Secure File Sharing in Darknet
|
|
|
- Monica Bradford
- 5 years ago
- Views:
From this document you will learn the answers to the following questions:
What does darknet file sharing system provide to the users?
What type of file sharing is darknet?
What is the trusted peer in a P2P network?
Transcription
1 Secure File Sharing in Darknet Amita A. Dwivedy PG School GTU (ITSNS), Department of Computer Engineering, Gujarat Technological University, Ahmedabad Abstract Darknet is a collection of networks and technologies used to share digital content. It is not a separate physical network but an application and protocol layer riding on existing networks [1]. A private, distributed Peer-to-Peer file sharing network, where connections are made only between trusted peers using nonstandard protocols and ports is darken. It is also called F2F (Friend to Friend) network. File sharing in darknet is anonymous, and therefore users can communicate with least fear of third party interference which enhances the privacy feature in network communication. Along with user privacy it also promotes illegal activity such as distribution of copyrighted materials or distribution of abusive content. Due to the property of anonymity it is difficult to track the source of such file distribution. To resolve the issue of distribution of illegal content along with preserving the privacy of the user in peer to peer network a private networks is proposed in which the data will be provided through server to its peer client or the client can share data or file that are made available by the server in the network. In this way, server will be responsible for each and every file sharing within the network i.e. server is only allowed to inject file in the network and clients cannot inject file in the network. Therefore, despite of anonymous file sharing, the data transferred will be monitored by the server. 1. Introduction Darknet is defined as a collection of networks or technologies used by private groups of people communicating or sharing digital content protecting from outside party s supervision of the transactions [1]. Darknet is not a separate physical network but it is an application and protocol layer riding on existing networks [1]. (Peter Biddle, 2002) defines darknet in their paper The Darknet and the Future of Content Distribution as an idea based on three assumptions [1]: 1. Any widely distributed object will be available to a fraction of users in a form that permits copying. 2. Users will copy objects if it is possible and interesting to do so. 3. Users are connected by high-bandwidth channels. To operate effectively, the darknet has a small number of technological and infrastructure requirements, which are similar to those of legal content distribution networks. These infrastructure requirements are [1]: 1. Input, facilities for injecting new objects into the darknet. 2. Transmission, a distribution network that carries copies of objects to users. 3. Output, ubiquitous rendering devices, which allow users to consume objects. 4. Database, a search mechanism to enable users to find objects. 5. Storage, e.g. a caching mechanism that allows the darknet to retain objects for extended periods of time. Features of Darknet (private P2P content sharing) Desired features of Darknet are as follows: 1. Authenticity: Unauthorized peers are not allowed to make changes to the content shared. 2. Scalability: There is no limitation of the size of the system 3. Reliability: The malfunction on any given node will not affect the whole system. 4. Performance: It is defined in terms of time duration between the request and the final receipt of desired content, searching, uploading and browsing for content. 5. System stability: The topology of a P2P system changes continuously as peer join and leave despite of such changes the system remains stable and continue to provide services at all times. 6. Privacy: Privacy could be ensured by either anonymity or trust. 1978
2 Anonymity: Anonymity ensures that the identity of user is not disclosed. Trust: Assured reliance on the character, ability, strength, or truth of someone or something. A peer to peer (P2P) computer network is type of network in which each computer in this network can act as a client or server. Client means placing a request i.e. client is a running application programs on a local site that requests service from a running application program on a remote site. Server means a program that can provide services to others program. New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. Although, darknet file sharing system provides privacy to the users, it also promotes illegal activity such as distribution of copyrighted materials or distribution of abusive content. Due to the property anonymity it is difficult or rather impossible to track the source of such file distribution. To resolve the issue of distribution of illegal content along with preserving the privacy of the user in peer to peer network a private networks is proposed in which the data will be provided through server to its peer client or the client can share data or file that are made available by the server in the network. Once the data is released in the network, the clients can share data amongst themselves. In this way, server will be responsible for each and every file sharing within the network i.e. server is only allowed to inject file in the network and clients cannot inject file in the network. Therefore, despite of anonymous file sharing, the data transferred will be monitored by the server. 2. Analysis of Peer to Peer Network sends request to the web server and the server responds with the requested information or the file. Figure 6 shows the message exchange process in client-server architecture. Client-server architecture is illustrated in figure 7. Figure shows that there is a scalability issue in client-server model, i.e. with the increase in the number of client work load on the server also increases; hence system becomes slow which results in degradation of system performance. Fig. 1 Client-Server Interaction P2P Architecture The alternative to client-server approach is P2P technology. In P2P architecture, file is directly sent to few clients in the network, the remaining other clients can then download the file from those clients. Each time the client download the file, the file is replicated in the network i.e. the number of resources increases within the network. The process of file sharing is made even faster by dividing the file into chunks and distributing these chunks among clients in the network, other clients can download these chunks simultaneously by connecting to different clients parallel. P2P system is defined as the sharing of computer resources and services by direct exchange between systems [15]. P2P can be categorized into two groups classified by the type of model: pure P2P, and hybrid P2P. Pure P2P model: does not have a central server. Hybrid P2P model: employs a central server to obtain meta-information such as the identity of the peer on which the information is stored or to verify security credentials. In a hybrid model, peers always contact a central server before they directly contact other peers. Client - Server Architecture Client-server is a traditional way of file sharing over internet. For example website, in which, a client Fig. 2 Peer-to-Peer Architecture 2.1 P2P Networks Topologies In P2P network, file transfers between peers are done directly between the peer sharing the file and the 1979
3 peer requesting for it. P2P file sharing networks can be classified into four basic categories: the centralized, decentralized, hierarchical and ring systems. Complex system is made by combining the existing system, called hybrid system. Authorities (CAs) that certify the validity of an entity on the Internet [16]. The root CA can actually delegate some of its authoritative rights to companies that subscribe to it, so that those companies can, in turn grant certificates to those that reside underneath it [16] Centralized Centralized topology is based on the traditional client/server model in which a centralized server manages the files and user databases of multiple peers that log onto it. The client contacts the server to inform it of its current IP address and names of all the files that it is willing to share. The information collected from the peers will then be used by the server to create a centralized database dynamically, that maps file names to sets of IP addresses. Fig. 3 Centralized Topology Decentralized In decentralized architecture there is no centralized server. All the peers are connected with each other forming an unstructured network topology. To join the network, a peer must first contact a bootstrapping node that is always online. Bootstrapping node gives the joining peer the IP address of one or more existing peers. Each peer, however, will only have information about its neighbouring peer. Gnutella is an example of decentralized topology. Fig 5 Hierarchical Topology Ring It consists of a group of machines which act as a distributed server and they are arranged in the form of a ring. All machines in such system work together and provide better load balancing and higher availability. This topology is used when all the machines are close to each other on the network, for example network owned by an organization; where anonymity is not an issue. Fig 6 Ring Topology 3. Proposed System Fig. 4 Decentralized Topology Hierarchical This topology is suitable for systems that require a form of governance that involves delegation of rights or authority [16]. An Example of a system that makes use of the hierarchical topology is the Certification The main title (on the first page) should begin 1-3/8 inches (3.49 cm) from the top edge of the page, centered, and in Times 14-point, boldface type. Capitalize the first letter of nouns, pronouns, verbs, adjectives, and adverbs; do not capitalize articles, coordinate conjunctions, or prepositions (unless the title begins with such a word). Leave two 12-point blank lines after the title. 1980
4 3.1 System Overview The system is mainly divided into different modules and the task of file sharing is evenly divided into these modules. If a user wants to join the network it has to register itself into the network. After registration the user should login using the user id and password to join the network. The whole task of registration and login is managed by the authentication server. After successful login the tracker server will respond with the list of available file in the network. The client will select the file from the list which he wants to download and send it to the tracker server, now the tracker server will respond with the list of live nodes or peers having the particular file. Now, after getting the node information the client will make the connection with any of the node given in the list and request for the file and the process of file transfer begins. The file will be divided into smaller chunks and these chunks of files will be delivered to the client. The client can make connection with more than one node simultaneously and download the file. File server will inject a new file into the network, in this process the file will be placed in the shared directory of the file server in the network. Database is used to store client details, file details, node details etc. The identity of the user involved file sharing in the network is hidden i.e. the identity of user is not revealed either inside or outside the system network. 3.2 System Design As shown in the above figure, peer p1 is interacting with the authentication server for login process so that it can join the swarm and get access into the network. Other peers from are connected to each other in the network. Peers are also connected to the tracker server to get the updated list of files and active nodes in the network at regular time interval. The file server is connected to the network for injecting the new file into the network. File server do not interact with the peers directly. 3.3 System Architecture The system architecture consists of 5 modules. The modules include: 1) Server Module Authentication server is responsible for authenticating the client. Tracker server is responsible for providing the information about the live peers involved in the file sharing. File server is responsible for injecting the new file into the network. 2) Client Module responsible for connecting with the tracker server and retrieving the information about the live nodes, connecting with the other client and uploading and downloading the file. 3) Database Module responsible for storing and retrieving information about nodes and files available in the system (IP Addresses, port numbers, user IDs, File name, Metadata information etc.). 4) File Search Module responsible for storing and retrieving information about shared files in the system (filename, host sharing file, local file information for file transfers, etc. 5) File Transfer Module responsible for both serving requested files stored at a local node and initiating requests to remote nodes for files. 3.4 Server Module Server module is divided into three sub module depending on the task that they have to perform. Fig 7 Proposed System Design Authentication Server It performs the initial step of identifying the valid user and allowing him to join the network. The task of this server is to manage the user information, to permit login access to user and to register new user into the network. All user information detail is handled by the authentication server. 1981
5 3.4.2 Tracker Server It helps the user to join the swarm by providing him the list of files available into the network and the list of nodes involved in the transfer of particular file. It reduces the overhead of searching for the file in the network File Server File server inserts the file into the system. It is the initial source of file, once the file is inserted into the network the client downloading the file can become the source of the same file for other clients. 3.5 Client Module Client will login in order to join the network with the help of authentication server. Once the login is made successfully user communicates with the tracker server for file list as well as active node list for a selected file. Client makes connection with the active node and downloads the required file. Client can also share the file with the other requesting user/client. 3.6 Database Module Peer/Node database The node database stores all information necessary to join the network and create connections between users. This includes the IP address for each node, as well as the port number that a given node uses to accept new connection requests. Each node also has a user ID, a string representing a user name and password. The database also stores activity data of each and every node in the network. The node database provides following functionality: Adding a node to the database. Deleting a node from the system. Changing the state of nodes in the database when a user logs out. Retrieving the updated list of all nodes in the system. The node database communicates directly with tracker server and authentication server. Communication with the authentication server is done for peer/user login and registration process. The tracker server interacts directly with the node database to retrieve the list of active nodes in the network involved File database The file database stores all the information necessary to allow individual nodes to transfer files between them. This includes the file name, the user id of the node that has the file, the size of the file, hash value of the file to verify the integrity of the file. The file database provides following functionality: Adding a file to the database. Removing a file from the database. Retrieving a list of all files available in the network. Retrieving a list of all nodes serving a specified file. The file database communicates directly with tracker server and file server. The tracker server interacts directly with the file database to retrieve the list of active nodes in the network. File server will insert the file details when ever new file is injected into the network. 3.7 File Search Module Whenever a client wants to search for the file, he sends the file list request to the tracker server. The tracker server will respond with the updated list of files available in the network. The user can select the file from the list to download File Transfer Module Client can download a large file in parallel from several servers or several other clients simultaneously. User chooses a file from the list of files made available by the tracker server to the user and requests for the list of all active nodes for that file from file database. Tracker server will respond with the list of active nodes as well as the list of the file pieces and its details i.e. piece id, length, hash value etc required to identify the piece. The download task of the large file is divided into smaller sub-tasks (i.e. downloading chunks at a time). Client then attempts to establish simultaneous connections to number of nodes from the list of nodes passed to it. Once a number of connections are established, the client can download the chunks of file simultaneously from different connections. The details of chunks of files downloaded are maintained at user side. Downloading the file pieces simultaneously from different connections/nodes allows the file transfer process to distribute the load well amongst the nodes and enhances the performance by utilizing the resources to its maximum and faster downloading of the large files. 1982
6 4. Conclusion Recently, privacy has become scarce on public domain networks such as the Internet. Threats such as filtering, traffic shaping and large scale pervasive censorship schemes have left many users without refuge for securing their data as it is transmitted over these networks. While it is foolish to forecast the future as the privacy and security landscape is ever changing, the current trends in online privacy indicate that darknets will play a role as a last bastion for users who feel their right to privacy is threatened. In this research, design and flow of processes for the proposed peer to peer system for secure and efficient file sharing is developed. In this system, the functionality of client/server file sharing system and peer to peer file sharing system is combined to build up a file sharing system which will be fast and secure, maintaining the privacy of the user. 5. References [1] Biddle Peter, England Paul, Peinado Marcus and Willman Bryan, The Darknet and the Future of Content Distribution, ACM Workshop on Digital Rights Management. Washington, D.C.: Microsoft Corporation. 18 Nov [2] Conor Mc Manamon and Fredrick Mtenzi, Defending Privacy: The Development and Deployment of a Darknet, Dublin Institute of Technology, Ireland, IEEE [3] Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu and Keith W. Ross, BitTorrent Darknets, Polytechnic Institute of NYU, Brooklyn, NY Sun Yat-Sen University, Guangzhou, China, IEEE INFOCOM [4] Öznur Altintas and Niclas Axelsson, Combining Bittorrent with Darknets for P2P privacy. [5] Symon Aked, An Investigation Into Darknets And The Content Available Via Anonymous Peer-To-Peer File Sharing, School of Computer and Security Science, Edith Cowan University, Perth Western Australia [6] M. Eric Johnson, Dan McGuire and Nicholas D. Willey, The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users, Center for Digital Strategies, Tuck School of Business, Dartmouth College, Hanover NH 03755, Proceedings of the 41st Hawaii International Conference on System Sciences 2008 IEEE. [7] Megan Hoogenboom, The darknet as the new Internet A thesis about how a darknet like Freenet is much like the beginning of the public Internet and how it is involved in the future of the net, 1st june [8] Johan Andersson & Gabriel Ledung, Darknet file sharing application of a private peer-to-peer distributed file system concept, Uppsala university,department of Informatics and Media, Degree Project, 20 june [9] Ian Clarke, Oskar Sandberg, Matthew Toseland, Vilhelm Verendel, Private Communication Through a Network of Trusted Connections: The Dark Freenet. [10] Shruti Dube, Peer-to-Peer file sharing accross private network using proxy server, Department of computer science and engineering, Indian Institute of Technology, Kanpur, May [11] Jem E. Berkes, Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet, University of Manitoba Winnipeg, Manitoba, Canada, April 9, [12] Xiaowei Chen, Xiaowen Chu, Jiangchuan Liu, Unveiling Popularity of BitTorrent Darknets, IEEE Globecom [13] Stefanie Roos and Thorsten Strufe, A Contribution to Analyzing and Enhancing Darknet Routing, IEEE INFOCOM [14] Anjali Malekar and Neelabh Sao, Comparative Analysis of File Transfer Algorithms to Reduce Average Download Time in Peer to Peer Networks, International Journal of Computer Applications Technology and Research Volume 2 Issue 3, , [15] Kan, G., (2001), Gnutella, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, A. Oram (ed.), O Reilly Press, USA. [16] Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya, Peer-to-Peer Networks for Content Sharing, Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia. 1983
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Interoperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
A Success and Failure Factor Study of Peer-to-Peer File Sharing Systems. Christian Lüthold, Marc Weber
A Success and Failure Factor Study of Peer-to-Peer File Sharing Systems Christian Lüthold, Marc Weber Outline Setting Up the Stage Overview of File Sharing Systems Factors & Categories Conclusion Discussion
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
P2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross [email protected], {YongLiu, Panwar, Ross}@poly.edu, [email protected]
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
P2P File Sharing: BitTorrent in Detail
ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering [email protected] TG406 2
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. [email protected] Ms. Smita Dange Lecturer,
INSIDE. Malicious Threats of Peer-to-Peer Networking
Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Evolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.
THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.
Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal ([email protected]) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.
Avaya Solution & Interoperability Test Lab Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.0 Abstract These Application
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,
Impact of Peer Incentives on the Dissemination of Polluted Content
Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto [email protected] Virgilio Almeida [email protected] Cristiano Costa [email protected] Jussara Almeida [email protected]
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
What really is a Service?
Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to
Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure
Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure O. Ardaiz, F. Freitag, L. Navarro Computer Architecture Department, Polytechnic University of Catalonia,
Administering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Lightweight DNS for Multipurpose and Multifunctional Devices
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Peer-to-Peer File Sharing Across Private Networks Using Proxy Servers
Peer-to-Peer File Sharing Across Private Networks Using Proxy Servers by Shruti Dube DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY, KANPUR May 2008 Peer-to-Peer File Sharing
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
Peer-to-Peer Networks for Content Sharing
Peer-to-Peer Networks for Content Sharing Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering,
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Title: P2P Networks for Content Sharing
Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering,
Security White Paper The Goverlan Solution
Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful
Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Peer-to-Peer File Sharing
The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
10972B: Administering the Web Server (IIS) Role of Windows Server
10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Data Integration Hub for a Hybrid Paper Search
Data Integration Hub for a Hybrid Paper Search Jungkee Kim 1,2, Geoffrey Fox 2, and Seong-Joon Yoo 3 1 Department of Computer Science, Florida State University, Tallahassee FL 32306, U.S.A., [email protected],
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Virtual machine interface. Operating system. Physical machine interface
Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
The BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack
Retail Deployment Guide Microsoft Dynamics AX 2012 Feature Pack Microsoft Corporation February 2012 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
