Peer-to-Peer Networks Status 2008 13th Week



Similar documents
Peer-to-Peer Networks Organization and Introduction 1st Week

Three short case studies

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

P2P Filesharing Population Tracking Based on Network Flow Data

PEER-TO-PEER NETWORK

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW

How To Analyse The Edonkey 2000 File Sharing Network

Multicast vs. P2P for content distribution

A Survey of Peer-to-Peer Network Security Issues

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

An Introduction to Peer-to-Peer Networks

Analysis of traffic demographics in Broadband networks

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

Detecting peer-to-peer botnets

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service

P2P File-sharing Traffic Identification Method Validation and Verification

Architectures and protocols in Peer-to-Peer networks

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

A Study on the novel tool to retort P2P security issues

Best Practices for Controlling Skype within the Enterprise > White Paper

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

P2P: centralized directory (Napster s Approach)

Controlling P2P File-Sharing Networks Traffic

Peer-to-Peer Systems: "A Shared Social Network"

Towards the Detection of Encrypted Peer-to-Peer File Sharing Traffic and Peer-to-Peer TV Traffic Using Deep Packet Inspection Methods

N6Lookup( title ) Client

Peer-to-peer networking. Jupiter Research

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

Privacy In Peer-to-Peer Networks

Network Performance Monitoring at Minimal Capex

Copyright (Infringing File Sharing) Amendment Bill further glossary of terms relating to File Sharing and the Digital Environment

Guidance Regarding Skype and Other P2P VoIP Solutions

COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Protecting the Infrastructure: Symantec Web Gateway

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Skype network has three types of machines, all running the same software and treated equally:

CSCI-1680 CDN & P2P Chen Avin

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

How To Use A Phone Over Ip (Phyto) For A Phone Call

CGHub Client Security Guide Documentation

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype

Ringling College of Art and Design

Architecture de Réseaux et Dimensionnement du Trafic

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

The new popular Internet communication tools and the risks for the company information system

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

DDoS Vulnerability Analysis of Bittorrent Protocol

OVERVIEW OF ALL VOIP SOLUTIONS

Peer-to-Peer File Sharing

Peer to Peer File Sharing and Copyright Infringement Policy

Peer-to-Peer Botnets. Chapter Introduction

Classifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) Ahmed Bashir

Unit 3 - Advanced Internet Architectures

AscenFlow - P2P Solution

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1

Eastlink Acceptable Use Policy

Higher Computing Networking 1

Information Searching Methods In P2P file-sharing systems

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

A Success and Failure Factor Study of Peer-to-Peer File Sharing Systems. Christian Lüthold, Marc Weber

Internet Security. Prof. Anja Feldmann, Ph.D.

VoIP P2P: breakthrought technology, lot of hype (after Skype) but which business impacts at the end?

Systems. P2P Principle. Definition of P2P. Grid scope

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

Client/server and peer-to-peer models: basic concepts

Copyright infringement in P2P networks and the role of deterrence technology.

Peer-to-peer Traffic: Impact on ISPs and Evaluation of Traffic Management Tools

Biological Sciences Computer Systems

Online music distribution Core-Edge Working Group Meeting, September 28-29, 2004 Natalie Klym Research Associate, MIT CFP

1. Discuss the e-commerce benefits that Skype brings to ebay as an integrated communication tool and secondly as a stand-alone business model.

From Centralization to Distribution: A Comparison of File Sharing Protocols

HollyShare: Peer-to-Peer File Sharing Application

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik

The Broadband Service Optimization Handbook Chapter 3

TECHNICAL CHALLENGES OF VoIP BYPASS

The Future of IP. As value shifts from connectivity to content

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

DC++ and DDoS Attacks

Network Applications

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

Methods & Tools Peer-to-Peer Jakob Jenkov

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Threats of P2P File Sharing Software

Equipment Needed. Connecting to the Internet

2015 Internet Traffic Analysis

STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

Multifaceted Approach to Understanding the Botnet Phenomenon

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis

Transcription:

Peer-to-Peer Networks Status 2008 13th Week Department of Computer Science 1

Peer to Peer Networks Situation 2008 2 2

Internet Traffic 1993-2004 3 3

Main Protocols 2004 Main protocols edonkey BitTorrent FastTrack Gnutella 4 4

P2P Share June 2004 Source: CacheLogic 5 5

P2P Share Germany 2007 Source: Ipoque 2007 6 6

P2P Systems Germany 2007 by Volume Source: Ipoque 2007 7 7

What Germans Download 2007 by Volume Source: Ipoque 2007 8 8

Global Internet Traffic 2007 Ellacoya report (June 2007) worldwide HTTP traffic volume overtakes P2P after four years continues record Main reason: Youtube.com P2P 37% gaming 2% non-http video streaming 3% Newsgroups 9% VoIP 1% rest 2% HTTP 46% 9 9

Popular P2P Networks Gnutella 1+2 Kazaa / Fastrack Mule / edonkey / Kademlia WinMX DC++ / DirectConnect Azureus / BitTorrent Less popular Ares Soulseek Mute - based on Ant Colony algorithm Freenet 10 10

Gnutella 2 Hybride structure nodes with high bandwidth become P2P super nodes super nodes provide P2P network like original Gnutella normal nodes connect to the super nodes as clients Used in FastTrack, Gnutella 2, Skype Advantage improved scalability, lower latencies Disadvantage clients can try to disable super node ability scalability limited 11 11

FastTrack Designed by Niklas Zennström, Janus Friies, Jaan Tallinn 2001 authors of Skype (P2P-Internet- Telefonie) Hybride P2P Network Super nodes with special tasks Software detects super node ability - e.g. no NAT server, more bandwidth, good network connection super node for lookup download by HTTP - from client to client (P2P) Software not open source official client contains malware client super node communication investigated by reverse engineering - malware free clients available (Kazaa lite) - clients provide no supernode features comunication between super nodes still unknown Ares by the same developers similar network - client: Ares Galaxy 12 12

E-Donkey Client server index structure Server - special server software e.g. Lugdunum, satanedonkey-server - provide upload - store index information Clients - several software clients - e.g. emule, Shareaza, MLDonkey, edonkey2000, Hydranode, Morpheus,... - allow downloads from multiple other clients - some clients provide mechanisms for fair sharing Discussion vulnerable for attacks - e.g. law enforcement, denial of service - in Feb 2006 Razorback2 server was confiscated by the Belgian police Napster like P2P network Sucessor Overnet was eliminated 2006 protocol still in use by a botnet 13 13

Napster Sucessors OpenNap Napster clone - by reverse engineering of Napster communication adds chatting tool several clients available star topology as in Napster WinMX started as OpenNap client adds hash code to Napster clone in 2001 most successful P2P network in Japan 2005 server farm was deactivated - and moved to Vanuatu Soulseek Napster like system adds features like - interest groups - chatting - wishing list allows only single server 14 14

Direct Connect Client-server network for indexing by NeoModus Inc. server provide channels channels can be secured by passwords - loophole against copyright laws clients connect to server and transfer data directly from peer to peer very popular in Scandinavia Server is bottleneck Client software DC++, MLDonkey, NeoModus Direct Connect, ShakesPeer,... Hub software Direct Connect Hub link, Hexhub, Open Direct Connect Hub, PtokaX,... 15 15

Skype Usage VoIP, video, chat, file transfer, audio and video conferences aims at a legal and free peer-to-peer communication platform Hybride Peer-to-Peer Network with super nodes by the creators of Kazaa Client-sever network for authentification and registration Obscurity layers software encoded communication encoded, possibly readable by Skype Reverse engineering of Skype failed so far Little information by Skype about internal structure privacy control security Popularity wide spread in private use companies and organizations are reluctant to grant the usage of Skype - because of security concerns 16 16

Legal Situation IAAL*: What Peer-to-Peer Developers Need to Know about Copyright Law, Fred von Lohmann, 2006 Direct Infringement end users share files without authorization of the copyright owner Secondary Infringement P2P tool maker Inducement - if copyright infringement by third party is supported by the tool - with intent Contributory infringement - knowingly contributes to another s infringement Vicarious Liability - direct infringement by somebody - and right and ability to control by tool maker - and direct financial benefit Defense strategies no direct infringement: All users are innocent software capable of substantial non infringing uses safe harbors for online service providers - notifies users of a policy to terminate accounts of infringers - copyright agent for legal notices - must act after notice - must not know about infringements - must not receive direct benefits from infringements 17 17

Companies using P2P Bittorrent, Kazaa Skype Microsoft, Intel, Sun Velocix, StratVantage, Loudcloud, Quiq, NextPage, Consilient, Sharman Networks, BlogAds, Octoshape, Joost, BigChampagne, Collanos, Vudu,... ISPs and networking companies like Verizon, France Telecom, Pando, Norwegian Telecommunication... investigate possible usages of P2P networks 18 18

Companies & Organizations Fighting P2P Users Fighting copyright regulations, e.g. Copyright Solutions - Blackwidow - P2P monitoring systems - monitors several systems Evidenzia - monitors Bittorrent and emule index files RIAA (Recording Industry Association of America) IFPI (International Federation of Phonographic Industry) Digital File Check - program disables P2P Networks legal actions against P2P servers and users Law Attorneys bulk legal notices ( Abmahnwelle ) search file-sharing networks for specific contents and send legal notices threatening law suits Internet Service Providers curb peer-to-peer traffic e.g. Comcast & Bell, Canada using deep packet inspection (DPI) Anagram inc. - by Lawrence Roberts - P2P traffic detection (without DPI) 19 19

Problems of Copyright Enforcement Automated detection and law enforcement Catherine Rampell, How It Does It: The RIAA Explains How It Catches Alleged Music Pirates, 2008 - Blackwidow from Copyright Solutions - Evidenzia Log in as fake user and collect IP addresses from other peers Problem: False positives Michael Piatek, Tadayoshi Kohno, Arvind Krishnamurthy, Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice provoked RIAA accusation by peers blackmailing non-active ( innocent ) IP addresses 20 20

Picknick at the Hochburg Friday 19.09.2008, 2 pm Departure 13:56 Metro station Freiburg-Messe Arrival 14:37 Metro station Kollmarsreute Hiking trip to Hochburg Arrival approx. 16:00 Picknick at the Hochburg Order drinks on the forum Delivered by car Bring your own food Later: hiking trip back to Kollmarsreute Picknick auf der Hochburg Wanderung Bahnhof Kollmarsreute Treffpunkt 19.09.2008 14:37 21 21

Peer-to-Peer Networks End of 13th Week Department of Computer Science 22