Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A new worm propagation threat in BitTorrent: modeling and analysis

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Peer-to-peer (P2P) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting these networks from intruders and attackers is a real challenge. One of the constant threats on P2P networks is the propagation of active worms. Recent events show that active worms can spread automatically and flood the Internet in a very short period of time. Therefore, P2P systems can be a potential vehicle for active worms to achieve fast worm propagation in the Internet. Nowadays, BitTorrent is becoming more and more popular, mainly due its fair load distribution mechanism. Unfortunately, BitTorrent is particularly vulnerable to topology aware active worms. In this paper we analyze the impact of a new worm propagation threat on BitTorrent. We identify the BitTorrent vulnerabilities it exploits, the characteristics that accelerate and decelerate its propagation, and develop a mathematical model of their propagation. We also provide numerical analysis results. This will help the design of efficient detection and containment systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Androutsellis-Theotokis, S., & Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4), 371.

    Article  Google Scholar 

  2. Cohen, B. (2003). Incentives build robustness in BitTorrent. Workshop on economics of peerto-peer systems (Vol. 6). Citeseer.

  3. Ipoque (2007). P2P survey.

  4. Dale, C., & Liu, J. (2007). A measurement study of piece population in BitTorrent. Washington: GlobeCom.

    Google Scholar 

  5. Yu, W., Boyer, C., Chellappan, S., & Xuan, D. (2005). Peer-to-peer system-based active worm attacks: modeling and analysis. In IEEE international conference on communications (ICC). May 2005.

  6. Göldi, C., & Hiestand, R. (2005). Scan detection based identification of worm infected hosts. Zurich: Swiss Federal Institute of Technology. ETHZ, 18 April 2005.

  7. Hales, D., & Patarin, S. (2005). How to cheat BitTorrent and why nobody does. s.l.: TR UBLCS-2005-12, Department of Computer Science University of Bologna, May 2005.

  8. Erman, D., et al. (2004). Measurement and analysis of BitTorrent signaling traffic. NTS17, Oslo, 2004.

  9. Joukov, N., & Chiueh, T. (2003). Internet worms as internet-wide threat. Tech. rep. TR-143, Experimental Computer Systems Lab, September 2003.

  10. Abhishek, S., & Vijay, E. Worms: attacks, defense and models. s.l.: Computer Science Department, University of Southern California.

  11. CERT. http://www.us-cert.gov/cas/tips/ST04-015.html.

  12. Khiat, N., Carlinet, Y., & Agoulmine, N. (2006). The emerging threat of peer-to-peer worms. In MonAM 2006 workshop.

  13. Theory.org. BitTorrent protocol specification v1.0. http://wiki.theory.org/BitTorrentSpecification.

  14. Pouwelse, J. A., et al. (2005). The BitTorrent P2P file-sharing system: measurements and analysis. International workshop on peer-to-peer systems (IPTPS).

  15. Chen, Z. S., Gao, L. X., & Kwiat, K. (2003). Modeling the spread of. In Proceedings of IEEE INFOCOM. San Francisco, March 2003.

  16. Tao, L., Zhihong, G., & Wu, X. (2007). Modeling and analyzing the spread of active worms based on P2P systems. Computers & Security, 26(3), 213–218.

    Article  Google Scholar 

  17. Joukov, N., & Chiueh, T. (2003). Internet worms as internet-wide threat. Tech. rep. TR-143, Experimental Computer Systems Lab, Staniford, Stuart, Paxson, Vern and Weaver, Nicholas, September 2003.

  18. How to own the Internet in your spare time. In Proceedings of the 8th USENIX security symposium, August 2002.

  19. Richardson, R. (2007). 2007 CSI computer crime and security survey. s.l.: Computer Security Institute.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sinan Hatahet.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hatahet, S., Bouabdallah, A. & Challal, Y. A new worm propagation threat in BitTorrent: modeling and analysis. Telecommun Syst 45, 95–109 (2010). https://doi.org/10.1007/s11235-009-9241-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-009-9241-2

Navigation