0% found this document useful (0 votes)
137 views

Attacks On Bittorrent: Presented by Andrew Sprouse

This document discusses BitTorrent, including how it works, its importance, and vulnerabilities. BitTorrent is a peer-to-peer file transfer protocol used by millions. It works by breaking files into pieces that users download from each other. However, it is vulnerable to pollution attacks, DDoS attacks, and bandwidth shaping by ISPs. Current solutions include encryption, tunneling, and blacklisting untrusted peers. Future research focuses on integrating trust systems to rate peers and prevent attacks.

Uploaded by

Atul Srivastava
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views

Attacks On Bittorrent: Presented by Andrew Sprouse

This document discusses BitTorrent, including how it works, its importance, and vulnerabilities. BitTorrent is a peer-to-peer file transfer protocol used by millions. It works by breaking files into pieces that users download from each other. However, it is vulnerable to pollution attacks, DDoS attacks, and bandwidth shaping by ISPs. Current solutions include encryption, tunneling, and blacklisting untrusted peers. Future research focuses on integrating trust systems to rate peers and prevent attacks.

Uploaded by

Atul Srivastava
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 42

Attacks on BitTorrent

Presented by Andrew Sprouse


Attacks on BitTorrent
 What is BitTorrent?
 Why is it important?
 How does BitTorrent work?
 BitTorrent vulnerabilities
 Current solutions
 The future
Attacks on BitTorrent
 What is BitTorrent?
 Why is it important?
 How does BitTorrent work?
 BitTorrent vulnerabilities
 Current solutions
 The future
What is BitTorrent?
 Created by Brahm Cohen in 2001
 A peer-to-peer file transfer protocol
 Extremely popular today
Attacks on BitTorrent
 What is BitTorrent?
 Why is it important?
 How does BitTorrent work?
 BitTorrent vulnerabilities
 Current solutions
 The future
Why is it Important?
 It is used by millions of file sharers across the globe.

 Corporations and open source companies use it to save


bandwidth.
Why is it Important? (cont’d)
 In 2004 CacheLogic determined BitTorrent was responsible
for 35% of internet Traffic.
 This has raised concerns amongst ISPs such a Comcast,
Verizon and Time Warner.
Attacks on BitTorrent
 What is BitTorrent?
 Why is it important?
 How does BitTorrent work?
 BitTorrent vulnerabilities
 Current solutions
 The future
BitTorrent Basics
 Files are broken into pieces.
 Users each download different pieces from the original
uploader (seed).
 Users exchange the pieces with their peers to obtain the ones
they are missing.

 This process is organized by a centralized server called the


Tracker.
BitTorrent Protocol
 1. Seeder generates a
torrent file
 Uploads torrent to a
web server.
 Seeder – A client
sharing 100% of the
shared file.
BitTorrent Protocol
 2. The seeder notifies
the tracker that it is
sharing the file
described in the torrent
file.
BitTorrent Protocol
 3. A leecher downloads
the torrent file from the
web server
 Leecher – client
downloading the shared
file from the seeder.
BitTorrent Protocol
 The leecher connects to
the tracker specified in
the torrent file.
 The tracker returns a list
of other peers who are
sharing the file.
BitTorrent Protocol
 5. The leecher connects
to its peers to retrieve
pieces of the files.
BitTorrent Client Details

 Clients verify the each downloaded piece against a SHA-1


hash contained in the .torrent file.
 Clients use a tit-for-tat strategy for choosing peers to
upload/download to/from.
 Transfer-rate based
 Clients periodically disconnect from clients to connect to
new ones.
 Called “Optimistic Unchoking”
Attacks on BitTorrent
 What is BitTorrent?
 Why is it important?
 How does BitTorrent work?
 BitTorrent vulnerabilities
 Current solutions
 The future
BitTorrent Vulnerabilities
 BitTorrent is vulnerable to the following attacks:
 Pollution Attack
 DDOS Attack
 Bandwidth Shaping
BitTorrent Vulnerabilities
 BitTorrent is vulnerable to the following attacks:
 Pollution Attack
 DDOS Attack
 Bandwidth Shaping
Pollution Attack
 1. The peers receive
the peer list from the
tracker.
Pollution Attack
 2. One peer contacts
the attacker for a chunk
of the file.
Pollution Attack
 The attacker sends
back a false chunk.
 This false chunk will
fail its hash and will be
discarded.
Pollution Attack
 4. Attacker requests all
chunks from swarm
and wastes their upload
bandwidth.
Pollution Attack (cont’d)
 Pollution attack have become increasingly popular and have
been used by anti-piracy groups
 In 2005 HBO used pollution attacks to prevent people from
downloading their show Rome.
BitTorrent Vulnerabilities
 BitTorrent is vulnerable to the following attacks:
 Pollution Attack
 DDOS Attack
 Bandwidth Shaping
DDOS Attack
 DDOS = Distributed denial of service
 Based on the fact the BitTorrent Tracker has no mechanism
for validating peers.
 Uses modified client software
DDOS Attack
 1. The attacker
downloads a large
number of torrent files
from a web server.
DDOS Attack
 2. The attacker parses
the torrent files with a
modified BitTorrent
client and spoofs his
IP address and port
number with the
victims as he
announces he is
joining the swarm.
DDOS Attack
 3. As the tracker
receives requests for a
list of participating
peers from other
clients it sends the
victims IP and port
number.
DDOS Attack
 4. The peers then
attempt to connect to
the victim to try and
download a chunk of
the file.
BitTorrent Vulnerabilities
 BitTorrent is vulnerable to the following attacks:
 Pollution Attack
 DDOS Attack
 Bandwidth Shaping
Bandwidth Shaping
 Typically done by the BitTorrent user’s ISP

 Comcast has recently admitted to filtering BitTorrent traffic.


 Unencrypted BitTorrent packets are easily identified and filtered.
 Sophisticated filtering software can detect BitTorrent like
behavior.
Attacks on BitTorrent
 What is BitTorrent?
 Why is it important?
 How does BitTorrent work?
 BitTorrent vulnerabilities
 Current solutions
 The future
Current Solutions: Bandwidth
Shaping
 Encryption
 Most popular BitTorrent clients come with option to encrypt
the packets they send.
 Fools unsophisticated filters which simply look at the contents
of the packet.
 Won’t work against filters which profile behavior over network
boundaries.
Current Solutions: Bandwidth
Shaping (cont’d)
 Tunneling
 Using VPN software to connect to an unfiltered network.
 Successfully bypasses filters.
 However due to the peer-to-peer nature of BitTorrent, your
peers must also be on an unfiltered network to take full
advantage.
Current Solutions: Pollution
Attacks
 Blacklisting
 Achieved using software such as Peer Guardian or moBlock.
 Blocks connections from blacklisted IPs which are downloaded
from an online database.
Attacks on BitTorrent
 What is BitTorrent?
 Why is it important?
 How does BitTorrent work?
 BitTorrent vulnerabilities
 Current solutions
 The future
The Future
 There has been much research in the area of peer-to-peer
networking.
 One of the most popular suggestions in recent research is the
integration of the notion of trustworthiness.
 Through the use of a “Trust Management System”
Trust management
 A trustworthiness score is assigned to each peer in the
swarm.
 These scores will allow better selection of peers.
 Currently BitTorrent's fairness system does not  prevent free
riders and malicious peers. Penalties are not in place for
these "bad" users.
 BitTorrent uses a Rate fairness ratio only no notion of trust.
An Example Trust Management
System
 Debit-Credit Reputation
system
 Each client calculates a
trust score for their peers
 Based on valid pieces
uploaded
 Tracker combines these
individual scores to make
a global score
An Example Trust Management
System (cont’d)
 Global trust managed by the tracker prevents clients from
being dishonest.
 Solve the issue of pollution attacks by ignoring
untrustworthy peers
 Trust systems are more flexible than blacklisting because peers
can earn back their trust through good behavior.

 Prevent DDOS attacks because the victim will earn a low


trust score and be ignored.
THE END
References

 This presentation is based on research paper done for CSU645 co-


written by Timothy Biron and Andrew Sprouse
 http://www.ccs.neu.edu/home/als/termpaper.pdf
 http://www.bittorrent.org/beps/bep_0003.html
 http://radar.oreilly.com/archives/2005/10/hbo_attacking_bitt
orrent.html
 http://in.tech.yahoo.com/041103/137/2ho4i.html

You might also like