8th International Conference on Communications and Networking in China

Research Article

A Research on the Vulnerability in Popular P2P Protocols

  • @INPROCEEDINGS{10.1109/ChinaCom.2013.6694630,
        author={Jiayin Tong and Gang Xiong and Yong Zhao and Li Guo},
        title={A Research on the Vulnerability in Popular P2P Protocols},
        proceedings={8th International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2013},
        month={11},
        keywords={p2p network security protocol vulnerability exploitation trustworthy protocol network attacks thunder},
        doi={10.1109/ChinaCom.2013.6694630}
    }
    
  • Jiayin Tong
    Gang Xiong
    Yong Zhao
    Li Guo
    Year: 2013
    A Research on the Vulnerability in Popular P2P Protocols
    CHINACOM
    IEEE
    DOI: 10.1109/ChinaCom.2013.6694630
Jiayin Tong1, Gang Xiong1,*, Yong Zhao1, Li Guo1
  • 1: Institute of Information Engineering, Chinese Academy of Sciences
*Contact email: xionggang@iie.ac.cn

Abstract

P2P-structure networks attract lots of users due to the large capacity and good performance. However, vulnerabilities in the protocols may be exploited maliciously by attackers to launch network attacks. In this paper, we first give an overview of several popular P2P networks with protocol vulnerabilities that can be used to launch attacks. Then we illustrate how to carry out network attacks through exploiting vulnerability in Thunder, the most popular downloading software in China. The experimental results show that the amount of attack data can be amplified by about 5 and the number of attack packets up to 12. In order to mitigate the effect of such attacks, we discuss some solutions that should be considered to enhance these protocols at last.