A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets

Due to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computin...

Full description

Bibliographic Details
Main Authors: Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John, Anshika Srivastava
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8692705/
_version_ 1818924362841980928
author Sumit Kumar Tetarave
Somanath Tripathy
Ezhil Kalaimannan
Caroline John
Anshika Srivastava
author_facet Sumit Kumar Tetarave
Somanath Tripathy
Ezhil Kalaimannan
Caroline John
Anshika Srivastava
author_sort Sumit Kumar Tetarave
collection DOAJ
description Due to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computing resources efficiently with the advantages of fault tolerance, robust connectivity, load balancing, and easy maintenance. The ability of a peer to connect to another peer depends on the distinguishing features of the overlay networks. For connection, network routing tables are maintained by each peer in the network to construct the P2P overlay on the Internet. This construction renders the P2P networks vulnerable to the existing attacks using the Internet. Some of these attack models have been proposed in the past using botnets. However, models using botnets do not accommodate the advanced attacks that can infect the majority of the entries in the routing table. In this paper, we propose a model to analyze the impacts of routing table poisoning attacks on the P2P botnet (rBot) architecture. We present the security analysis of the proposed epidemic model for state-of-the-art rBots. The obtained results were effective for attacks on the unstructured P2P static and mobile environments.
first_indexed 2024-12-20T02:24:08Z
format Article
id doaj.art-fb5b8372e24f44ef9b185366ee8ab839
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T02:24:08Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-fb5b8372e24f44ef9b185366ee8ab8392022-12-21T19:56:45ZengIEEEIEEE Access2169-35362019-01-017679836799510.1109/ACCESS.2019.29068758692705A Routing Table Poisoning Model for Peer-to-Peer (P2P) BotnetsSumit Kumar Tetarave0https://orcid.org/0000-0002-6937-3564Somanath Tripathy1Ezhil Kalaimannan2Caroline John3Anshika Srivastava4Department of Computer Science and Engineering, IIT Patna, Patna, IndiaDepartment of Computer Science and Engineering, IIT Patna, Patna, IndiaDepartment of Computer Science, University of West Florida, Pensacola, FL, USADepartment of Computer Science, University of West Florida, Pensacola, FL, USADepartment of Mathematics, IIT Patna, Patna, IndiaDue to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computing resources efficiently with the advantages of fault tolerance, robust connectivity, load balancing, and easy maintenance. The ability of a peer to connect to another peer depends on the distinguishing features of the overlay networks. For connection, network routing tables are maintained by each peer in the network to construct the P2P overlay on the Internet. This construction renders the P2P networks vulnerable to the existing attacks using the Internet. Some of these attack models have been proposed in the past using botnets. However, models using botnets do not accommodate the advanced attacks that can infect the majority of the entries in the routing table. In this paper, we propose a model to analyze the impacts of routing table poisoning attacks on the P2P botnet (rBot) architecture. We present the security analysis of the proposed epidemic model for state-of-the-art rBots. The obtained results were effective for attacks on the unstructured P2P static and mobile environments.https://ieeexplore.ieee.org/document/8692705/Decentralized botnetepidemic modelP2P overlayrouting table poisoningmobility
spellingShingle Sumit Kumar Tetarave
Somanath Tripathy
Ezhil Kalaimannan
Caroline John
Anshika Srivastava
A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
IEEE Access
Decentralized botnet
epidemic model
P2P overlay
routing table poisoning
mobility
title A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
title_full A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
title_fullStr A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
title_full_unstemmed A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
title_short A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
title_sort routing table poisoning model for peer to peer p2p botnets
topic Decentralized botnet
epidemic model
P2P overlay
routing table poisoning
mobility
url https://ieeexplore.ieee.org/document/8692705/
work_keys_str_mv AT sumitkumartetarave aroutingtablepoisoningmodelforpeertopeerp2pbotnets
AT somanathtripathy aroutingtablepoisoningmodelforpeertopeerp2pbotnets
AT ezhilkalaimannan aroutingtablepoisoningmodelforpeertopeerp2pbotnets
AT carolinejohn aroutingtablepoisoningmodelforpeertopeerp2pbotnets
AT anshikasrivastava aroutingtablepoisoningmodelforpeertopeerp2pbotnets
AT sumitkumartetarave routingtablepoisoningmodelforpeertopeerp2pbotnets
AT somanathtripathy routingtablepoisoningmodelforpeertopeerp2pbotnets
AT ezhilkalaimannan routingtablepoisoningmodelforpeertopeerp2pbotnets
AT carolinejohn routingtablepoisoningmodelforpeertopeerp2pbotnets
AT anshikasrivastava routingtablepoisoningmodelforpeertopeerp2pbotnets