skip to main content
10.1145/1177080.1177124acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

A study of malware in peer-to-peer networks

Authors Info & Claims
Published:25 October 2006Publication History

ABSTRACT

Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks are not malicious, making them an ideal medium for spreading malware. We instrument two different open source P2P networks, Limewire and OpenFT, to examine the prevalence of malware in P2P networks. Our results from over a month of data show that 68% of all downloadable responses in Limewire containing archives and executables contain malware. The corresponding number for OpenFT is 3%. Also, most infections are from a very small number of distinct malware. In particular, in Limewire, the top three most prevalent malware account for 99% of all the malicious responses. The corresponding number for OpenFT is 75%. We also investigate the sources of malicious responses. To our surprise, 28% of all malicious responses in Limewire come from private address ranges. In OpenFT, the top virus, which accounts of 67% of all the malicious responses, is served by a single host. Further, our study provides a useful insight into filtering malware: filtering downloads based on the most commonly seen sizes of the most popular malware could block a large portion of malicious files with a very low rate of false positives. While current Limewire mechanisms detect only about 6% of malware containing responses, our size based filtering would detect over 99% of them.

References

  1. Computer associates virus information center. http://www3.ca.com/securityadvisor/virusinfo.Google ScholarGoogle Scholar
  2. The giFT project homepage. http://gift.sourceforge.net.Google ScholarGoogle Scholar
  3. Gnutella protocol specification. http://www.the-gdf.org/wiki/index.php?title=Gnutella_Protocol_Development.Google ScholarGoogle Scholar
  4. K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, modeling, and analysis of peer-to-peer file-sharing workload. In ACM SOSP, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurement, analysis, and modeling of bittorrent-like systems. In ACM SIGCOMM Internet Measurement Conference (IMC), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Holgers, D. Watson, and S. Gribble. Cutting through the confusion: A measurement study of homograph attacks. In USENIX Annual Technical Conference (USENIX), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Liang, R. Kumar, and K. W. Ross. The fasttrack overlay: A measurement study. Computer Networks, 50(6):842--858, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. LimeWire homepage. http://www.limewire.org.Google ScholarGoogle Scholar
  9. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. In IEEE Security and Privacy, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Moore, C. Shannon, and J. Brown. Code red: A case study on the spread and victims of an internet worm. In ACMUSENIX IMW, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Moshchuk, T. Bragin, S. Gribble, and H. Levy. A crawler-based study of spyware on the web. In Internet Society Network and Distributed System Security Symposium (NDSS), Feb. 2006.Google ScholarGoogle Scholar
  12. S. Saroiu, S. Gribble, and H. Levy. Measurement and analysis of spyware in a university environment. In USENIX Networked Sytems Design and Implementation (NSDI), 30 Mar. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Shin, J. Jung, and H. Balakrishnan. Malware prevalence in the kazaa file-sharing network. In ACM SIGCOMM Internet Measurement Conference (IMC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sophos virus analyses. http://www.sophos.com/virusinfo/analyses.Google ScholarGoogle Scholar
  15. Symantec security response. http://www.symantec.com/avcenter.Google ScholarGoogle Scholar
  16. Tomasz Kojm. ClamAV homepage. http://www.clamav.net.Google ScholarGoogle Scholar
  17. Kapersky lab virus encyclopedia. http://www.viruslist.com/en/viruses/encycolpedia.Google ScholarGoogle Scholar
  18. V. Yegneswaran, P. Barford, and J. Ullrich. Internet intrusions: Global characteristics and prevalence. In ACM SIGMETRICS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. W. Yu. Analyze the worm-based attack in large scale p2p networks 8th IEEE International Symposium on High-Assurace Systems Engineering, pages 308--309, Mar. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M. Costa, and S. Chien. A first look at peer-to-peer worms: Threats and devenses. In Proceedings of the IPTPS, Feb. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A study of malware in peer-to-peer networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
        October 2006
        356 pages
        ISBN:1595935614
        DOI:10.1145/1177080

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 October 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate277of1,083submissions,26%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader