XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication
Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. Consequently, it is a daunting task to prevent sharing of both legitimate and illegitimate information such as—music, movies, software, and child pornography—on P2P overt channels. Considering th...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2018-03, p.1-15 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 15 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Peer-to-peer networking and applications |
container_volume | |
creator | Srinivasan, Avinash Aldharrab, Hatoon |
description | Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. Consequently, it is a daunting task to prevent sharing of both legitimate and illegitimate information such as—music, movies, software, and child pornography—on P2P overt channels. Considering that, preventing covert channel information sharing is inconceivable given even its detection is near impossible. The standard P2P bit-torrent peer wire communication protocol uses a very simple handshake process and as such does not provide peer authentication service. In this paper, we propose XTRA—a framework for covert communication using the standard bit-torrent protocol with a robust handshake process for authentication among covert peers. Under this framework, covert peers authenticate each other prior to covert message exchanges. Participating peers send data over an encrypted covert channel making use of only the standard bit-torrent message types. We have validated the performance XTRA through a working prototype implementation and present results comparing it with two state-of-the-art techniques. Finally, we have analyzed the robustness of XTRA to popular security attacks. |
doi_str_mv | 10.1007/s12083-018-0645-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2019063848</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2019063848</sourcerecordid><originalsourceid>FETCH-LOGICAL-c768-d95d1422faf1f7d8211a6975afbc4ea1b547af5a2fe698d38d9c9184c8581b933</originalsourceid><addsrcrecordid>eNo9TctKAzEUDaJgrX6AuwHX0dy8JlkORa1QUMosuiuZPHBKO6mZjGs_wi_0S4wors6TcxC6BnILhNR3I1CiGCagMJFcYDhBM9BM4iLI6T_n9BxdjOOOEAlM0Bl62bTr5uvj02-yH5x3Vddn3MaU_JCr4zrmaOO-CjFVzZRfi9lbk0vNxnefSsP7VPjhMA0_QR-HS3QWzH70V384R-3DfbtY4tXz49OiWWFbS4WdFg44pcEECLVTFMBIXQsTOsu9gU7w2gRhaPBSK8eU01aD4lYJBZ1mbI5ufmePKb5NfszbXZzSUB63lIAmkimu2DeUulJw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2019063848</pqid></control><display><type>article</type><title>XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication</title><source>Springer Online Journals Complete</source><creator>Srinivasan, Avinash ; Aldharrab, Hatoon</creator><creatorcontrib>Srinivasan, Avinash ; Aldharrab, Hatoon</creatorcontrib><description>Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. Consequently, it is a daunting task to prevent sharing of both legitimate and illegitimate information such as—music, movies, software, and child pornography—on P2P overt channels. Considering that, preventing covert channel information sharing is inconceivable given even its detection is near impossible. The standard P2P bit-torrent peer wire communication protocol uses a very simple handshake process and as such does not provide peer authentication service. In this paper, we propose XTRA—a framework for covert communication using the standard bit-torrent protocol with a robust handshake process for authentication among covert peers. Under this framework, covert peers authenticate each other prior to covert message exchanges. Participating peers send data over an encrypted covert channel making use of only the standard bit-torrent message types. We have validated the performance XTRA through a working prototype implementation and present results comparing it with two state-of-the-art techniques. Finally, we have analyzed the robustness of XTRA to popular security attacks.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-018-0645-1</identifier><language>eng</language><publisher>Norwell: Springer Nature B.V</publisher><subject>Communication ; Encryption ; Information sharing ; Peer to peer computing ; Pornography ; Protocol verification ; Social networks</subject><ispartof>Peer-to-peer networking and applications, 2018-03, p.1-15</ispartof><rights>Peer-to-Peer Networking and Applications is a copyright of Springer, (2018). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c768-d95d1422faf1f7d8211a6975afbc4ea1b547af5a2fe698d38d9c9184c8581b933</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Srinivasan, Avinash</creatorcontrib><creatorcontrib>Aldharrab, Hatoon</creatorcontrib><title>XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication</title><title>Peer-to-peer networking and applications</title><description>Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. Consequently, it is a daunting task to prevent sharing of both legitimate and illegitimate information such as—music, movies, software, and child pornography—on P2P overt channels. Considering that, preventing covert channel information sharing is inconceivable given even its detection is near impossible. The standard P2P bit-torrent peer wire communication protocol uses a very simple handshake process and as such does not provide peer authentication service. In this paper, we propose XTRA—a framework for covert communication using the standard bit-torrent protocol with a robust handshake process for authentication among covert peers. Under this framework, covert peers authenticate each other prior to covert message exchanges. Participating peers send data over an encrypted covert channel making use of only the standard bit-torrent message types. We have validated the performance XTRA through a working prototype implementation and present results comparing it with two state-of-the-art techniques. Finally, we have analyzed the robustness of XTRA to popular security attacks.</description><subject>Communication</subject><subject>Encryption</subject><subject>Information sharing</subject><subject>Peer to peer computing</subject><subject>Pornography</subject><subject>Protocol verification</subject><subject>Social networks</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNo9TctKAzEUDaJgrX6AuwHX0dy8JlkORa1QUMosuiuZPHBKO6mZjGs_wi_0S4wors6TcxC6BnILhNR3I1CiGCagMJFcYDhBM9BM4iLI6T_n9BxdjOOOEAlM0Bl62bTr5uvj02-yH5x3Vddn3MaU_JCr4zrmaOO-CjFVzZRfi9lbk0vNxnefSsP7VPjhMA0_QR-HS3QWzH70V384R-3DfbtY4tXz49OiWWFbS4WdFg44pcEECLVTFMBIXQsTOsu9gU7w2gRhaPBSK8eU01aD4lYJBZ1mbI5ufmePKb5NfszbXZzSUB63lIAmkimu2DeUulJw</recordid><startdate>20180301</startdate><enddate>20180301</enddate><creator>Srinivasan, Avinash</creator><creator>Aldharrab, Hatoon</creator><general>Springer Nature B.V</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20180301</creationdate><title>XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication</title><author>Srinivasan, Avinash ; Aldharrab, Hatoon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c768-d95d1422faf1f7d8211a6975afbc4ea1b547af5a2fe698d38d9c9184c8581b933</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Communication</topic><topic>Encryption</topic><topic>Information sharing</topic><topic>Peer to peer computing</topic><topic>Pornography</topic><topic>Protocol verification</topic><topic>Social networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Srinivasan, Avinash</creatorcontrib><creatorcontrib>Aldharrab, Hatoon</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Srinivasan, Avinash</au><au>Aldharrab, Hatoon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication</atitle><jtitle>Peer-to-peer networking and applications</jtitle><date>2018-03-01</date><risdate>2018</risdate><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. Consequently, it is a daunting task to prevent sharing of both legitimate and illegitimate information such as—music, movies, software, and child pornography—on P2P overt channels. Considering that, preventing covert channel information sharing is inconceivable given even its detection is near impossible. The standard P2P bit-torrent peer wire communication protocol uses a very simple handshake process and as such does not provide peer authentication service. In this paper, we propose XTRA—a framework for covert communication using the standard bit-torrent protocol with a robust handshake process for authentication among covert peers. Under this framework, covert peers authenticate each other prior to covert message exchanges. Participating peers send data over an encrypted covert channel making use of only the standard bit-torrent message types. We have validated the performance XTRA through a working prototype implementation and present results comparing it with two state-of-the-art techniques. Finally, we have analyzed the robustness of XTRA to popular security attacks.</abstract><cop>Norwell</cop><pub>Springer Nature B.V</pub><doi>10.1007/s12083-018-0645-1</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2018-03, p.1-15 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_journals_2019063848 |
source | Springer Online Journals Complete |
subjects | Communication Encryption Information sharing Peer to peer computing Pornography Protocol verification Social networks |
title | XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T18%3A06%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=XTRA%E2%80%94eXtended%20bit-Torrent%20pRotocol%20for%20Authenticated%20covert%20peer%20communication&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Srinivasan,%20Avinash&rft.date=2018-03-01&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-018-0645-1&rft_dat=%3Cproquest%3E2019063848%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2019063848&rft_id=info:pmid/&rfr_iscdi=true |