• DocumentCode
    661760
  • Title

    A research on the vulnerability in popular P2P protocols

  • Author

    Jiayin Tong ; Gang Xiong ; Yong Zhao ; Li Guo

  • Author_Institution
    Inst. of Inf. Eng., Beijing, China
  • fYear
    2013
  • fDate
    14-16 Aug. 2013
  • Firstpage
    405
  • Lastpage
    409
  • Abstract
    P2P-structure networks attract lots of users due to the large capacity and good performance. However, vulnerabilities in the protocols may be exploited maliciously by attackers to launch network attacks. In this paper, we first give an overview of several popular P2P networks with protocol vulnerabilities that can be used to launch attacks. Then we illustrate how to carry out network attacks through exploiting vulnerability in Thunder, the most popular downloading software in China. The experimental results show that the amount of attack data can be amplified by about 5 and the number of attack packets up to 12. In order to mitigate the effect of such attacks, we discuss some solutions that should be considered to enhance these protocols at last.
  • Keywords
    computer crime; computer network security; peer-to-peer computing; protocols; China; P2P protocols; P2P-structure networks; Thunder downloading software; attack data; attack packets; network attacks; protocol vulnerabilities; Computer crime; Encryption; Peer-to-peer computing; Ports (Computers); Protocols; Servers; P2P network security; Thunder; network attacks; protocol vulnerability exploitation; trustworthy protocol;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on
  • Conference_Location
    Guilin
  • Type

    conf

  • DOI
    10.1109/ChinaCom.2013.6694630
  • Filename
    6694630