The Challenges of Stopping Illegal Peer-to-Peer File Sharing



Similar documents
3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

Three short case studies

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures

Analysis of traffic demographics in Broadband networks

Peer-to-Peer Networks Organization and Introduction 1st Week

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Multicast vs. P2P for content distribution

P2P: centralized directory (Napster s Approach)

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center

Peer-to-Peer File Sharing

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Unit 3 - Advanced Internet Architectures

A Survey of Peer-to-Peer Network Security Issues

NETWORKS AND THE INTERNET

Chapter 32 Internet Security

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

PEER-TO-PEER NETWORK

CSCI-1680 CDN & P2P Chen Avin

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Internet Privacy Options

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Detecting peer-to-peer botnets

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Networks and the Internet A Primer for Prosecutors and Investigators

Bit Chat: A Peer-to-Peer Instant Messenger

Computer Networks & Security 2014/2015

DNS and P2P File Sharing

CISC 1600 Introduction to Multi-media Computing

Introduction Chapter 1. Uses of Computer Networks

Secured Voice over VPN Tunnel and QoS. Feature Paper

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

How To Use A Phone Over Ip (Phyto) For A Phone Call

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Monitoring the I2P network

From Centralization to Distribution: A Comparison of File Sharing Protocols

DDoS Vulnerability Analysis of Bittorrent Protocol

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Computer Networks and the Internet

File Sharing Without Consequences

Flow Analysis Versus Packet Analysis. What Should You Choose?

TOR (The Onion Router)

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

The Internet and Network Technologies

CS 494/594 Computer and Network Security

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Lecture 28: Internet Protocols

Kick starting science...

CGHub Client Security Guide Documentation

Sync Security and Privacy Brief

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

2015 Internet Traffic Analysis

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Methodology and implementation for tracking the file sharers using BitTorrent

Distributed Denial of Service Attack Tools

P4P: ISPs and P2P. Laird Popkin, Pando Networks Doug Pasko, Verizon Communications

Chapter 4: Networking and the Internet

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Computer System Management: Hosting Servers, Miscellaneous

PEER TO PEER FILE SHARING USING NETWORK CODING

Best Practices for Controlling Skype within the Enterprise > White Paper

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Application Layer -1- Network Tools

A Case Study on Measuring Statistical Data in the Tor Anonymity Network

SUITABLE ROUTING PATH FOR PEER TO PEER FILE TRANSFER

Attacks Against Peer-to-peer Networks and Countermeasures

Lecture 6 Content Distribution and BitTorrent

Playing Server Hide and Seek.

Protocols. Packets. What's in an IP packet

NAT and Firewall Traversal with STUN / TURN / ICE

Chapter 10. Network Security

SSL VPN Technology White Paper

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Guidance Regarding Skype and Other P2P VoIP Solutions

Study on Remote Access for Library Based on SSL VPN

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

The Algorithm of Sharing Incomplete Data in Decentralized P2P

How To Analyse The Edonkey 2000 File Sharing Network

Peer to Peer File Sharing and Copyright Infringement Policy

Transcription:

The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado

Context: The Rise of Peer-to-Peer 1993-2000: Early Internet saw mostly web traffic 2006-Present: P2P traffic now most common Source: CacheLogic Research 2006 2000: Peer-to-peer (P2P) protocols like Gnutella, FastTrack, Napster, & BitTorrent became popular for file sharing

Content Dissemination Models Traditional client/server model Users ( clients ) contact a centralized server to retrieve content (like a webpage) Peer-to-peer model Users ( peers ) contact each other to retrieve content Advantages: Decentralization, fault-tolerance, content availability, fast data dissemination Common applications: Streaming media, voice-over-ip (VoIP), and file sharing Client/server model P2P model

Current P2P Landscape P2P still most common protocol class today BitTorrent dominates P2P worldwide Source: Ipoque Internet Study 2008/2009

Sharing a File with BitTorrent To download the file: 1 Download the desired torrent file 2 Contact the tracker and obtain list of other peers Peer Who is sharing this file? 128.138.207.2, 182.203.21.4, Tracker server 3 Request pieces of file from the other peers I want piece #94 I want piece #23 Here s piece #94 Here s piece #23

What Type of Content is Shared? Source: Ipoque Internet Study 2008/2009

Copyright Enforcement Monitoring Investigations conducted by companies like Media Sentry & BayTSP have tried to identify illegal file sharers Investigative techniques: Query tracker server to obtain peer IP addresses Ping each IP address to ensure that it s alive Forward a DMCA take-down letter to each IP s ISP (or pursue legal action)

Identifying Users is Challenging Querying tracker lists can give many false-positives Trackers use a simple HTTP-based mechanism to register new peers; possible to register any arbitrary IP address Peer registration example: This URL registers an arbitrary IP A.B.C.D Source: Piatek et al. HotSec 08 Improvement: Actively participating in the file sharing may be a more accurate way to identify users

Identifying BitTorrent Traffic An ISP can identify BitTorrent application-layer header within packets in the network This is easy because BitTorrent typically operates in plaintext (no encryption) Possible to throttle or block BitTorrent traffic (i.e., Sandvine) BitTorrent is easy to identify: I want piece #94 Here s piece #94 I want piece #23 Here s piece #23 Countermeasure: Encrypt all peer communication; this is possible with message stream encryption (Diffie-Hellman key exchange + RC4 encryption)

Is Encrypted BitTorrent Common? Supported by popular BitTorrent clients like Vuze and µtorrent Source: Ipoque Internet Study 2008/2009 Protocol encryption cannot hide the file sharers identities This requires anonymity Protocol encryption may frustrate ISP s bandwidth throttling techniques However, traffic analysis based on packet sizes and timing may be used to identify traffic despite obfuscation

Tor: Anonymity for TCP Tor has become the most popular privacy enhancing system for enabling anonymous Internet communications Used widely to circumvent censorship, enable free speech, and promote democratic ideals worldwide Based upon a decentralized architecture Users forward their traffic through a set of Tor routers using a layered encryption scheme Each Tor router removes a layer of encryption At the final Tor router, the message is fully decrypted and can be delivered to its destination

Tor s System Architecture Client (Tor Proxy) Middle Router Exit Router Destination Server Entry Guard Virtual Circuit Directory Server Router list Tor provides anonymity for TCP by tunneling traffic through a circuit of three Tor routers using a layered encryption technique This could protect illegal file sharers from legal action/dmca take-down notices

Can BitTorrent Users Hide with Tor? Only 3.33%, but over 400,000 connections! We characterized how Tor is used in practice and observed significant BitTorrent traffic over a four day observation period

Can BitTorrent Users Hide with Tor? Nearly half of all Tor traffic! BitTorrent is using a disproportionate amount of bandwidth

Conclusion There s an arms race between P2P file sharers and ISPs/copyright holders The progression of tactics may reach a state where file sharers become completely anonymous and untraceable Anti-piracy strategies should focus on economic incentives (i.e., tiered bandwidth pricing, lower price content, etc.) to win this race Thank you Contact: kevin.bauer@colorado.edu