Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent

Size: px
Start display at page:

Download "Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent"

Transcription

1 Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada Universidade do Vale do Rio dos Sinos (UNISINOS) São Leopoldo, RS Brasil Galway, Sept th IEEE International Conference on P2P

2 Introduction Context: BitTorrent In P2P, file sharing seems to be the killer application BitTorrent is one of the most popular instances of file sharing Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do2 Vale / 31 do

3 Introduction Motivation & Related Work Research efforts have investigated BitTorrent To understand its behavior, expose potential limitations and propose improvements P2P fairness issues and incentive mechanisms There are several attacks reported in the literature But always in peer s self-benefit, like avoiding any contribution to the network In contrast, we emphasize security aspects a malicious peer wants damage to a swarm Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do3 Vale / 31 do

4 Introduction Motivation & Related Work Research efforts have investigated BitTorrent To understand its behavior, expose potential limitations and propose improvements P2P fairness issues and incentive mechanisms There are several attacks reported in the literature But always in peer s self-benefit, like avoiding any contribution to the network In contrast, we emphasize security aspects a malicious peer wants damage to a swarm Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do3 Vale / 31 do

5 Introduction Our Aims in This Paper Identification of attacks exploiting vulnerabilities of the BitTorrent protocol Evaluation of their impact Two specific attacks addressed: piece lying and Eclipse Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do4 Vale / 31 do

6 Rest of the Talk Introduction 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do5 Vale / 31 do

7 Outline BitTorrent 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do6 Vale / 31 do

8 BitTorrent Main Elements.torrent file Trackers Seeders Leechers Swarm Pieces Blocks Bitfields Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do7 Vale / 31 do

9 BitTorrent Policies and Strategies Connection policies: peer obtains peer IPs from the tracker and maintains a number of connections with other peers Tit-for-tat: incentive mechanism to increase collaboration Local Rarest First (LRF): peer selects for download the piece that looks rarest Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do8 Vale / 31 do

10 State Diagrams 1/3 BitTorrent Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do9 Vale / 31 do

11 State Diagrams 2/3 BitTorrent Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 10 Vale / 31 do

12 State Diagrams 3/3 BitTorrent Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 11 Vale / 31 do

13 Outline Attack and Subversion Strategies 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 12 Vale / 31 do

14 Attack and Subversion Strategies Attack and Subversion Strategies Sybil attack: single physical peer with multiple virtual identities Piece lying Peer eclipsing Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 13 Vale / 31 do

15 Attack and Subversion Strategies Piece Lying Attack LRF aims to equalize the number of copies of each piece in the swarm Attack aims to interfere with this balance Malicious peer lies about having one or more pieces, but never unchokes other peers Many peers acting in collusion and lying about certain pieces induce the non-malicious peers to choose other pieces first This tends to make certain pieces artificially rarer When pieces become less common, it may slow down the swarm or even cause a swarm failure Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 14 Vale / 31 do

16 Attack and Subversion Strategies Peer Eclipse Attack In BitTorrent each peer usually connects to a limited number of peers A malicious peer does not collaborate (or might collaborate very little) Malicious peers connect to correct peers (and are connected by correct peers) The list of peers a correct peer knows about is randomly taken from trackers, and there will be malicious and correct peers If a correct peer is connected to malicious peers only, then it is Eclipsed It makes no progress and eventually fails Even if there are some correct peers connected, the download will take longer or even fail if peers leave Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 15 Vale / 31 do

17 Outline BitTorrent Simulation 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 16 Vale / 31 do

18 Basic Aspects BitTorrent Simulation Studied the protocol specification, implementations and the literature Created a simulation model of a swarm Reflects the detailed behavior of peers Extension of a simulation framework called Simmcast (written in Java) Modeled elements and input parameters: number and type of peers, the way they arrive to the swarm, bandwidth, contribution rate, and so on Assumptions: single tracker, no detailed TCP modeling Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 17 Vale / 31 do

19 BitTorrent Simulation Is the Simulator any Real? SImulation results produced without attack were consistent with measurements reported in the literature matched experimental results obtained from a small, controlled environment experimented with different content sizes, piece size in blocks, bandwidth, and number of peers Packets were collected using passive monitoring Results showed similarity Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 18 Vale / 31 do

20 Outline Impact Evaluation 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 19 Vale / 31 do

21 Questions Posed Impact Evaluation 1 What is the impact of the Piece Lying attack on the dynamics of a swarm, when compared to the case without attack? 2 What happens when the number of liars increases? 3 In the Eclipse attack, which number of Sybils is more effective and why? Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 20 Vale / 31 do

22 Questions Posed Impact Evaluation 1 What is the impact of the Piece Lying attack on the dynamics of a swarm, when compared to the case without attack? 2 What happens when the number of liars increases? 3 In the Eclipse attack, which number of Sybils is more effective and why? Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 20 Vale / 31 do

23 Questions Posed Impact Evaluation 1 What is the impact of the Piece Lying attack on the dynamics of a swarm, when compared to the case without attack? 2 What happens when the number of liars increases? 3 In the Eclipse attack, which number of Sybils is more effective and why? Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 20 Vale / 31 do

24 Impact Evaluation Model Parameters and Assumptions Analysis focused on the first hours of a swarm 1 initial seeder 100 leechers that arrive following Exponential distribution Contribution rate equals 1.0 for leecher and 2.0 for seeder Reconnection between peer and tracker at every 30s Shared content 640MB = 640 pieces of 1MB, each with of 64 blocks of 16 KB Leechers have a maximum download time (10x average time) Asymmetric bandwidths: download 1 Mbps and upload 256 Kbps Malicious peers act in collusion and start the attack at the same moment (on 5th peer) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 21 Vale / 31 do

25 Impact Evaluation Swarm with Normal Behavior 100 Seeders Leechers Remaining L max =59 Peers S max = Time (minutes) L max = maximum number of leechers reached S max = maximum number of seeders reached Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 22 Vale / 31 do

26 Impact Evaluation Evaluation Metrics Increase in download time Number of download failures (as users give up) Complete swarm failure Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 23 Vale / 31 do

27 Impact Evaluation Impact of the Piece Lying attack? 25 liars lying about 4 pieces 100 Seeders Leechers Remaining 100 Seeders Leechers Remaining L max =77 60 L max =59 60 Peers Peers S max =10 20 S max = Time (minutes) Time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 24 Vale / 31 do

28 Impact Evaluation What happens when the number of liars increases? Peers lying about a set of 32 pieces Number of Downloads Completed Liars 1 Liars 5 Liars Liars 15 Liars 20 Liars 25 Liars Liars 75 Liars 100 Liars Download time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 25 Vale / 31 do

29 Impact Evaluation In Eclipse, which number of Sybils is more efficient? Varying the number of Sybils connecting randomly Number of Downloads Completed Sybils 10 Sybils Sybils 25 Sybils 30 Sybils Sybils 50 Sybils 60 Sybils Sybils 80 Sybils 90 Sybils 100 Sybils Sybils 300 Sybils 400 Sybils Sybils 600 Sybils 1000 Sybils Download time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 26 Vale / 31 do

30 Impact Evaluation Impact of Eclipse Example depicts swarm under attack of a gang of 50 Sybils 100 Seeders Leechers Remaining L max =95 Seeders Leechers Remaining L max =59 60 Peers Peers S max =10 10 S max = Time (minutes) Time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 27 Vale / 31 do

31 Outline Concluding Remarks 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 28 Vale / 31 do

32 Concluding Remarks Conclusions Novelty is to address security in BitTorrent in the sense of causing harm Presented a simulation evaluation of the impact of two attacks Discrete-event simulator produced results were compared with experimental data Results indicate that a modest set of resources can be used to launch an attack and harm a BitTorrent network Attack of piece lying seems effective with 50 or more liars in the configuration evaluated Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 29 Vale / 31 do

33 Concluding Remarks Future Work There are many opportunities for future work There are other relevant attacks and security issues Impact of attacks needs to be evaluated with large scale simulations Experimental evaluation of attacks with different user agents to validate results Project, implementation and evaluation of counter-measures Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 30 Vale / 31 do

34 Concluding Remarks Contatcts Thank you. Prof. Marinho P. Barcellos or marinho P2P-SeC: Secure and reliable Computing in P2P networks PIPCA/UNISINOS Brazil Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 31 Vale / 31 do

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent

More information

CNT5106C Project Description

CNT5106C Project Description Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in

More information

Incentives Build Robustness in BitTorrent

Incentives Build Robustness in BitTorrent Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves

More information

Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent

Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent IEEE P2P'9 - Sept. 9-, 29 Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent M. Meulpolder, J.A. Pouwelse, D.H.J. Epema, H.J. Sips Parallel and Distributed Systems Group Department of

More information

Java Bit Torrent Client

Java Bit Torrent Client Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download

More information

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman

More information

Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent

Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent Dominic Papritz Universität Bern Overview > Related work > MC-FTP > BitTorrent > Future work > References

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 -to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is

More information

P2P File Sharing: BitTorrent in Detail

P2P File Sharing: BitTorrent in Detail ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

The Algorithm of Sharing Incomplete Data in Decentralized P2P

The Algorithm of Sharing Incomplete Data in Decentralized P2P IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,

More information

Guaranteeing Performance through Fairness in Peer-to-Peer File-Sharing and Streaming Systems. Alex Sherman

Guaranteeing Performance through Fairness in Peer-to-Peer File-Sharing and Streaming Systems. Alex Sherman Guaranteeing Performance through Fairness in Peer-to-Peer File-Sharing and Streaming Systems Alex Sherman Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in

More information

Traffic Localization for DHT-based BitTorrent networks

Traffic Localization for DHT-based BitTorrent networks Traffic Localization for DHT-based BitTorrent networks Moritz Steiner and Matteo Varvello 1 OUTLINE Motivation DHT Traffic Localization DHT Traffic Localization in Action! Evaluation Conclusion Motivation

More information

BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC

BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC Kevin Bauer, Damon McCoy, Dirk Grunwald, and Douglas Sicker University of Colorado, Boulder, CO, USA {bauerk, mccoyd, grunwald, sicker}@colorado.edu

More information

BitTorrent Peer To Peer File Sharing

BitTorrent Peer To Peer File Sharing BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start

More information

How To Predict Bittorrent Eta

How To Predict Bittorrent Eta University of Warsaw Faculty of Mathematics, Computer Science and Mechanics VU University Amsterdam Faculty of Sciences Joint Master of Science Programme Piotr Powałowski Student no. 209403 (UW), 1735543

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Revisiting P2P content sharing in wireless ad hoc networks

Revisiting P2P content sharing in wireless ad hoc networks Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications

More information

Network Management through BitTorrent Blocking and Bandwidth Shaping by ISPs

Network Management through BitTorrent Blocking and Bandwidth Shaping by ISPs Network Management through BitTorrent Blocking and Bandwidth Shaping by ISPs Gerard Van Wijk Department of Computer Science University of Minnesota, Morris Morris, MN 56267 vanw0067@morris.umn.edu ABSTRACT

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks

More information

On the Development of IETF-based Network Monitoring Probes for High Speed Networks

On the Development of IETF-based Network Monitoring Probes for High Speed Networks On the Development of IETF-based Network Monitoring Probes for High Speed Networks Ricardo Nabinger Sanchez rnsanchez@cscience.org Rodrigo Pereira rspereira@exatas.unisinos.br Luciano Paschoal Gaspary

More information

ChunkSim: Simulating Peer-to-Peer Content Distribution

ChunkSim: Simulating Peer-to-Peer Content Distribution ChunkSim: Simulating Peer-to-Peer Content Distribution Jussi Kangasharju Uwe Schmidt Dirk Bradler Julian Schröder-Bernhardi Department of Computer Science, Darmstadt University of Technology Hochschulstrasse

More information

Graffiti Networks: A Subversive, Internet-Scale File Sharing Model. Andrew Pavlo DC401 Rhode Island Defcon Group October 12, 2009

Graffiti Networks: A Subversive, Internet-Scale File Sharing Model. Andrew Pavlo DC401 Rhode Island Defcon Group October 12, 2009 Graffiti Networks: A Subversive, Internet-Scale File Sharing Model Andrew Pavlo DC401 Rhode Island Defcon Group October 12, 2009 Co-Authors Ning Shi (Brown) Outline Open BitTorrent Problems A Subversive

More information

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Delft University of Technology Parallel and Distributed Systems Report Series The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Boxun Zhang, Alexandru Iosup, and Dick Epema {B.Zhang,A.Iosup,D.H.J.Epema}@tudelft.nl

More information

Peer-to-Peer Data Management

Peer-to-Peer Data Management Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 11. Content Distribution 1. Reliability in Distributed

More information

CS5412: TORRENTS AND TIT-FOR-TAT

CS5412: TORRENTS AND TIT-FOR-TAT 1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VI Ken Birman BitTorrent 2 Today we ll be focusing on BitTorrent The technology really has three aspects A standard tht BitTorrent client systems follow Some

More information

Multimedia transmission in a managed P2P network: making sense?

Multimedia transmission in a managed P2P network: making sense? Multimedia transmission in a managed P2P network: making sense? L. Xu 1, A. Ksentini 2, K. Singh 1, G. Rubino 1, G. Straub 3, Y. L Azou 4 1 INRIA Rennes - Bretagne Atlantique, Rennes, France; 2 IRISA-University

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge

More information

Mitigation of Random Query String DoS via Gossip

Mitigation of Random Query String DoS via Gossip Mitigation of Random Query String DoS via Gossip Stefano Ferretti, Vittorio Ghini Department of Computer Science, University of Bologna Bologna, Italy {sferrett, ghini}@cs.unibo.it arxiv:9.v2 [cs.cr] 2

More information

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican

More information

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks BotTorrent: Misusing BitTorrent to Launch DDoS Attacks Karim El Defrawy, Minas Gjoka and Athina Markopoulou University of California, Irvine {keldefra, mgjoka, athina}@uci.edu Abstract BitTorrent is currently

More information

RatFish: A File Sharing Protocol Provably Secure Against Rational Users

RatFish: A File Sharing Protocol Provably Secure Against Rational Users RatFish: A File Sharing Protocol Provably Secure Against Rational Users Michael Backes 1,2, Oana Ciobotaru 1, and Anton Krohmer 1 1 Saarland University 2 MPI-SWS Abstract. The proliferation of P2P computing

More information

P2P File Sharing - A Model For Fairness Versus Performance

P2P File Sharing - A Model For Fairness Versus Performance 1 The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent (BT) file sharing protocol is very popular due to its scalability property

More information

P2P content sharing in spontaneous multi-hop wireless networks

P2P content sharing in spontaneous multi-hop wireless networks P2P content sharing in spontaneous multi-hop wireless networks Mohamed Karim Sbai EPI Planete, INRIA, France Email: mksbai@sophia.inria.fr Emna Salhi EPI Planete, INRIA, France ENSI, Tunisia Email: esalhi@sophia.inria.fr

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended

More information

A CASE STUDY IN MODELING LARGE-SCALE PEER-TO-PEER FILE-SHARING NETWORKS USING DISCRETE-EVENT SIMULATION

A CASE STUDY IN MODELING LARGE-SCALE PEER-TO-PEER FILE-SHARING NETWORKS USING DISCRETE-EVENT SIMULATION A CASE STUDY IN MODELING LARGE-SCALE PEER-TO-PEER FILE-SHARING NETWORKS USING DISCRETE-EVENT SIMULATION Christopher D. Carothers Ryan LaFortune Department of Computer Science Rensselaer Polytechnic Institute

More information

A Measurement Study of Peer-to-Peer File Sharing Systems

A Measurement Study of Peer-to-Peer File Sharing Systems CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

University of Würzburg, Institute of Computer Science, Research Report Series

University of Würzburg, Institute of Computer Science, Research Report Series University of Würzburg Institute of Computer Science Research Report Series Investigation of chunk selection strategies in peer-assisted video-on-demand systems Tobias Hoßfeld, Simon Oechsner, Frank Lehrieder,

More information

Computation and Economics - Spring 2012 Assignment #3: File Sharing

Computation and Economics - Spring 2012 Assignment #3: File Sharing Computation and Economics - Spring 2012 Assignment #3: File Sharing Professor Sven Seuken Department of Informatics, University of Zurich Out Thursday, March 8, 2012 Due 14:00 sharp: Monday, March 19,

More information

Reducing Costs in the Personal Cloud: Is BitTorrent a Better Bet?

Reducing Costs in the Personal Cloud: Is BitTorrent a Better Bet? Reducing Costs in the Personal Cloud: Is BitTorrent a Better Bet? Rahma Chaabouni, Marc Sánchez-Artigas and Pedro García-ópez Universitat Rovira i Virgili, Tarragona (Spain) {rahma.chaabouni marc.sanchez

More information

A Week in the Life of the Most Popular BitTorrent Swarms

A Week in the Life of the Most Popular BitTorrent Swarms A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University

More information

Peer-to-Peer Multimedia Streaming Using BitTorrent

Peer-to-Peer Multimedia Streaming Using BitTorrent Peer-to-Peer Multimedia Streaming Using BitTorrent Purvi Shah Jehan-François Pâris Department of Computer Science University of Houston, Houston, TX 77204-3010 {purvi, paris}@cs.uh.edu Abstract We propose

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

The Impact of Background Network Traffic on Foreground Network Traffic

The Impact of Background Network Traffic on Foreground Network Traffic The Impact of Background Network Traffic on Foreground Network Traffic George Nychis Information Networking Institute Carnegie Mellon University gnychis@cmu.edu Daniel R. Licata Computer Science Department

More information

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2. THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.

More information

How To Make A Game Of Gnutella A Cooperative Game

How To Make A Game Of Gnutella A Cooperative Game CS 186 Lecture 3 P2P File-Sharing David C. Parkes Sven Seuken September 1, 2011 Imagine you need to distribute a software patch to 10 Million users. What s an efficient way for doing so? If you are using

More information

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 dd367@cornell.edu Abstract Most cloud storage platforms today offer a centralized

More information

Angels: In-Network Support for Minimum Distribution Time in P2P Overlays

Angels: In-Network Support for Minimum Distribution Time in P2P Overlays Angels: In-Network Support for Minimum Distribution Time in P2P Overlays Raymond Sweha remos@cs.bu.edu Azer Bestavros best@cs.bu.edu John Byers byers@cs.bu.edu Abstract This paper proposes the use of in-network

More information

How To Accelerate Peer To Peer File Sharing With Social Networks

How To Accelerate Peer To Peer File Sharing With Social Networks The 3st Annual IEEE International Conference on Computer Communications: Mini-Conference Accelerating Peer-to-Peer File Sharing with Social Relations: Potentials and Challenges Haiyang Wang Email: hwa7@cs.sfu.ca

More information

Leveraging the Clouds for improving P2P Content Distribution Networks Performance

Leveraging the Clouds for improving P2P Content Distribution Networks Performance Leveraging the Clouds for improving P2P Content Distribution Networks Performance amir@sics.se 1 Big Picture 2 Big Picture Client Server Peer to Peer Server Farm 3 Big Picture How to leverage the cloud

More information

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks

BotTorrent: Misusing BitTorrent to Launch DDoS Attacks BotTorrent: Misusing BitTorrent to Launch DDoS Attacks KarimEl Defrawy, MinasGjokaand AthinaMarkopoulou University of California, Irvine {keldefra, mgjoka, athina}@uci.edu Abstract BitTorrent is currently

More information

Lab 5: BitTorrent Client Implementation

Lab 5: BitTorrent Client Implementation Lab 5: BitTorrent Client Implementation Due: Nov. 30th at 11:59 PM Milestone: Nov. 19th during Lab Overview In this lab, you and your lab parterner will develop a basic BitTorrent client that can, at minimal,

More information

Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary

Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary Methodology: Security plan for wireless networks By: Stephen Blair Mandeville A. Summary The evolution to wireless networks allows connections with the same quality of data transfer at a lower cost but

More information

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010

arxiv:1011.1892v1 [cs.ni] 8 Nov 2010 Pushing Locality to the Limit Stevens Le Blond a, Arnaud Legout a,, Walid Dabbous a a INRIA, EPI Planete, 004 route des lucioles, B.P. 93, 0690 Sophia Antipolis CEDEX, France arxiv:0.89v [cs.ni] 8 Nov

More information

Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik

Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik Denial of Service Resilience in Peer to Peer File Sharing Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik Outline 1. Background on P2P systems 2. File

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis U.C. Riverside Pablo Rodriguez Microsoft Research Konstantina Papagiannaki Intel Research Cambridge Abstract

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

Content Distribution Network (CDN)

Content Distribution Network (CDN) Content Distribution Network (CDN) Amir H. Payberah (amir@sics.se) Fatemeh Rahimian (fatemeh@sics.se) 1 GOAL What is Content Distribution Network (CDN)? The solutions for CDN. CDN applications File Sharing

More information

Comprehensive View of a Live Network Coding P2P System

Comprehensive View of a Live Network Coding P2P System Comprehensive View of a Live Network Coding P2P System Christos Gkantsidis chrisgk@microsoft.com John Miller johnmil@microsoft.com Microsoft Research 7 J J Thomson Avenue Cambridge, CB3 FB. UK Pablo Rodriguez

More information

Is Content Publishing in BitTorrent Altruistic or Profit-Driven?

Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Ruben Cuevas Univ. Carlos III de Madrid rcuevas@it.uc3m.es Sebastian Kaune TU Darmstadt kaune@kom.tu-darmstadt.de Michal Kryczka Institute

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

MULTI WAN TECHNICAL OVERVIEW

MULTI WAN TECHNICAL OVERVIEW MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:

More information

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca

More information

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing

More information

ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY. Department of Computer Science & IT University of Jammu, Jammu

ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY. Department of Computer Science & IT University of Jammu, Jammu ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY Dr. Deepshikha Jamwal Bhawana Sharma Research Scholar Research scholar jamwal.shivani@gmail.com bhawana32_mca@yahoo.co.in Department of Computer Science

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Chapter 6: Fundamental Cloud Security

Chapter 6: Fundamental Cloud Security Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

INTERNET CONNECTIVITY

INTERNET CONNECTIVITY INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Performance Analysis Proposal

Performance Analysis Proposal 1. Title Performance Analysis Proposal Performance Analysis of P2P VoIP Applications 2. Objective To evaluate the dynamic behavior (i.e., CODEC usage) of VoIP P2P applications (e.g. Skype, Google Talk)

More information

Network Management Practices 11/01/2012 1

Network Management Practices 11/01/2012 1 Atlantic Broadband s High Speed Internet Network Management, Service Performance and Terms of Service Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part

More information

One hop Reputations for Peer to Peer File Sharing Workloads

One hop Reputations for Peer to Peer File Sharing Workloads One hop Reputations for Peer to Peer File Sharing Workloads Michael Piatek Tomas Isdal Arvind Krishnamurthy Thomas Anderson University of Washington Abstract An emerging paradigm in peer-to-peer (P2P)

More information

apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates

apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates authors: Cameron Dale, Jiangchuan Liu presented by: Cameron Dale Simon Fraser University Burnaby, BC, Canada camerond@cs.sfu.ca

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

TCP Behavior across Multihop Wireless Networks and the Wired Internet

TCP Behavior across Multihop Wireless Networks and the Wired Internet TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University of California, Los Angeles, CA 90095 (xkx, sbae,

More information

On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast

On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast Universal Journal of Communications and Network 1(4): 142-15, 213 DOI: 1.13189/ujcn.213.143 http://www.hrpub.org On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013 SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures Faculty of Electrical Engineering and Communication Brno University of Technology Technická 12, CZ-616 00 Brno, Czechia http://www.six.feec.vutbr.cz Stress Testing and Distributed Denial of Service Testing

More information

Multi-torrent: a performance study and applications. Yan Yang*, Alix L.H. Chow and Leana Golubchik. Int. J. Advanced Media and Communication, Vol.

Multi-torrent: a performance study and applications. Yan Yang*, Alix L.H. Chow and Leana Golubchik. Int. J. Advanced Media and Communication, Vol. Int. J. Advanced Media and Communication, Vol. Multi-torrent: a performance study and applications Yan Yang*, Alix L.H. Chow and Leana Golubchik Department of Computer Science, University of Southern California,

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Energy Adaptive Mechanism for P2P File Sharing Protocols

Energy Adaptive Mechanism for P2P File Sharing Protocols Energy Adaptive Mechanism for P2P File Sharing Protocols Mayank Raj 1, Krishna Kant 2, and Sajal K. Das 1 1 Center for Research in Wireless Mobility and Networking (CReWMaN), Department of Computer Science

More information