5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Research Article

Fake servers in EDonkey networks

Download960 downloads
  • @INPROCEEDINGS{10.4108/ICST.QSHINE2008.3836,
        author={ZHANG Min and CHEN Changjia and JIA Jinkang},
        title={Fake servers in EDonkey networks},
        proceedings={5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness},
        publisher={ICST},
        proceedings_a={QSHINE},
        year={2010},
        month={5},
        keywords={P2P fake server eDonkey pollutionhttp://dl.acm.org/citation.cfm?id=687801\&CFID=65015398\&CFTOKEN=12718344},
        doi={10.4108/ICST.QSHINE2008.3836}
    }
    
  • ZHANG Min
    CHEN Changjia
    JIA Jinkang
    Year: 2010
    Fake servers in EDonkey networks
    QSHINE
    ICST
    DOI: 10.4108/ICST.QSHINE2008.3836
ZHANG Min1,*, CHEN Changjia1,*, JIA Jinkang1,*
  • 1: School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing,100044,China
*Contact email: mia.minzhang@gmail.com, changjiachen@sina.com, jinkangjia@hotmail.com

Abstract

With the growth of the popularity of various P2P file-sharing systems, the tussle between ordinary P2P users and copyright protectors becomes more and more fierce. The contests of servers (supernodes), the key components of these systems, have turned to be the focus of the combat. Some copyright protectors or pollution companies have established their own servers so as to control more users and pollute the whole system, while the users also take measures to identify these fake servers and prevent files from being polluted. To our knowledge, we are the first to study fake servers in eDonkey networks.

We developed a dedicated crawler and traced eDonkey users for over 24 days. Based on our measurements, we find that fake servers, which account for more than 59.4% in number although, don't work well in attracting ordinary users. The users, who have once connected to one of these fake servers, take only 30.9% of all traced users. Even worse, the low stay time ratio of users on fake server shows that fake servers lack mechanisms or incentives to keep users stay longer. However, we cannot underestimate the potential influences of fake servers yet. From our analysis, fake servers indeed disturb users' stay distribution at the rank of normal server. Taking the popularity distribution of servers (Zipf-like) into account, we suggest that copyright protectors should try to control several popular servers instead of setting up many unpopular ones. Furthermore, the probability of potential contacts between good and bad users is high enough (94%). For copyright protectors, utilizing these frequent contacts to spread viruses or polluted files will bring great trouble or even disasters for eDonkey networks.

In addition, the existing method (blacklisting) cannot keep up with the dynamic updates of fake servers, so we proposed an online heuristic feature-based detection method.

We think it can be adopted by client software developers for real-time fake server detection.