An Enhanced Steganography-Based Botnet Communication Method in BitTorrent
Abstract
1. Introduction
- We propose a novel communication method that enables continuous C&C message transmission over BitTorrent. By exploiting a vulnerability in the BitTorrent Piece message exchange, secret messages are covertly embedded and transferred during ordinary file exchanges between benign peers. As a result, the covert traffic generated by our model preserves normal BitTorrent behavior and statistical properties, making it difficult to distinguish from legitimate traffic.
- We implement the proposed method and evaluate its payload capacity and threat potential through experimental comparison with existing approaches. Our results show that the proposed method achieves at least a twofold increase in payload capacity compared to prior work, enabling more efficient delivery of C&C messages and substantially increasing the covert-channel threat surface. We propose a novel communication method that allows continuous C&C message transmission using BitTorrent.
2. Background and Related Works
2.1. Overview of BitTorrent
2.2. BitTorrent Protocol Components and File Sharing Procedure
- (1)
- A peer creates a seed file and posts it on a website or an SNS platform;
- (2)
- A client downloads the seed file and runs it, sending its own information and the hash value of the desired file to the tracker;
- (3)
- The tracker returns a list of peers to the client;
- (4)
- The client downloads file fragments from those peers [27].
2.3. BitTorrent Message
- (1)
- A peer uploads a seed file to be shared, and clients download the seed file via a website or an SNS platform;
- (2)
- The client runs the seed file and requests a peer list from the tracker;
- (3)
- The tracker returns the peer list to the client;
- (4)
- The client performs a three-way handshake with the peer, followed by the exchange of Bitfield, Have, Negotiation, and Piece messages for fragment transmission.
2.4. Existing Studies and Their Limitations
3. Stego-Botnet C&C Communication Model in BitTorrent
3.1. Problem Description and Concept of Proposed Method
- (1)
- The botmaster embeds the C&C message into a Piece message using a network steganography technique and transmits it to bots disguised as a normal Piece message.
- (2)
- Before the Piece message undergoes the hash verification process, a copy of it is created in a random folder.
- (3)
- The bot extracts the embedded C&C message from the copied Piece message.
- (4)
- The original Piece message then proceeds through the standard BitTorrent hash verification procedure.
- (5)
- After verification, the embedded Piece messages are deleted, and only the normal pieces are collected to reconstruct the file.
3.2. The Procedures of the Proposed Model
- (1)
- The botmaster selects a video file of an appropriate size, depending on the size of the C&C message to be embedded.
- (2)
- The botmaster delivers the corresponding seed file to the bot through a website of an SNS platform.
- (3)
- The bot executes the seed file and attempts to connect to peers sharing the same file.
- (4)
- The bot establishes normal TCP connections with the botmaster and other peers possessing the file.
- (5)
- Through the exchange of the three-way handshake, Bitfield, and Negotiation messages, information such as session details, fragment ownership, and fragment transfer requests is obtained by the bot.
- (6)
- The bot and peers then exchange Piece messages, and the bot collects file pieces from all peers that own the file.
- (7)
- After establishing a normal session with the bot, the botmaster embeds the C&C message into a Piece message.
- (8)
- The embedded Piece message is transmitted to the bot (as shown in Figure 4, Step ①).
- (9)
- Upon receiving the Piece message, the bot copies and stores it in a random folder before the hash verification process begins (as shown in Figure 4, Step ②).
- (10)
- The bot extracts the embedded C&C message from the copied Piece message (as shown in Figure 4, Step ③).
- (11)
4. Experiments
4.1. Experimental Purpose and Methods
- Laptop: Intel Core i7 (10 cores), 16 GB RAM, Windows 10.
- Desktop: Intel Core i7 (10 cores), 32 GB RAM.
- Virtualization: VirtualBox 6.1.26.
- Client software: BitTorrent Classic 7.10.5.
4.2. Implementation and Operation
4.3. Experiment Result
5. Discussion
5.1. Consistency and Integrity
5.2. Robustness
5.3. Stealthiness
6. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Badar, L.T.; Carminati, B.; Ferrari, E. A Comprehensive Survey on Stegomalware Detection in Digital Media, Research Challenges and Future Directions. Signal Process. 2025, 231, 109888. [Google Scholar] [CrossRef]
- Vormayr, G.; Zseby, T.; Fabini, J. Botnet Communication Patterns. IEEE Commun. Surv. Tutor. 2017, 19, 2768–2796. [Google Scholar] [CrossRef]
- Jeon, J.; Cho, Y. Construction and Performance Analysis of Image Steganography-Based Botnet in Kakaotalk Openchat. Computers 2019, 8, 61. [Google Scholar] [CrossRef]
- Acarali, D.; Rajarajan, M.; Komninos, N.; Herwono, I. Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. J. Netw. Comput. Appl. 2016, 76, 1–15. [Google Scholar] [CrossRef]
- Eslahi, M.; Rohmad, M.S.; Nilsaz, H.; Naseri, M.V.; Tahir, N.M.; Hashim, H. Periodicity Classification of HTTP Traffic to Detect HTTP Botnets. In Proceedings of the 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Langkawi, Malaysia, 12–14 April 2015; pp. 119–123. [Google Scholar]
- Khattak, S.; Ramay, N.R.; Khan, K.R.; Syed, A.A.; Khayam, S.A. A Taxonomy of Botnet Behavior, Detection, and Defense. IEEE Commun. Surv. Tutor. 2014, 16, 898–924. [Google Scholar] [CrossRef]
- Nagaraja, S.; Houmansadr, A.; Piyawongwisal, P.; Singh, V.; Agarwal, P.; Borisov, N. Stegobot: A Covert Social Network Botnet. In Proceedings of the Information Hiding, 13th International Conference, IH 2011, Prague, Czech Republic, 18–20 May 2011; Filler, T., Pevný, T., Craver, S., Ker, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 299–313. [Google Scholar]
- Kwak, M.; Cho, Y. A Novel Video Steganography-Based Botnet Communication Model in Telegram Sns Messenger. Symmetry 2021, 13, 84. [Google Scholar] [CrossRef]
- Zhuang, D.; Chang, J.M. PeerHunter: Detecting Peer-to-Peer Botnets through Community Behavior Analysis. In Proceedings of the 2017 IEEE Conference on Dependable and Secure Computing, Taipei, China, 7–10 August 2017; pp. 493–500. [Google Scholar]
- Ferrara, E.; Varol, O.; Davis, C.; Menczer, F.; Flammini, A. The Rise of Social Bots. Commun ACM 2016, 59, 96–104. [Google Scholar] [CrossRef]
- Xue, Y.; Zhou, J.; Zeng, H.; Zhong, P.; Wen, J. An Adaptive Steganographic Scheme for H.264/AVC Video with Distortion Optimization. Signal Process. Image Commun. 2019, 76, 22–30. [Google Scholar] [CrossRef]
- Raj, U.A.S.; Maheswaran, C.P. Secure File Sharing System Using Image Steganography and Cryptography Techniques. In Proceedings of the 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 26–28 April 2023; pp. 1113–1116. [Google Scholar]
- Hiney, J.; Dakve, T.; Szczypiorski, K.; Gaj, K. Using Facebook for Image Steganography. In Proceedings of the 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, 24–27 August 2015; pp. 442–447. [Google Scholar]
- Sun, Y.; Lu, Y.; Chen, J.; Zhang, W.; Yan, X. Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography. Mathematics 2020, 8, 1452. [Google Scholar] [CrossRef]
- Alhaddad, M.J.; Alkinani, M.H.; Atoum, M.S.; Alarood, A.A. Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things. Symmetry 2020, 12, 2071. [Google Scholar] [CrossRef]
- Niu, K.; Li, J.; Yang, X.; Zhang, S.; Wang, B. Hybrid Adaptive Video Steganography Scheme Under Game Model. IEEE Access 2019, 7, 61523–61533. [Google Scholar] [CrossRef]
- Yuk, S.; Cho, Y. A Time-Based Dynamic Operation Model for Webpage Steganography Methods. Electronics 2020, 9, 2113. [Google Scholar] [CrossRef]
- Liang, X.; Kar, P. Robust and Secure File Transmission through Video Streaming Using Steganography and Blockchain. Int. J. Inf. Comput. Secur. 2024, 24, 258–283. [Google Scholar] [CrossRef]
- Vasava, D.; Doshi, N. Study and Analysis of Network Steganography Methods. In Proceedings of the ICT with Intelligent Applications, ICTIS 2022, Ahmedabad, India, 22 April 2022; Choudrie, J., Mahalle, P., Perumal, T., Joshi, A., Eds.; Springer Nature Singapore: Singapore, 2023; pp. 71–79. [Google Scholar]
- Wen, W.; Huang, H.; Qi, S.; Zhang, Y.; Fang, Y. Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages. IEEE Trans. Netw. Sci. Eng. 2024, 11, 2951–2962. [Google Scholar] [CrossRef]
- Lei, J.; Li, D.; Pan, Z.; Sun, Z.; Kwong, S.; Hou, C. Fast Intra Prediction Based on Content Property Analysis for Low Complexity HEVC-Based Screen Content Coding. IEEE Trans. Broadcast. 2017, 63, 48–58. [Google Scholar] [CrossRef]
- Mazurczyk, W.; Karaś, M.; Szczypiorski, K. SkyDe: A Skype-Based Steganographic Method. arXiv 2013, arXiv:1301.3632. [Google Scholar] [CrossRef]
- Soundararajan, D.; Ramakrishnan, S. Coverless Data Hiding in VoIP Based on DNA Steganography with Authentication. Int. Arab J. Inf. Technol. 2023, 20, 190–198. [Google Scholar] [CrossRef]
- Wang, M.; Gu, W.; Ma, C. A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent. Secur. Commun. Netw. 2020, 2020, 8848315. [Google Scholar] [CrossRef]
- Yang, Z.; Wang, B. A Feature Extraction Method for P2P Botnet Detection Using Graphic Symmetry Concept. Symmetry 2019, 11, 326. [Google Scholar] [CrossRef]
- Incentives Build Robustness in BitTorrent. Available online: https://www.bittorrent.org/ (accessed on 9 September 2025).
- Xia, R.L.; Muppala, J.K. A Survey of BitTorrent Performance. IEEE Commun. Surv. Tutor. 2010, 12, 140–158. [Google Scholar] [CrossRef]
- Srinivasan, A.; Aldharrab, H. XTRA—EXtended Bit-Torrent PRotocol for Authenticated Covert Peer Communication. Peer Peer Netw. Appl. 2019, 12, 143–157. [Google Scholar] [CrossRef]
- Wu, Z.; Guo, J.; Zhang, C.; Li, C. Steganography and Steganalysis in Voice over Ip: A Review. Sensors 2021, 21, 1032. [Google Scholar] [CrossRef]
- Zhang, C.; Jiang, S.; Chen, Z.; Qian, J. MSSN: Multi-Stream Steganalysis Network for Detection of QIM-Based Steganography in VoIP Streams. IEEE Trans. Dependable Secur. Comput. 2025. [Google Scholar] [CrossRef]
- Li, Z.; Sun, X.; Wang, B.; Wang, X. A Steganography Scheme in P2P Network. In Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 15–17 August 2008; pp. 20–24. [Google Scholar]
- Kopiczko, P.; Mazurczyk, W.; Szczypiorski, K. StegTorrent: A Steganographic Method for the P2P File Sharing Service. In Proceedings of the 2013 IEEE Security and Privacy Workshops, San Francisco, CA, USA, 23–24 May 2013; pp. 151–157. [Google Scholar]
- Wei, S.; Wang, Z.; Zhang, X. Universal Image Vaccine Against Steganography. Symmetry 2025, 17, 66. [Google Scholar] [CrossRef]
- Moghadasi, H.A.; Dehghani, H. Detection of Speech Steganography for VoIP Stream Based on Deep Learning Approach in G.729 Codec. Res. Sq. 2025. [Google Scholar] [CrossRef]
- Denysiuk, D.; Savenko, O.; Kvassay, M. Method for Detecting Malicious Commands Transmitted via Images Using Steganography. In Proceedings of the 6th International Workshop on Intelligent Information Technologies & Systems of Information Security (IntelITSIS 2025), Khmelnytskyi, Ukraine, 4 April 2025. [Google Scholar]
- Revyakina, E.; Gazizov, A. Development of Methods and Tools for Implementing and Detecting Network Steganography. Pak. J. Life Soc. Sci. PJLSS 2025, 23, 238–248. [Google Scholar] [CrossRef]
- Ashwin, K.S.; Prakash, B.; Kulkarni, B.S.; Shivaprasad, B.J. Blockchain-Based Authentication for Secure Document Sharing with AES Encryption and Steganography. In Proceedings of the 2025 International Conference on Computing Technologies (ICOCT), Bengaluru, India, 13–14 June 2025; pp. 1–7. [Google Scholar]
- Yuan, X.; Sun, J.; Chen, Z.; Zhang, C.; Li, M.; Zhang, Z.; Zhu, L. IAAE-Stega: Generic Blockchain-Based Steganography Framework via Invertible Adversarial Autoencoder. IEEE Trans. Netw. Sci. Eng. 2025, 1–16. [Google Scholar] [CrossRef]
- Rajba, P.; Keller, J.; Mazurczyk, W. Entropy-Aware Secret Data Embedding for Network Storage Channels. In Proceedings of the Availability, Reliability and Security, ARES 2025 International Workshops, Ghent, Belgium, 11–14 August 2025; Coppens, B., Volckaert, B., Naessens, V., De Sutter, B., Eds.; Springer Nature Switzerland: Cham, Switzerland, 2025; pp. 327–345. [Google Scholar]
- Gao, S.; Zhang, Z.; Li, Q.; Ding, S.; Iu, H.H.C.; Cao, Y.; Xu, X.; Wang, C.; Mou, J. Encrypt a Story: A Video Segment Encryption Method Based on the Discrete Sinusoidal Memristive Rulkov Neuron. IEEE Trans. Dependable Secur. Comput. 2025. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, C.; Lu, M.; Yang, J.; Gui, J.; Zhang, S. From Simple to Complex Scenes: Learning Robust Feature Representations for Accurate Human Parsing. IEEE Trans. Pattern Anal. Mach. Intell. 2024, 46, 5449–5462. [Google Scholar] [CrossRef] [PubMed]
- Wang, C.; Zhang, Q.; Wang, X.; Zhou, L.; Li, Q.; Xia, Z.; Ma, B.; Shi, Y.Q. Light-Field Image Multiple Reversible Robust Watermarking Against Geometric Attacks. IEEE Trans. Dependable Secur. Comput. 2025. [Google Scholar] [CrossRef]
Message Type | ID | Payload |
---|---|---|
CHOKE | 00 | NO |
UNCHOKE | 01 | NO |
INTERESTED | 02 | NO |
NOT INTERESTED | 03 | NO |
HAVE | 04 | NO |
BITFIELD | 05 | YES |
REQUEST | 06 | NO |
PIECE | 07 | YES |
CANCEL | 08 | NO |
Size of Secret Message | Bitfield | Piece | ||||
---|---|---|---|---|---|---|
Avg. | Max. | Min. | Avg. | Max. | Min. | |
10 MB | 2 | 1 | 10 | 1 | 1 | 1 |
20 MB | 3 | 1 | 20 | 1 | 1 | 1 |
30 MB | 4 | 1 | 30 | 1 | 1 | 1 |
40 MB | 5 | 1 | 40 | 1 | 1 | 1 |
50 MB | 7 | 1 | 50 | 1 | 1 | 1 |
100 MB | 13 | 1 | 100 | 1 | 1 | 1 |
200 MB | 25 | 2 | 200 | 1 | 1 | 2 |
500 MB | 63 | 4 | 500 | 1 | 1 | 2 |
1 GB | 128 | 8 | 1024 | 1 | 1 | 4 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Park, G.; Cho, Y.; Qu, G. An Enhanced Steganography-Based Botnet Communication Method in BitTorrent. Electronics 2025, 14, 4081. https://doi.org/10.3390/electronics14204081
Park G, Cho Y, Qu G. An Enhanced Steganography-Based Botnet Communication Method in BitTorrent. Electronics. 2025; 14(20):4081. https://doi.org/10.3390/electronics14204081
Chicago/Turabian StylePark, Gyeonggeun, Youngho Cho, and Gang Qu. 2025. "An Enhanced Steganography-Based Botnet Communication Method in BitTorrent" Electronics 14, no. 20: 4081. https://doi.org/10.3390/electronics14204081
APA StylePark, G., Cho, Y., & Qu, G. (2025). An Enhanced Steganography-Based Botnet Communication Method in BitTorrent. Electronics, 14(20), 4081. https://doi.org/10.3390/electronics14204081