On the Penetration of Business Networks by P2P File Sharing
|
|
|
- Derek Randall
- 10 years ago
- Views:
Transcription
1 On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, UK. +44 () Danny Hughes Computing, InfoLab21, Lancaster University, Lancaster, UK. +44 () James Walkerdine Computing, InfoLab21, Lancaster University, Lancaster, UK. +44 () Abstract P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Because of these problems, the majority of businesses attempt to restrict the use of P2P software, but how successful have these measures been? This paper analyzes the degree to which business networks have been penetrated by P2P applications and shows that despite significant security risks, business networks participate significantly in P2P file-sharing systems. Furthermore, we find that participation is greatest amongst small businesses and that viral media has a significant effect on the participation of large businesses. 1. Introduction Today, peer-to-peer (P2P) file sharing systems are used by millions of users and generate the majority of Internet traffic [1]. Unfortunately, the use of P2P file sharing systems causes a number of serious problems for network administrators: Unpredictable Network Usage: Files available on P2P networks tend to be significantly larger than those available on the web and file popularity is highly concentrated and dynamic [2]. The confluence of these factors is that P2P applications generate large and unpredictable network loads that have the potential to swamp network links and interfere with critical Internet services. Security Threats: Viruses and Trojan-horse programs are widespread on P2P file sharing systems. Furthermore, P2P users have been observed accidentally sharing private files, including sensitive corporate information [3]. Danger of Legal Action: P2P file sharing systems are used to support a variety of illegal activities. The majority of files available on these systems are copyrighted and following the 25 ruling of the United States Supreme Court [4], access providers may be held responsible for copyright infringement offenses committed by their users. Because of the significant problems caused by P2P file sharing systems, most businesses restrict their use. However, identifying and blocking P2P traffic is difficult due to the large number of P2P protocols and their rapidly evolving nature [5], this is particularly problematic as recent research has shown that users are migrating towards P2P file sharing systems that are more anonymous and decentralized [6]. This paper analyzes the penetration of business networks by P2P file-sharing applications using a two week trace of the Gnutella network [7]. Gnutella is a popular decentralized file-sharing protocol with a large and wellstudied user base. While the participation of business networks in Gnutella cannot be considered to be truly representative of business participation in other P2P systems, our results may be viewed as generally indicative of levels of participation. Furthermore, as Gnutella is a long-established and well understood protocol, it is likely that system administrators are more successful at blocking traffic from Gnutella than from newer, more anonymous protocols [5], on which participation may be significantly higher than we observed. Our experiments show that, despite the severe security risks associated with P2P filesharing, business networks generate a significant volume of P2P traffic. Our experiments also indicate a strong link between the number of employees in a business and the likelihood of participation in P2P file-sharing networks. We find firstly that small businesses are more likely to participate in P2P file-sharing networks and secondly, that the participation of
2 larger businesses is highly dependent upon the effects of viral media. The remainder of this paper is structured as follows: Section 2 describes the Gnutella network. Section 3 describes the experiments that were performed. Section 4 presents the results of our experiments. Section 5 discusses directions for future work. Finally, section 6 concludes. 2. The Gnutella Protocol Gnutella is an open protocol which supports peer-topeer resource discovery. The protocol builds a hierarchical decentralized overlay network [8] in which each host is required to forward both resource discovery and network maintenance messages. The protocol uses just five message types as follows: PING is used in peer discovery. A peer receiving a Ping responds with a Pong message. PONG is a response to a Ping. It contains responding peer s address and the amount of data it serves. QUERY is a search message. If a peer receiving a Query has matching data, it generates a QueryHit. QUERYHIT is a response to a Query. It contains information required to acquire the requested data. PUSH is a mechanism to support downloads from fire walled peers. In addition, Gnutella is structured into three phases: connecting to the network; discovering resources; and transferring resources. 2.1 Connecting to the Gnutella Network Acquisition of an initial host address, used to bootstrap network entry occurs outside of the Gnutella protocol; typically via a GWebCache [7]. A newly-arriving peer connects to a peer discovered in this way by initiating TCP connections to that host. Incoming peers may connect to the network as leaf nodes which no not accept incoming connections, or ultra peers, which accept connections and are therefore responsible for routing a greater proportion of network traffic. Leaf nodes upload a list of the files they are sharing at connection time, allowing ultra-peers to proxy for leaf nodes as described in section 2.2. Following initial connection, further peers are discovered by broadcasting a PING message across the network. All peers that receive a PING message should respond by sending a PONG message, which is forwarded back along the path of the incoming PING to the originating peer. PONG messages contain the network address and port on which the sending peer is listening for incoming Gnutella connections and information regarding the amount of data and the number files this peer is making available to the network. 2.2 Discovering Resources To support file discovery, ultra-peers listen for incoming QUERY messages, and participate in their broadcast across the network by flooding them to each of their ultra-peer neighbors. Where a QUERY matches a file available on an ultra-peers leaf node, the QUERY message will be forwarded to that node. In this way, the bandwidth of leafnodes is conserved. If any peer is able to satisfy a QUERY, it should respond by sending a QUERYHIT message back along the path of the incoming QUERY. QUERYHIT messages contain the network address and port on which the responding peer is listening for HTTP file-transfer connections. QUERYHIT messages also include the speed of the peer s Internet connection, and a set of hits (matching file-names) which satisfy this QUERY. 2.3 Transferring Resources File transfer itself occurs outside of the Gnutella protocol. When a searching peer receives a QUERYHIT message, it can attempt to initiate a direct download from the target peer (whose port and IP address were specified in the QUERYHIT message) via HTTP. However, if the target peer is behind a firewall, the requesting peer can instead send a PUSH message to the target, containing details of the file requested and the network address and port to which the file should be pushed. On receiving a PUSH, the target peer establishes the HTTP connection and sends the file to the requesting peer. 3. Experimental Methodology In order to explore the penetration of business networks by P2P file sharing applications, we analyzed a two-week trace of traffic on the Gnutella network [7] gathered between the 3 th of March and the 12 th of April. Gnutella is a popular and open P2P file sharing protocol, with a large and well-studied user base. From this trace data, we isolated PONG connection messages and QUERYHIT search-response messages. We then resolved the IP addresses in these messages and isolated those messages which originated from businesses. Based upon this data, we were able to analyze the scale and characteristics of business participation in Gnutella. Section 3.1 describes our tracing methodology. Section 3.2 describes our data archiving and querying approach.
3 3.1 Tracing Methodology We used a passive application-level tracing methodology to gather our trace data as described in [1]. Passive application-level traces are performed by monitoring the messages passed at the application level. As all Gnutella peers participate in routing network maintenance and resource discovery messages, passive application-level monitoring can be performed simply and transparently by modifying a Gnutella peer to log the resource discovery and network maintenance messages that it is required to route. In order to support our experiments we modified the Jtella [9] base classes to implement a specialized monitoring peer. Our experimental work was based on intercepting and analyzing PONG and QUERYHIT messages on the Gnutella network. Both of these message types contain the IP address of originating peers and based upon this, it is possible to isolate those messages originating from businesses. Each PONG message originating from a business shows us that a peer within that network has connected to the Gnutella network as an ultra-peer and is allowing incoming connections. Furthermore, PONG messages contain the number of files that a peer is sharing, thus by comparing PONG messages from business networks to general PONG messages, it is possible to assess the relative level of participation of business networks. Each QUERHIT message originating from a business network essentially shows us that a Gnutella peer within that network has connected to Gnutella and is offering a file. This can be used to assess extent to which business networks are distributing files on Gnutella. Using our specialized monitoring client, we monitored Gnutella traffic over a two week period between March 3th and April 12th. We maximized the size and typicality of our sample base by connecting to the network as an ultrapeer [7], maintaining a large number of incoming and outgoing connections, and by periodically re-connecting to different areas of the network. All messages during this period were parsed and logged to an SQL database as described in section Data Archiving and Querying In order to ensure the flexibility of our trace data, all data that our monitoring peer routed during the test period was logged to an SQL database. This database contains a separate table for each message type and each piece of information stored in these messages has a separate field within these tables. Each table also contains three additional fields: time, country and owner. The time-field provides a per-message time stamp, while the country and owner fields are derived from the IP address by a separate resolution process, which operates as follows: For each message which contains and IP address, the database is firstly scanned. Where an IP address has been observed previously, the owner field will be set from existing records. Where an IP address has not been observed previously, a recursive WHOIS [1] lookup is performed to determine its owner. On average, this process was capable of identifying the owner of an IP address with a 91% success rate, with 9% being irresolvable, primarily due to the use of Network Address Translation (NAT) by participating peers. This methodology may only be used to identify businesses which administer their own IP range. It is not possible to separate those businesses which use standard ISPs to provide their Internet connection; however, it is exactly this group of businesses, where system administrators have most control over Internet access and thus where the question of P2P penetration is most critical. 4. Penetration of Business Networks by P2P The experiments performed in this paper firstly consider the scale of participation in P2P file sharing by users on business networks. Secondly, we explore the characteristics of this participation. Thirdly we explore the role of company size in the likelihood of participation. Finally, we discuss the significant effects of viral media on the penetration of business networks by P2P file sharing. Section 4.1 analyses the participation of business networks in Gnutella. Section 4.2 discusses the characteristics of P2P file-sharing traffic originating from business networks. Section 3.3 discusses the effect of company size upon this participation and Section 3.4 discusses the effect of viral media on company participation. 4.1 P2P Participation on Businesses Networks In order to explore the scale of business networks participation in P2P file sharing systems, we analyzed PONG connection messages generated throughout our trace. The owner field associated with each unique IP address was manually categorized as belonging to either a business or non-business network and the number of both categories of PONG message was extracted for each day. We logged a total of 712,659 PONG messages during our trace, an average of over 5, messages per day. Table 1 shows the number of PONG messages originating from business networks. Figure 1 shows this as a proportion of the total number of PONG messages observed.
4 Table 1 PONG Messages from Business Networks Date From Business Total Messages Proportion from Business Proportion of PONGs from Business Networks in significant numbers, this does not necessarily mean they will participate by actively sharing files. To analyze the extent to which business networks distribute files we also analyzed the level of free-riding on business networks Free-riding on Business Networks Anonymous peer-to-peer file-sharing networks such as Gnutella embody a social dilemma often referred to as the tragedy of the digital commons [11]. The dilemma for each individual is whether to contribute to the common good by sharing files, or to maximize their personal experience by free-riding (i.e. downloading files while not contributing any to the network). We measured the rate of free riding during our trace by analyzing the number of PONG messages which report no shared files. We found a significant level of free riding on both business and non-business networks. Figure 2 shows the rate of free riding on both business and non-business networks. Free Riding Proportion of Total PONGs (%) Wed 3th March Thu 31st March Fri 1st April Sat 2nd April Sun 3rd April Mon 4th April Tue 5th April Wed 6th April Thu 7th April Fri 8th April Sat 9th April Sun 1th April Mon 11th April Tue 12th April Figure 1 Proportion of PONG messages from Business Networks As can be seen from figure 1, business networks are responsible for a small, but significant proportion of PONG traffic on the Gnutella network. The proportion of PONG messages originating from business networks varied from a low of 1.5% on Wednesday the 3 th of March to a high of 6.8% on Tuesday the 5 th of April. The average proportion of PONG messages generated by businesses was 3.71%. As might be expected, PONG traffic from businesses was subject to significant day-of-week effects, with Sundays demonstrating a significantly lower than average volume of PONG messages: 2.9% on Sunday the 3 rd of April and 2.15% on Sunday the 1 th of April. While the proportion of PONG messages generated by business networks illustrates that they connect to Gnutella Free Riders (%) Wed 3th March Thu 31st March Fri 1st April Sat 2nd April Sun 3rd April Mon 4th April Tue 5th April Wed 6th April Business Networks Thu 7th April Fri 8th April Sat 9th April Other Networks Figure 2 Free Riding on Business Networks Sun 1th April Mon 11th April Tue 12th April We found an average level of free-riding of 96.7% and a level of 99.8% for business networks. This is in-line with existing studies, which have shown that the level of freeriding on Gnutella is significant and increasing, from 66% in 2 [11] to 85% [12] in 24. Our results show that since 24, free riding has continued to increase. Furthermore, as Figure 2 shows, we find that PONG messages originating from business networks consistently demonstrate a higher level of free riding than non-business PONG messages. This is most likely due to prohibitions against P2P file sharing in the work-place. Our trace data contains one anomalous result - the rate of free-riding on business networks dropped below that on
5 non-business networks on Thursday the 7 th of April. This was due to the effect of viral media, which is discussed in more detail in section Characteristics of Business Network Traffic In order to further explore the active participation of business networks in Gnutella, we analyzed QUERYHIT search-response messages generated throughout our trace. QUERYHIT messages with owners corresponding to business networks were counted on each day throughout our trace. We logged a total of 554,693 QUERYHIT messages during our trace, an average of over 39, messages per day. Figure 3 shows this as a proportion of the total number of QUERYHIT messages observed. Due to space constraints, the raw data is omitted. QueryHits Rank Ordering of QueryHits by Business Networks Rank Ordering of 72 Business Networks Proportion of Total QueryHits (%) Wed 3th March Proportion of QueryHits from Business Networks Thu 31st March Fri 1st April Sat 2nd April Sun 3rd April Mon 4th April Tue 5th April Wed 6th April Thu 7th April Fri 8th April Sat 9th April Sun 1th April Mon 11th April Tue 12th April Figure 3 Proportion of QUERYHIT messages from Businesses As Figure 3 shows, business networks account for a significant volume of search-response traffic an average of 4.69 percent per day. As was the case with PONG connection advertisements, QUERYHIT traffic from businesses networks is subject to significant day-of-week variations, with Sundays demonstrating a significantly lower than average volume of QUERYHIT messages: 1.68% on Sunday the 3 rd of April and.96% on Sunday the 1 th of April. Figure 3 shows that business networks contribute significantly to file distribution on Gnutella, we also investigated the distribution of QUERYHITs across unique business networks Figure 4 shows a rank ordering of the 72 unique business networks we observed generating QUERYHIT messages, sorted by the number of QUERYHITS that they produced. Figure 4 Rank ordering of QueryHits from Business Networks As can be seen from Figure 4, the extent to which business networks have been penetrated by P2P file sharing applications is highly asymmetric. The majority of businesses distribute very few files. Conversely, the majority of files are distributed by a very small number of business networks. 4.3 The Effect of Company Size We analyzed the effect of business size upon participation in the Gnutella network. Businesses were first categorized according to their number of employees. The number of businesses observed from each size category was then recorded for each day in our trace. This is shown in Figure 5 below. Businesses Observed Effect of Company Size on Participation in Gnutella Wed 3th Mar Thu 31st Mar Fri 1st Apr Sat 2nd Apr Sun 3rd Apr Mon 4th Apr 1 to 99 1 to Tue 5th Apr Wed 6th Apr Thu 7th Apr Fri 8th Apr Sat 9th Apr Sun 1th Apr Mon 11th Apr Tue 12th Apr Figure 5 The Effect of Company Size on Participation
6 As can be seen in Figure 5, small businesses participate most heavily in Gnutella, while the participation of large businesses is consistently and significantly lower, except in the case of Thursday the 7 th of April, on which date, business networks also demonstrated an anomalously low level of free-riding (see figure 2). To investigate these phenomena, we performed further analysis on QUERYHIT messages produced on this date and found that the sudden and dramatic increase in the participation of large companies (and likely the reduced level of free-riding) was due to the effect of viral media The Effect of Viral Media We analyzed QUERYHIT messages produced by large businesses on Thursday the 7 th of April and found that, remarkably, all of the large businesses which appeared in our trace for the first time on that date were distributing QUERYHITs for only one, identical file a viral video. The term viral media refers to media, particularly video files which suddenly become very popular and are distributed between Internet users in an epidemic fashion. The viral media that we identified was a short comedy video, (unfortunately, its title is unsuitable for reproduction here) which research revealed had become very popular during our trace. The effects of this viral video were startling: The number of large business networks distributing QUERYHIT messages jumped five-fold following its release, as can be seen in figure 5. This was similarly reflected by a notable drop in the level of free-riding, as people shared the viral video. This can be seen in figure 2. In keeping with the nature of viral videos, the popularity of this file was short-lived and all of the business networks which were observed for the first time distributing this file on April 7 th did not re-appear during the remainder of our trace. 5. Summary and Future Work This paper has discussed the security implications of participating in P2P file-sharing and has analyzed the scale and characteristics of P2P penetration of business networks using a two-week trace of the Gnutella network. We found that business networks are responsible for a small but significant volume of Gnutella traffic 3.71% of PONG messages and 4.69% of QUERYHIT messages. As one might expect, we found a higher rate of free-riding for peers on business networks and that traffic from such networks was subject to significant day-of-week variations. Furthermore, we find that small businesses are far more likely to host P2P applications and that the release of viral media can significantly impact the level of penetration of business networks. Future work will focus upon three key areas. Firstly we will explore how the real-world characteristics of businesses affect their penetration by P2P applications. In particular we wish to investigate impact of the domain of a business and its geographical location. Secondly, we wish to further explore the impact of the release of viral media. Finally, we intend to revisit our experiments on other P2P networks in order to validate the results reported here. 6. References [1] Monitoring Challenges and Approaches for P2P File Sharing Systems, Hughes D, Walkerdine J., Lee K., published in the proceedings of the 1st International Conference on Internet Surveillance and Protection (ICISP 6), August 26. [2] Measuring and Analyzing the Characteristics of Napster and Gnutella Hosts Saroiu S., Gummadi K., Gribble S. D., published in Multimedia Systems 9, pp , 23. [3] P2P File Sharing, OnGuard, available online at: [4] Metro-Goldwyn-Mayer Studios inc. et al. v. Grockster et al., U.S. 9 th circuit Supreme Court Decision, June [5] Accurate, Scalable Network-level Identification of P2P Traffic Using Application Signatures Subhabrata S., Spatscheck O., Wang D., published in the proceedings of the thirteenth international world wide web conference (WWW24), New York, USA, 24. [6] Is P2P Dying or Just Hiding?, Karagiannis, T., Broido, A., Brownlee, N., Faloutsos, M., In the Proceedings of Globecom 24, Dallas, U.S., December 24. [7] The Gnutella Protocol Specification v.6 : draft.html. [8] "Dependability Properties of P2PArchitectures,", Walkerdine J., Melville L. and Sommerville I., in the proceedings 2nd IEEE International Conference on Peer-to-Peer Computing (P2P 2), September 22. [9] The Jtella Gnutella Classes, available online at: [1] WHOIS Domain-Based Research Services, website: [11] Free Riding on Gnutella. Adar, E., Huberman, B., First Monday, October [12] Free Riding on Gnutella Revisited: the Bell Tolls?, Hughes D., Coulson G., Walkerdine J., published in IEEE Distributed Systems Online, vol. 6, no. 6, June 25.
7 available online at:
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
CS 360 Internet Programming
Peer-to-Peer Networking File Sharing, and Computer Science Brigham Young University 1 Peer-to-Peer File Sharing with Ultrapeers Overview Peer-to-Peer File Sharing with Ultrapeers peer-to-peer peers exchange
A Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
Interoperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Professor Yashar Ganjali Department of Computer Science University of Toronto. [email protected] http://www.cs.toronto.
Professor Yashar Ganjali Department of Computer Science University of Toronto [email protected] http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.
Peer-to-Peer Networks Organization and Introduction 1st Week
Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems*
Characterizing the Query Behavior in Peer-to-Peer File Sharing Systems* Alexander Klemm a Christoph Lindemann a Mary K. Vernon b Oliver P. Waldhorst a ABSTRACT This paper characterizes the query behavior
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
INSIDE. Malicious Threats of Peer-to-Peer Networking
Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
A reputation-based trust management in peer-to-peer network systems
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {
Counteracting free riding in Peer-to-Peer networks q
Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Clustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,
Clustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France Distributed Programming Laboratory, EPFL, Switzerland
2015 Internet Traffic Analysis
2015 Internet Traffic nalysis Computer Networks Sandvine s Global Internet Phenomena Report: https://www.sandvine.com/trends/global-internet-phenomena/ Lecture 8: Content Delivery Infrastructure: Peer-to-Peer
HollyShare: Peer-to-Peer File Sharing Application
HollyShare: Peer-to-Peer File Sharing Application ICS 243A Class Project Songmei Han Bijit Hore Ilya Issenin Sean McCarthy Shannon Tauro HollyShare Project: Final Report 1 INTRODUCTION...3 SURVEY...5 Architecture
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
Information Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
Peer-to-Peer File Sharing
The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive
Peer-to-Peer (P2P) applications, including both P2P streaming and P2P
Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce
Improving Gnutella Protocol: Protocol Analysis And Research Proposals
Improving Gnutella Protocol: Protocol Analysis And Research Proposals Igor Ivkovic Software Architecture Group (SWAG) Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers
Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:
Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications
Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications APPLICATION Peer-to-Peer (P2P) EXAMPLES AudioGalaxy, edonkey, BitTorrent, KaZaA, etc. USAGE Locate and exchange (swap) files.
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu
Towards a Peer-to-Peer Extended Content Delivery Network
Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
How To Analyse The Edonkey 2000 File Sharing Network
The edonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universität Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock,
Measurements on the Spotify Peer-Assisted Music-on-Demand Streaming System
The Spotify Protocol on the Spotify Peer-Assisted Music-on-Demand Streaming System Mikael Goldmann KTH Royal nstitute of Technology Spotify [email protected] P2P 11, September 1 2011 on Spotify Spotify
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University [email protected]
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
References and Requirements for CPE Architectures for Data Access
Technical Report TR-018 References and Requirements for CPE Architectures for Data Access March 1999 '1999 Asymmetric Digital Subscriber Line Forum. All Rights Reserved. ADSL Forum technical reports may
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
Live Traffic Monitoring with Tstat: Capabilities and Experiences
Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010 Outline Motivations Tstat - TCP STatistic
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.
TECHNICAL NOTE FORWARDING LOGS USING TAIL2SYSLOG MARCH 2013 The Tail2Syslog support script provides a method for monitoring and forwarding events to STRM using syslog for real-time correlation. Tail2Syslog
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
DNS and P2P File Sharing
Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:
Strategies for Effective Tweeting: A Statistical Review
Strategies for Effective Tweeting: A Statistical Review DATA REPORT Introduction 3 Methodology 4 Weekends Are Good for Relaxing and Tweeting 5 Best Days to Tweet By Industry 6 When Followers Are Busy Give
Proxy Services: Good Practice Guidelines
Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
Part-time Diploma in InfoComm and Digital Media (Information Systems) Certificate in Information Systems Course Schedule & Timetable
Certificate in Information Systems Course Schedule & Timetable Module Code Module Title Start Date End Date Coursework Final Exam PTDIS010101 Management Information Tue, April 16, 2013 Tue, 2 April 2013
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Academic Calendar for Faculty
Summer 2013 Term June 3, 2013 (Monday) June 3-4, 2013 (Monday Tuesday) June 5, 2013 (Wednesday) June 5-6, 2013 (Wednesday Thursday) June 6, 2013 (Thursday) July 3, 2013 (Wednesday) July 4, 2013 (Thursday)
ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays
ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING
International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
