a user friendly format [6]

LITERATURE REVIEW
Problem definition
The proposed attacking overall scenario
PROPOSED ATTACK IMPLEMENTATION
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.