Skip to main content
Log in

XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication

Authenticated covert P2P communication

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. Consequently, it is a daunting task to prevent sharing of both legitimate and illegitimate information such as—music, movies, software, and child pornography—on P2P overt channels. Considering that, preventing covert channel information sharing is inconceivable given even its detection is near impossible. The standard P2P bit-torrent peer wire communication protocol uses a very simple handshake process and as such does not provide peer authentication service. In this paper, we propose XTRA—a framework for covert communication using the standard bit-torrent protocol with a robust handshake process for authentication among covert peers. Under this framework, covert peers authenticate each other prior to covert message exchanges. Participating peers send data over an encrypted covert channel making use of only the standard bit-torrent message types. We have validated the performance XTRA through a working prototype implementation and present results comparing it with two state-of-the-art techniques. Finally, we have analyzed the robustness of XTRA to popular security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Antineskul AV, Bezukladnikov II (Feb 2016) The building of covert channels in serverless p2p filesharing networks. In: 2016 IEEE NW Russia young researchers in electrical and electronic engineering conference (EIConRusNW), pp 124– 128

  2. Arianpoo N, Leung VCM (2017) A smart fairness mechanism for concurrent multipath transfer in sctp over wireless multi-hop networks. Ad Hoc Netw 55:40–49

    Article  Google Scholar 

  3. Bhattacharjee AK, Das A (2015) Impact of basic parameters in the performance of BitTorrent protocol-a survey. https://www.semanticscholar.org/paper/Impact-of-Basic-Parameters-inthe-Performance-of-B-Das-Bhattacharjee/d26b1c9c0f167c3a078e9fabf1d5680c21351a9f?tab=abstract

  4. Butler P, Xu K, Yao DD (2011) Quantitatively analyzing stealthy communication channels. In: Applied cryptography and network security. Springer, Berlin, pp 238–254

  5. Chan-Tin E, Heorhiadi V, Hopper N, Kim Y (2014) Hijacking the vuze BitTorrent network: all your hop are belong to us. IET Inf Secur 9(4):203–208

    Article  Google Scholar 

  6. Chang H-P, Kan H-W, Ho M-H (2012) Adaptive tcp congestion control and routing schemes using cross-layer information for mobile ad hoc networks. Comput Commun 35(4):454–474

    Article  Google Scholar 

  7. Cunche M, Kaafar MA, Boreli R (2014) Asynchronous covert communication using bittorrent trackers. In: 2014 IEEE international conference on high performance computing and communications, 2014 IEEE 6th international symposium on cyberspace safety and security, 2014 IEEE 11th international conference on embedded software and system (HPCC, CSS, ICESS). IEEE, pp 827–830

  8. Desimone J, Johnson D, Yuan B, Lutz P (2012) Covert channel in the bittorrent tracker protocol. In: Proceedings of the international conference on security and management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), p 1

  9. Eidenbenz R, Locher T, Wattenhofer R (2011) Hidden communication in p2p networks steganographic handshake and broadcast. In: INFOCOM, 2011 Proceedings IEEE. IEEE, pp 954–962

  10. Gao B, Zhai J (2016) A survey of covert channels in bittorrent network

  11. Goudar RM, Wagh SJ, MD Goudar (2011) Secure data transmission using steganography based data hiding in tcp/ip. In: Proceedings of the international conference & workshop on emerging trends in technology. ACM, pp 974–979

  12. Johnson D, Lutz P, Yuan B (2010) Behavior-based covert channel in cyberspace. In: Intelligent decision making systems, pp 311–318

  13. Khan FA, Imran M, Abbas H, Durad M (2017) A detection and prevention system against collaborative attacks in mobile ad hoc networks. Futur Gener Comput Syst 68:416–427

    Article  Google Scholar 

  14. Kopiczko P, Mazurczyk W, Szczypiorski K (2013) Stegtorrent: a steganographic method for the p2p file sharing service. In: Security and privacy workshops (SPW), 2013 IEEE. IEEE, pp 151–157

  15. Kundur D, Ahsan K (2003) Practical internet steganography: data hiding in ip. In: Proceedings of the Texas wksp. Security of information systems

  16. Li Y, Bao X (2017) Bitmap-based steganographic handshake and hidden communication in BitTorrent network. IEEJ Trans Elec Electron Eng, 12:721–727. https://doi.org/10.1002/tee.22458

    Article  Google Scholar 

  17. Li Z, Sun X, Wang B, Wang X (2008) A steganography scheme in p2p network. In: IIHMSP’08 international conference on intelligent information hiding and multimedia signal processing, 2008. IEEE, pp 20–24

  18. Mazurczyk W, Karas M, Szczypiorski K (2013) Skyde: a skype-based steganographic method. arXiv:1301.3632

  19. Sharma VK, Kumar M (2017) Adaptive congestion control scheme in mobile ad-hoc networks. Peer-to-Peer Netw Appl 10(3):633–657

    Article  Google Scholar 

  20. Sharma VK, Shukla SSP, Singh V (2012) A tailored q-learning for routing in wireless sensor networks. In: 2012 2nd IEEE international conference on parallel distributed and grid computing (PDGC). IEEE, pp 663–668

  21. Tan Q, Shi J, Fang B, Zhang W, Wang X (2015) StegoP2P: Oblivious user-driven unobservable communications. In Communications (ICC), 2015 IEEE International Conference on (pp. 7126–7131). IEEE

  22. Vu CH, Soneye A (2009) “An Analysis of Collaborative Attacks on Mobile Ad hoc Networks,” Master Thesis at School of Computing, Blekinge Institute of Technology, 2009

  23. Wang K, Chai TY, Wong W-C (2016) Routing, power control and rate adaptation: a q-learning-based cross-layer design. Comput Netw 102(Supplement C):20–37

    Article  Google Scholar 

  24. Wielaard M (2003) The hunting of the snark project - bittorrent application suite. Accessed 21 Apr 2013

  25. Xu K (2013) Performance modeling of bittorrent peer-to-peer file sharing networks. arXiv:1311.1195

  26. Yarochkin FV, Dai S-Y, Lin C-H, Huang Y, Kuo S-Y (2009) Introducing p2p architecture in adaptive covert communication system. In: First Asian Himalayas international conference on internet. AH-ICI 2009. IEEE, pp 1–7

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avinash Srinivasan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srinivasan, A., Aldharrab, H. XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication. Peer-to-Peer Netw. Appl. 12, 143–157 (2019). https://doi.org/10.1007/s12083-018-0645-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-018-0645-1

Keywords

Navigation