State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center



Similar documents
Architecture de Réseaux et Dimensionnement du Trafic

Flow Analysis Versus Packet Analysis. What Should You Choose?

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

Analysis of traffic demographics in Broadband networks

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Bandwidth Management for Peer-to-Peer Applications

Testing Packet Switched Network Performance of Mobile Wireless Networks IxChariot

Early Recognition of Encrypted Applications

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

Lab Testing Summary Report

Peer-to-Peer Networks Organization and Introduction 1st Week

Controlling which applications can access network resources and the Internet

Solution of Exercise Sheet 5

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

An apparatus for P2P classification in Netflow traces

Firewall Testing Methodology W H I T E P A P E R

IxLoad-Attack: Network Security Testing

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

SECURITY & REAL-TIME APPLICATION INSIGHT

Telematics. 14th Tutorial - Proxies, Firewalls, P2P

P2P Traffic Manager. L7 Internet Security. IP Appliance Products

MPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center)

TECHNICAL CHALLENGES OF VoIP BYPASS

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

IPSec Virtual Private Networks Conformance and Performance Testing Sample Test Plans

Application Service Testing Enabling scalable delivery of layer 4-7 services

kp2padm: An In-kernel Gateway Architecture for Managing P2P Traffic

Introduction of Intrusion Detection Systems

Network Monitoring Using Traffic Dispersion Graphs (TDGs)

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

Peer-to-peer networking. Jupiter Research

Independent Test of Cisco's CloudVerse Solution Part II Cloud Intelligent Networks

Analysis of Network Packets. C DAC Bangalore Electronics City

Network Simulation Traffic, Paths and Impairment

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Cool Things Your Firewall Should Do. A firewall that blocks threats is only the beginning

Network Forensics Network Traffic Analysis

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Distributed Systems. 2. Application Layer

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

SonicWALL Unified Threat Management. Alvin Mann April 2009

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

The Broadband Service Optimization Handbook Chapter 3

Delivering Network Performance and Capacity. The most important thing we build is trust

EAGLE EYE IP TAP. 1. Introduction

Chapter 8 Network Security

White Paper. Application-layer security: Enabling the next generation of security services with application switching

Encapsulating Voice in IP Packets

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Introduction to Quality Assurance for Service Provider Network Functions Virtualization

ReadyNAS Remote White Paper. NETGEAR May 2010

Question: 3 When using Application Intelligence, Server Time may be defined as.

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

Mail Gateway Testing. Test Plan W. Agoura Rd. Calabasas, CA (Toll Free US) FOR.IXIA (Int'l) (Fax)

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

CDN and Traffic-structure

gateprotect Performance Test of xutm Appliances

Testing L7 Traffic Shaping Policies with IxChariot IxChariot

Networking for Caribbean Development

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

DDoS Vulnerability Analysis of Bittorrent Protocol

WHITE PAPER. Gaining Total Visibility for Lawful Interception

EXPLORER. TFT Filter CONFIGURATION

Computer Networks and the Internet

Enabling a Converged World. Testing Multiplay Networks

Lecture 28: Internet Protocols

VoIP Testing IxChariot

Server Load Balancing (SLB) Testing IxLoad

Server Load Balancer Testing

Bandwidth Aggregation, Teaming and Bonding

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Measurement Study of Wuala, a Distributed Social Storage Service

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Next Generation Firewalls and Sandboxing

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

Computer Networks - CS132/EECS148 - Spring

How To Analyse The Edonkey 2000 File Sharing Network

A Survey of Peer-to-Peer Network Security Issues

Kick starting science...

4 Delivers over 20,000 SSL connections per second (cps), which

Transcription:

State of the Art in Peer-to-Peer Performance Testing European Advanced Networking Test Center

About EANTC The European Advanced Networking Test Center (EANTC) offers vendor independent network quality assurance since 1991 EANTC Berlin, Germany Business Areas Test and certification of network components for manufacturers Network design consultancy and proof of concept testing for service providers Request for Proposal (RfP) support, acceptance testing and network audits for large enterprises and government organizations

Agenda 1. How much P2P traffic is out there today? 2. What categories of DPI detection solutions exist? 3. How is EANTC testing P2P filters? What are the key performance indicators? 4. What were the results of the InternetEvolution test?

P2P Internet Statistics Traffic Statistics Germany P2P Protocols in Germany BitTorrent 66% edonkey 29% Other 0% Gnutella DirectConnect 4% 1% df NNTP 0% Tunnel/ Encryption 0% FTP 1% E-Mail 0% IM 0% P2P 74% DDL* 5% VoIP/Skype 1% HTTP 11% Media Streaming 8% Source: ipoque Internet study 2007 * DDL: Direct download links of one-click file hoster like RapidShare.com or MegaUpload.com

P2P Detection Signature Based Each P2P protocol has its own mechanism to manage the P2P network and coordinate the traffic distribution P2P filter devices search for protocol specific pattern (signature) in each IP packet to identify P2P traffic Deep Packet Inspection (DPI) - once the signature is identified the detection reliability is high Encrypted P2P traffic is hard to identify with this method

BitTorrent Signature Example BitTorrent Signature

P2P Detection Behavior Based P2P software implements mechanism to avoid detection obfuscation (e.g. encrypted transfer) P2P traffic has specific behavior: Each client opens connections to many other clients file/tracker requests and file search (mostly not encrypted) File Search/Request (not encrypted). File Transfer (encrypted)

P2P Detection Behavior Based Some P2P filtering devices detect P2P based on the behavior Encrypted P2P protocols can be detected by behavior based filter, as you can see on our test results (published on Internet Evolution) Compared to the signature based filtering false positive rate could be higher (other application with similar behavior)

Detecting the Content, not the Protocol Not all P2P traffic contains copyright protected content P2P is also used to distribute open source material (software, documents) like Linux Not all music and video files are copyright protected Need for distinguish between copyright protected material and free material New filter solutions provide the capability to identify copyright protected material in file payload

Content Recognition How It Works Store new HASH & Copyright Protection Info P2P File HASH Database HASH known Yes No Signal Analysis Yes Drop/Filter protected content No No Filter Action Database with Signal Pattern of Protected Content

EANTC Test in In March 2008, Internet Evolution published first results of EANTC s independent performance and functionality test of P2P filter solutions 28 vendors invited, only 5 agreed to take part -> only under the condition that if they didn't like their results they could withdraw from publishing the results Three vendors exercised their veto right Only two vendors agreed with publication: Arbor/Ellacoya, based in the U.S. ipoque GmbH, a German vendor http://www.internetevolution.com/document.asp?doc_id=148803 http://www.eantc.com/test_reports_presentations/test_reports.html

EANTC Test Setup Up to 10 Gbit/s Up to 1 million TCP sessions Emulated 13 different P2P applications Emulated HTTP, FTP, SMTP, POP3, RTP

Test Bed Device under Test Core Routers Load Generators (Shenick, Ixia) Edge Routers Staged at EANTC lab, Berlin

Emulated P2P Traffic How it Works Real stateful TCP stack used by the traffic emulator P2P traffic pattern is captured during live operation of P2P clients and put into own TCP stack P2P Capture Remove IP & TCP header Add own TCP & IP header Test Flow DUT Real TCP Stack Operation (e.g. retransmit) P2P Traffic Emulator +

Shenick DiversifEye P2P Emulation Traditional Stateless L2/3 Packet blast model SYN ACK Shenick diversifeye TM Stateful L2-7 traffic Per Application Flow

Testing P2P Filtering - Throughput Maximum throughput of the DPI device : Large session numbers of different applications like P2P, WWW, email, and file transfers Does the DUT still have sufficient resources left? To forward large numbers of sessions without packet loss And without increased latency Application-layer traffic handling is an important metric Challenge is to perform real-time P2P session analyses Ability to handle a large number of unique flows is important

Testing P2P Filtering - Throughput Both Ellacoya and Ipoque showed excellent throughput Throughput [Mbit/s] 1.000 900 800 700 600 500 400 300 200 100 0 973 Arbor Ellacoya E30 922 Ipoque RPX-5G

Testing Recognition Accuracy P2P protocol recognition Accurate reports of application/bandwidth usage support service providers to take educated decisions regarding P2P traffic control Accurate P2P bandwidth regulation DPI filter is used to regulate P2P traffic in many cases Regulation means applying a bandwidth limit, not just blocking P2P traffic completely Regulation requires good detection capabilities only detected P2P sessions can be regulated

Testing Recognition Accuracy Good detection accuracy for the two major protocols BitTorrent and edonkey (95% market share) 100 Detection Efficiency [%] 80 60 40 20 0 Arbor Ellacoya E30 Ipoque PRX-5G BitTorrent edonkey Gnutella FastTrack FileTopia imesh WinMX MP2P SoulSeek DirectConnect

Testing Regulation Accuracy Similar results for both devices Accurate recognition is required to achieve good regulation results Regulation Accuracy (75% Regilation) 100 80 60 40 20 0 BitTorrent edonkey Gnutella FastTrack FileTopia imesh WinMX MP2P SoulSeek DirectConnect Regulation Efficiency [%] Ellacoya E30 Ipoque PRX-5G

Testing Detection of Encrypted Traffic Single intent of encryption/obfuscation is to prevent detection Some encrypted protocols were detected by both devices Encrypted Freenet & edonkey never detected Detection Efficiency for Encrypted Protocols Detection Efficiency [%] 100 80 60 40 20 0 BitTorrent edonkey Gnutella FastTrack FileTopia imesh WinMX MP2P SoulSeek DirectConnect Arbor Ellacoya E30 Ipoque PRX-5G

Outlook Market for P2P filtering grows (specifically in countries not dealing with NetNeutrality ) State of the art in DPI filtering advances fast Important to keep pace, improving test methodology in parallel EANTC continues to test DPI solutions for vendors and service providers

Thank You For Your Interest! For further information, please contact us: EANTC AG Einsteinufer 17 D-10587 Berlin Germany Phone: +49.30.318 05 95-0 Fax: +49.30.318 05 95-10 E-mail: info@eantc.de www.eantc.de