Tracking of P2P Networks

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
CCNA – Network Fundamentals
Chapter 1 1.  Introduction to Networking  Fundamental Network Characteristics  Type and Sizes of Networks  Network Performance issues and Concepts.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Lecture Packets, IPs, and Domain Names Packet Switching at the core of TCP/IP Robert Kahn & Vint Cerf –Fathers of the Internet –Vint Cerf is currently.
TCP/IP Protocol Suite 1 Chapter 5 Objectives Upon completion you will be able to: IP Addresses: Classless Addressing Understand the concept of classless.
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing Fundamentals Internetworking Fundamentals Instructor: Abdirahman I. Abdi.
1 CS 4396 Computer Networks Lab The Internet. 2 A Definition On October 24, 1995, the FNC unanimously passed a resolution defining the term Internet.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Chapter 1 1.  Introduction to Networking  Fundamental Network Characteristics  Type and Sizes of Networks  Network Performance issues and Concepts.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
1 The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Proxy Servers.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Chapter 13 The Internet.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
1 The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Office 365 Performance Management. Meet Paul Andrew Office 365 Technical Product Manager – Office 365 datacenter, networking, identity management.
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Securing Access to Data Using IPsec Josh Jones Cosc352.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Network Devices and Firewalls Lesson 14. It applies to our class…
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
19 – Multimedia Networking
Virtual Private Networks
Graciela Perera Introduction Graciela Perera
Tor Good + Evil.
CONNECTING TO THE INTERNET
Network Security Analysis Name : Waleed Al-Rumaih ID :
Backdoor Attacks.
4 Network Layer Part I Computer Networks Tutun Juhana
Unit 5: Providing Network Services
Our Children and Social Media
Topic 6: Issues Press F5 to view!
Privacy Through Anonymous Connection and Browsing
Chapter 26: Network Security
Phillipa Gill University of Toronto
Обзор Windows Azure Connect
Configuring Internet-related services
Content Distribution Networks
Communications & Computer Networks Resource Notes - Introduction
A worldwide system of interconnected computer networks.
The Internet Introductory material.
Issues in Internetworking
Grid Systems: What do we need from web service standards?
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Tracking of P2P Networks Group 6 John Paul Kalapurakal Ronak Kamdar

Introduction P2P Networks Is someone tracking P2P Networks? Ad hoc networks Cumulative bandwidth Exploits diverse connectivity 2. Examples: Ares, BitTorrent, eDonkey etc 2. Is there someone tracking the P2P networks for illegal content sharing

Background and Motivation P2P What is it? Who uses it? What is it used for? How to monitor?

The Problem Statement How likely is it that a user will run into a fake user and thus run the risk of a law-suit? Understand the effort that content providers are putting into trawling P2P networks Justify the efforts of the P2P community to isolate “fake users”

Block List List of suspect IP address ranges of fake users Intention Provided by anti-RIAA software or security groups Intention Identify monitoring entities Who owns them? Government and corporate organizations Educational and internet advertisement firms Media Firms Not all block list IP addresses are monitoring users Assume worst case scenario

BOGON IPs IP blocks not allocated to ISPs and organizations plus all other IP block that are reserved for private or special use by RFCs Such IP Block should not be used or accessible on the internet Used by individuals that try to avoid being identified Used in activities such as DoS attacks, email abuse, hacking, and other security problems Cannot be monitored using IP-WHOIS lookup Most of the BOGON IP ranges point to either ARIN or RIPE IP ranges IP-WHOIS : Locate the operator employing the anonymous blocks ARIN – American Registry of Internet numbers RIPE – European IP networks

Test Bed PlanetLab 90 days Customized Gnutella client 50 Nodes Each client initiates 100 queries on music US – Hot 100 hits Europe – Top 50 hits Asia – Top 50 Hits Nodes made to switch between UP and leaf nodes. PlanetLab is a group of computers available as a testbed for computer networking and distributed systems research. It was established in 2002 and as of October 2007 was composed of 825 nodes at 406 sites worldwide.

Results Analyzed 100 GB of TCP Header 100% probability of P2P nodes running into entities 12-17% of all distinct IPs contacted by each node were blocklisted IPs

Results The top five blocklisted IPs ranges contribute to nearly 94% of all blocklisted IPs Avoiding these IP ranges can reduce probability to about 1%

Results Only about 0.5% of these blocklist IPs belong to media companies 71% of blocklisted IPs belong to government and corporate organizations Very little presence of media companies for tracking content However, the possibility of hiring other corporations to track users is not rules out

Results Geographical location does play a role in the number of blocklisted IPs contacted 1. There is geographical bias in tracking P2P users 2. There difference can be attributed to a. Difference in user behavior b. Local prevalence and difference in level of monitoring by entities.

Results Ultra peers and Leaf Nodes have equal probability of associating with blocklisted IPs with less then 5% variation Constantly switching nodes between UP’s and Leaf nodes UP’s are hit more in WC and Europe while Leaf nodes are hit more in EC and Asia

Results 99.5% of blocklisted IPs are BOGON IPs, commercial, educational, etc. 1. This is because the users are trying to conceal their identity

Related Work Anti-RIAA/MPAA software Enable programs to block computers owned by organization from accessing users of P2P networks Modeling and analysis of P2P systems based on performance metrics How is it different from this work? Anti software used to block organizations are now built into the applications Current work focuses on tracking the P2P networks as compared to performance metrics of P2P networks

Critique Next step is to analyze the accuracy and completeness of the blocklists, and the speed with which a new blocklisted entity is flagged The authors themselves present the next step which is to analyze … We feel that this information is necessary for the completeness of the paper

Summary and Conclusions A naïve user is practically guaranteed to be monitored Other factors Top five blocklisted IPs Geographical bias Equal opportunity trawling

Questions