Analysis and Prevention of Malware in P2P
Total Page:16
File Type:pdf, Size:1020Kb
Puram.Pradeep Kumar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (1) , 2012, 3162 - 3169 Analysis and Prevention of Malware in P2P Prof.Puram.Pradeep Kumar, Naini Shekar Reddy, Saleha Saudagar, T. Puneeth Chandra, Ch. Kishor Kumar VITS Engineering College, KarimNagar. Abstract-Peer-to-Peer (P2P) Networks continue to be will launch these programs believing that they are popular means of trading content. However the files legitimate, but not realizing that a Trojans was installed. exchanged in these networks are not malicious, making them An attacker may now have remote access to an an ideal medium for spreading Malware. Some existing organization's internal Network or potentially gathering studies have shown that Malware proliferation can pose confidential user information via a spyware program. significant threats to P2P Networks, defending against such an attack are largely an open problem. This paper aims to Most organizations are under the impression that P2P develop the countermeasure that can effectively mitigate the networks can simply be stopped by blocking the default Malware proliferation while preserving P2P networks port that is required for these networks to communicate. performance and provide software implementations for Think again. Most P2P networks can be configured to P2P.Malware is highly pervasive in P2P file-sharing systems listen on TCP port 80 (HTTP). Almost every organization and is difficult to detect. To alleviate this problem, we in the world permits the use of HTTP through their analyze and provide preventive measures for Malware. firewall. Analysis include two types for detecting Malware and Along with viruses, one of the biggest threats to computer provide two basic approaches and Advanced techniques for users on the Internet today is Malware. It can hijack the preventing Malware. We instrument two different open source P2P networks; KaZaA and IMesh to examine the browser, redirect the search attempts, serve up nasty pop- prevalence of Malware in P2P networks and provide an up ads, track what web sites visited, and generally screw algorithm for detecting Malware. things up. Malware programs are usually poorly- Keywords: P2P Networks, Malware, KaZaA, IMesh. programmed and can cause the computer to become unbearably slow and unstable in addition to all the other 1 INTRODUCTION havoc they wreak. Many of them will reinstall themselves A P2P computer Network[1] is a Network that relies even after thinking that they are removed, or hide primarily on the computing power and bandwidth of the themselves deep within Windows, making them very participants in the Network rather than concentrating it in difficult to clean. Although also considered to be a relatively low number of servers. Although this Malware, programs such as viruses, worms, Trojans, and statement is mostly correct there are a few different types everything else generally detected by anti-virus software of P2P architectures which should be outlined: will not be discussed here, and the use of the word 1.1 Centralized architecture - Requires a centralized Malware will only explicitly refer to software that fits in server which hosts connect with in order to access a list of the categories listed below. Malware often comes bundled shared items. Each host provides a list of items they are with other programs (KaZaA, iMesh, and other file willing to share. The server maintains this list of shareable sharing programs seem to be the biggest bundlers). items from all hosts. The actual download itself is Malware is highly pervasive in P2P file-sharing systems performed between the hosts when an item is requested, and is difficult to detect. In order to lessen this problem, not by the server. we analyze and provide preventive measures for Malware. 1.2 Decentralized Architecture - This model does not Here the analysis includes two types for detecting require a centralized server. All hosts which connect to a Malware and provide two basic approaches reactive and decentralized P2P Network send a request to all hosts proactive and Advanced techniques for preventing which are currently logged on. The requesting host then Malware. We instrument two different open source P2P receives a response from one or more hosts currently Networks; KaZaA and iMesh to examine the prevalence connected the network. Different sections of a file can be of Malware in P2P networks and provide an algorithm for downloaded from multiple hosts. detecting Malware. 1.3 Hybrid Architecture - This architecture offers a combination of the centralized and decentralized 2 RELATIONSHIP TO PRIOR WORK architecture. Peer-to-peer file sharing[2] is a form of file sharing using The legal liabilities which organizations face due to their peer-to-peer networking. P2P allows users to download users downloading intellectual property such as music, files such as music, movies, and games using a file software, literature, etc, for free, there is a ton of sharing software client that searches for other connected malicious code which traverses these networks. Malicious computers (called ‘peers’).File sharing began in 1999 code such as Trojans and spyware can be wrapped in with the introduction of Napster, a file sharing program legitimate looking packages using all sorts of programs and central server that linked people who had files with and downloaded via a P2P network. Unsuspecting users those who requested files. The central index server was 3162 Puram.Pradeep Kumar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (1) , 2012, 3162 - 3169 meant to index all of the current users and to search their increasing to better handle playing and storing digitized computers. When you searched for a file, the server audio and video files. Users were able to transfer either would find all of the available copies of that file and one or more files from one computer to another across the present it to you. The files would be transferred between Internet through various file transfers and file-sharing the two private computers. One limitation was that only networks. music files could be shared. In June 1999, Napster was 3.2 Software Implementations For P2P released as a centralized unstructured peer-to-peer system, The following are the software implementations[3] for requiring a central server for indexing and peer discovery. P2P It is generally credited as being the first peer-to-peer file JXTA sharing system. Napster provided a service where they JXTA™[4] technology, created by Sun™ is a set of open indexed and stored file information that users of Napster protocols that allow any connected device on the Network made available on their computers for others to download, ranging from cell phones and wireless PDAs to PCs and and the files were transferred directly between the host servers to communicate and collaborate in a P2P manner. and client users after authorization by Napster. Gnutella, JXTA peers create a virtual network where any peer may eDonkey2000, and Free net were released in 2000, as interact with other and their resources directly even when MP3.com and Napster were facing litigation. Gnutella, some of the peers and resources are behind firewalls and released in March, was the first decentralized file sharing NATs or are on different network transports. The project network. In the gnutella network, all connecting software goals are interoperability across different peer-to-peer was considered equal, and therefore the Network had no systems and communities, platform independence, central point of failure. In July, Free net was released and multiple/diverse languages, systems, and networks, and became the first anonymity network. In September the ubiquity: every device with a digital heartbeat. The eDonkey2000 client and server software was released. In technology is licensed using the Apache Software 2001, KaZaA and Poisoned for the Mac was released. The License. Network was proprietary and encrypted, and the KaZaA iFolder team made substantial efforts to keep other clients such as iFolder[5] is an still in early development open source Morpheus off of the Fast Track network. In July 2001, application, developed by Novell, Inc., intended to allow Napster was sued by several recording companies. This cross-platform file sharing across computer networks by drove users to other P2P applications and file sharing using the Mono/.Net framework. iFolder operates on the continued its exponential growth. The Audio galaxy concept of shared folders, where a folder is marked as Satellite client grew in popularity, and the Lime Wire shared and the contents of the folder are then client and Bit Torrent protocol were released. In 2002, a synchronized to other computers over a network, either Tokyo district court ruling shut down File Rogue and an directly between computers in a peer-to-peer fashion or RIAA lawsuit effectively shut down Audio galaxy. From through a server. This is intended to allow a single user to 2002 through 2003, a number of Bit Torrent services were synchronize their files between different computers (for established, including Suprnova.org, isoHunt, Torrent example between a work computer and a home computer) Spy, and The Pirate Bay. With the shutdown of eDonkey or share files with other users (for example a group of in 2005, eMule became the dominant client of the people who are collaborating on a project).The core of the eDonkey network. In 2006, police raids took down the iFolder is actually a project called Simias. It is Simias Razorback2 eDonkey server and temporarily took down which actually monitors files for changes, synchronizes The Pirate Bay. In 2009, the Pirate Bay trial ended in a these changes and controls the access permissions on guilty verdict for the primary founders of the tracker. The folders. The actual iFolder clients (including a graphical decision was appealed, leading to a second guilty verdict desktop client and a web client) are developed as separate in November 2010.