A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
Due to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computin...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8692705/ |
_version_ | 1818924362841980928 |
---|---|
author | Sumit Kumar Tetarave Somanath Tripathy Ezhil Kalaimannan Caroline John Anshika Srivastava |
author_facet | Sumit Kumar Tetarave Somanath Tripathy Ezhil Kalaimannan Caroline John Anshika Srivastava |
author_sort | Sumit Kumar Tetarave |
collection | DOAJ |
description | Due to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computing resources efficiently with the advantages of fault tolerance, robust connectivity, load balancing, and easy maintenance. The ability of a peer to connect to another peer depends on the distinguishing features of the overlay networks. For connection, network routing tables are maintained by each peer in the network to construct the P2P overlay on the Internet. This construction renders the P2P networks vulnerable to the existing attacks using the Internet. Some of these attack models have been proposed in the past using botnets. However, models using botnets do not accommodate the advanced attacks that can infect the majority of the entries in the routing table. In this paper, we propose a model to analyze the impacts of routing table poisoning attacks on the P2P botnet (rBot) architecture. We present the security analysis of the proposed epidemic model for state-of-the-art rBots. The obtained results were effective for attacks on the unstructured P2P static and mobile environments. |
first_indexed | 2024-12-20T02:24:08Z |
format | Article |
id | doaj.art-fb5b8372e24f44ef9b185366ee8ab839 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-20T02:24:08Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-fb5b8372e24f44ef9b185366ee8ab8392022-12-21T19:56:45ZengIEEEIEEE Access2169-35362019-01-017679836799510.1109/ACCESS.2019.29068758692705A Routing Table Poisoning Model for Peer-to-Peer (P2P) BotnetsSumit Kumar Tetarave0https://orcid.org/0000-0002-6937-3564Somanath Tripathy1Ezhil Kalaimannan2Caroline John3Anshika Srivastava4Department of Computer Science and Engineering, IIT Patna, Patna, IndiaDepartment of Computer Science and Engineering, IIT Patna, Patna, IndiaDepartment of Computer Science, University of West Florida, Pensacola, FL, USADepartment of Computer Science, University of West Florida, Pensacola, FL, USADepartment of Mathematics, IIT Patna, Patna, IndiaDue to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computing resources efficiently with the advantages of fault tolerance, robust connectivity, load balancing, and easy maintenance. The ability of a peer to connect to another peer depends on the distinguishing features of the overlay networks. For connection, network routing tables are maintained by each peer in the network to construct the P2P overlay on the Internet. This construction renders the P2P networks vulnerable to the existing attacks using the Internet. Some of these attack models have been proposed in the past using botnets. However, models using botnets do not accommodate the advanced attacks that can infect the majority of the entries in the routing table. In this paper, we propose a model to analyze the impacts of routing table poisoning attacks on the P2P botnet (rBot) architecture. We present the security analysis of the proposed epidemic model for state-of-the-art rBots. The obtained results were effective for attacks on the unstructured P2P static and mobile environments.https://ieeexplore.ieee.org/document/8692705/Decentralized botnetepidemic modelP2P overlayrouting table poisoningmobility |
spellingShingle | Sumit Kumar Tetarave Somanath Tripathy Ezhil Kalaimannan Caroline John Anshika Srivastava A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets IEEE Access Decentralized botnet epidemic model P2P overlay routing table poisoning mobility |
title | A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets |
title_full | A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets |
title_fullStr | A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets |
title_full_unstemmed | A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets |
title_short | A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets |
title_sort | routing table poisoning model for peer to peer p2p botnets |
topic | Decentralized botnet epidemic model P2P overlay routing table poisoning mobility |
url | https://ieeexplore.ieee.org/document/8692705/ |
work_keys_str_mv | AT sumitkumartetarave aroutingtablepoisoningmodelforpeertopeerp2pbotnets AT somanathtripathy aroutingtablepoisoningmodelforpeertopeerp2pbotnets AT ezhilkalaimannan aroutingtablepoisoningmodelforpeertopeerp2pbotnets AT carolinejohn aroutingtablepoisoningmodelforpeertopeerp2pbotnets AT anshikasrivastava aroutingtablepoisoningmodelforpeertopeerp2pbotnets AT sumitkumartetarave routingtablepoisoningmodelforpeertopeerp2pbotnets AT somanathtripathy routingtablepoisoningmodelforpeertopeerp2pbotnets AT ezhilkalaimannan routingtablepoisoningmodelforpeertopeerp2pbotnets AT carolinejohn routingtablepoisoningmodelforpeertopeerp2pbotnets AT anshikasrivastava routingtablepoisoningmodelforpeertopeerp2pbotnets |