A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.

Slides:



Advertisements
Similar presentations
Dissemination-based Data Delivery Using Broadcast Disks.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
The BitTorrent protocol A peer-to-peer file sharing protocol.
Transaction.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Lapsy Garg. P2P Networks Gnutella Protocol Topological Scan Worms Passive Scan Worms Solutions.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Wide-area cooperative storage with CFS
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Stacey Greenaway Managing Reputation and Trust in Peer-to-Peer Networks. CP4022 Research Topics in Networks and Distributed Systems. Assessment 2 Stacey.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
Advanced Database Systems, mod3-2, Intrusion Detection.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Introduction of P2P systems
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
Freenet: Anonymous Storage and Retrieval of Information
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CS 268: Lecture 22 (Peer-to-Peer Networks)
Unstructured Routing : Gnutella and Freenet
Mobile P2P Data Retrieval and Caching
Presentation transcript:

A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan

P APERS….. N.Daswani and H.Garcia-Molina, “PONG – CACHE POISONING IN GUESS”, ACM Conference On Computer and Communications Security 2004 N.Daswani and H.Garcia-Molina, “PONG – CACHE POISONING IN GUESS”, ACM Conference On Computer and Communications Security 2004 E.Damiani, S.De Capitani di Vimercati, S.Paraboschi, P.Samarati and F.Violante, E.Damiani, S.De Capitani di Vimercati, S.Paraboschi, P.Samarati and F.Violante, “A REPUTION BASED APPROACH FOR CHOOSING RELIABLE RESOURCE IN PEER- TO-PEER NETWORK”, ACM Conference On Computer and Communications Security 2002

Introduction… What is Peer-to-Peer Network? A sharing and delivery of user specified files among groups of people who are logged on to a file sharing network. (1) Peer-to-Peer, or abbreviated P2P, a type of network in which each workstation has equivalent capabilities and responsibilities. (2) What is Resource Discovery? In a P2P network, discovery of the required file (resource) over the vast spread clients for downloading

“ PONG – CACHE POISONING IN GUESS ” N.Daswani and H.Garcia-Molina

Pong-Cache Poisoning In GUESS Proposes Policy On….. Resource Discovery that are resilient to attacks by Malicious Node Algorithms Proposed (Remodeling GUESS) Seeding Policy (SP) Introduction Protocol (IP) Ping Probe and Pong Choice Policy (PPP and PCP) Cache Replacement Policy (CRP) ID Smearing Algorithm (IDSA) Dynamic Network Partitioning (DNP) Malicious Node Detection (MND)

Gnutella UDP Extension for Scalable Searches (GUESS) Nodes Cache… Cache contains IDs of the available node in the network. Node are classified as  Good Node  Malicious Node ID’s are classified as  Live  Poisoned  Dead Cache Management.. Node’s cache are updated using the “PING” and “PONG” messages Ping: Query to the available Node’s Cache to find any new node added Pong: Reply to the Ping from the node’s cache of the updated network information

Threats to GUESS… What is Pong Cache Poisoning? Contaminating the good Node’s cache with the Malicious node’s ID. Pong cache Poisoning leads to… Denial of Service (DOS) A good node may query a malicious node, and may not receive a response Inauthentic Results Query a malicious node and may receive a incorrect answers to the query. Propagated Cache Poisoning A good node may respond to a ping with a malicious ID

We Modify the GUESS to…. Maximize the number of live node in the Pong cache To mitigate the Pong Cache poisoning Limit the number of cache entries with the malicious node ID Reduce the rate of poisoning occurs

Policies Introduced in GUESS… Seeding Policy (SP) Seeding is done when a new node wants to join the network Various Seeding Policies..  Random Friend (RF) – New nodes seeds its cache with a random nodes cache  Popular Node (PN) – New node seeds from a node N1, where N1 is a “popular” node  Trusted Directory (TD) – New node seeds from a node that guarantees to be a non-dead. A “Trusted Directory” node is responsible to maintain non-dead node’s list. Introduction Protocol (IP) Here new born node ping to an existing node’s so that the existing node makes update the new born node in its cache.  Note: SP should be used in tandem with IP to Achieve liveliness of the network.

Ping Probe and Pong Cache Policy Ping Probe Policy (PPP)  Used to decide which node to ping  It helps in identifying dead nodes Pong Cache Policy (PCP)  Determines to which |S| node id’s to respond for a ping operation  |S| - Subset of node IDs in the Pong cache Cache Replacement Policy (CRP) When pong arrives a subset of the cache is replaced with new pong IDs. Choices are done by Random Most Recently Used (MRU) Least Recently Used (LRU)  Note: MRU CRP reduces the poisoning rate

ID Smearing Algorithm (IDSA) When node ID repeats in many pong message, it implies  Node may be a malicious node  Good node that is overloaded In this case we drop that ID from the Pong cache. In IDSA a node ID can repeats itself in 1/n pong message. n – No: of nodes in the system.  Note: IDSA limits the no: of poisoned entries Dynamic Network Partitioning (DNP) In this we partition the network that enhances the search.  J-length of ID  Size of partition is 2 p : 0<=p<=j  No: of partition is 2 j-p  When j=p there is no need of DNP  Note: when DNP is used with IDSA it mitigates the poisoning

Malicious Node Detection (MND) We try to detect a node is malicious or not based on our previous experiences.  Note: MND is required where Malicious Node > Pong Cache Size. Modified GUESS…

“ A REPUTION BASED APPROACH FOR CHOOSING RELIABLE RESOURCE IN PEER-TO-PEER NETWORK ” E.Damiani, S.De Capitani di Vimercati, S.Paraboschi, P.Samarati and F.Violante

A REPUTION BASED APPROACH FOR CHOOSING RELIABLE RESOURCE IN PEER-TO-PEER NETWORK Paper Proposes… Reputation Sharing of a client by which resource requestor can assess the reliability of the resource offered. This achieved over the existing P2P protocol by piggybacking. Algorithm Proposes… Combined reputations of servant and resources which provides informative polling and overcomes limitation of servant based systems.

Servants and Resources Resources File shared over the network Servants - Nodes Servers when sharing resources Client when requesting for resources

XREP Protocol… Basic Assumption Require a servant to be associated with a servant_id, obtained using a secure hash function Resource identifier to be associated with the resource content (using hash function on the content) Experience Repositories Resource repository (resource_id, value)  Resource_id – specify the resource  Value – binary value specifying good or bad Servant repository (servant_id, num_plus, num_minus)  Servant_id – peer has associated with the servants  No: successful and unsuccessful downloads

XREP Protocol Phases… Resource Searching Resource Selection and Vote Polling Vote Evaluation Best Servant Check Resource Downloading

XREP Phases…

XREP Security Consideration Attacks on P2P Self Replication At any point of time a node can change it name or resource name. This is overcome by collecting votes on both the servant and the resource Man in the Middle Attack A -> D-> B  A – client  B – server  D – Malicious node This is overcome during the vote evaluation and best servant check phase.

XREP Security Consideration Attacks on Reputation based system Pseudo spoofing Exploits the use of pseudonyms  This is discovered in the Vote Evaluation Phase ID Stealth Malicious node generates multiple replies for a query with the stolen ID and its own ID  This is prevented in Best Servant Check Phase Another attack is that Malicious node stealing the Hash of a good resource  This becomes ineffective as the downloaded file hash does not match Shilling The attacker creates a multiple users with real IP address trying to influence the voting This invariably increases the cost for the attacker  This is made by the TrustVote/TrustVoteReply

Advantages of Combining Both Servant and Resource Reputations. Reputation’s Life Cycle Impact on peers anonymity Cold-start Performance Bottleneck Blacklisting Data Storage and Bandwidth requirements Threshold Effects

Thank You