SP 5: Biologically Inspired Techniques for “Organic IT” Final Year Report Participants UniBO, UPF, Telenor, RAL Lead partner: Bologna (UniBO)

Slides:



Advertisements
Similar presentations
Approaches, Tools, and Applications Islam A. El-Shaarawy Shoubra Faculty of Eng.
Advertisements

SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
An analysis of Social Network-based Sybil defenses Bimal Viswanath § Ansley Post § Krishna Gummadi § Alan Mislove ¶ § MPI-SWS ¶ Northeastern University.
Scale Free Networks.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
CodeTorrent: Content Distribution using Network Coding in VANET Uichin Lee, JoonSang Park, Joseph Yeh, Giovanni Pau, Mario Gerla Computer Science Dept,
Modeling Maze Navigation Consider the case of a stationary robot and a mobile robot moving towards a goal in a maze. We can model the utility of sharing.
Cameron Dale and Jiangchuan LiuA Measurement Study of Piece Population in BitTorrent Introduction BitTorrent Experiment Results Simulation Discussion A.
On the Economics of P2P Systems Speaker Coby Fernandess.
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Overview Distributed vs. decentralized Why distributed databases
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Subgoal: conduct an in-depth study of critical representation, operator and other choices used for evolutionary program repair at the source code level.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
CSS-TW1 Cooperation in Selfish Systems incorporating TagWorld I Welcome! David Hales, University of Bologna.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
SP 5: Biologically Inspired Techniques for “Organic IT” Report for months Participants UniBO, UPF, Telenor, RAL Lead partner: Bologna (UniBO)
Towards Cooperative Self- Organized Replica Management Work in Progress David Hales, Andrea Marcozzi (University of Bologna) Giovanni Cortese (University.
Project funded by the Future and Emerging Technologies arm of the IST Programme Cooperation with Strangers David Hales Department of.
Example Department of Computer Science University of Bologna Italy ( Decentralised, Evolving, Large-scale Information Systems (DELIS)
Rationality meets the tribe: Some models of cultural group selection David Hales, The Open University Hales, D., (2010) Rationality.
Engineering with Sociological Metaphors: Examples and Prospects University of Bologna This work is partially supported by the European.
SLAC and SLACER: Simple copy & rewire algorithms for trust and cooperation in P2P David Hales, Stefano Arteconi, Ozalp Babaoglu University of Bologna,
SP 5: Biologically Inspired Techniques for “Organic IT” Plan for months Participants UniBO, UPF, Telenor, TILS presented by David Hales (UniBO)
Kavita Singh CS-A What is Swarm Intelligence (SI)? “The emergent collective intelligence of groups of simple agents.”
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Evolving networks for cooperation Dagstuhl CCT3 DELIS Workshop Sept 3rd-4th 2005 Presented by David Hales University of Bologna, Italy
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
You are all social scientists: you just don’t know it yet David Hales (University of Bologna, Italy) SASO 2007, Cambridge. Mass.
Emergent Group-Like Selection in a Peer-to-Peer Network ECCS Conference Paris, Nov. 16 th, 2005 David Hales University of Bologna, Italy
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Yongqin Gao, Greg Madey Computer Science & Engineering Department University of Notre Dame © Copyright 2002~2003 by Serendip Gao, all rights reserved.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
 Course Overview Distributed Systems IT332. Course Description  The course introduces the main principles underlying distributed systems: processes,
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
Socially Inspired Computing Engineering with Social Metaphors.
Evolving P2P overlay networks with Tags, SLAC and SLACER for Cooperation and possibly other things… Saarbrücken SP6 workshop July 19-20th 2005 Presented.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Cooperative Response Strategies for Large Scale Attack Mitigation D. Nojiri, J. Rowe, K. Levitt Univ of California Davis DARPA Info Survivability Conference.
Bitcoin is a cryptographic currency that has been in continuous operation over the last 3 years. It currently enjoys an exchange rate of $4.80 (as of April.
Simple Rewire Protocols for Cooperation in Dynamic Networks David Hales, Stefano Arteconi, Ozalp Babaoglu University of Bologna, Italy Bio-Inspired Workshop,
Evolving Specialisation, Altruism & Group-Level Optimisation Using Tags – The emergence of a group identity? David Hales Centre for Policy Modelling, Manchester.
Evolving Specialisation, Altruism & Group-Level Optimisation Using Tags David Hales Centre for Policy Modelling, Manchester Metropolitan University, UK.
Evolution of Cooperation in Mobile Ad Hoc Networks Jeff Hudack (working with some Italian guy)
Novel Models of Group Selection in Social Structures and Networks David Hales University of Bologna, Italy In collaboration with: Stefano.
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
Extending wireless Ad-Hoc
Zueyong Zhu† and J. William Atwood‡
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Web *.0 ? Combining peer production and peer-to-peer systems
Evolution for Cooperation
Research Scopes in Complex Network
CASE − Cognitive Agents for Social Environments
Kick-off meeting University of Paderborn 18-19th March 2004
Group Selection Design Pattern
Kick-off meeting University of Paderborn 18-19th March 2004
Evolution for Cooperation
Spectrum Sharing in Cognitive Radio Networks
Presentation transcript:

SP 5: Biologically Inspired Techniques for “Organic IT” Final Year Report Participants UniBO, UPF, Telenor, RAL Lead partner: Bologna (UniBO)

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 SP5 Initial Goals Identify desirable, life-like properties of large-scale information systems. Investigate results from experimental and theoretical biology explaining the mechanisms underlying these properties, identifying areas with potential engineering applications. Design algorithms for specific information system functions such as network design and optimization, self-repair and management, information sharing and search, routing. Test algorithms in simulation environments. Investigate optimal strategies for collaboration between human engineers and artificial systems during the design process

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 SP5 Overall Achievements Application and development of “group selection” approach Copy and re-wire algorithm in P2P to reduce free riding Applied to various simulated P2P domains Towards a “design pattern” or “design approach” for info. systems. Empirical analysis and modelling of software development Open source code evolution Open source developer social network evolution Fundamental evolutionary theory of complex networks Emergence of modularity evolutionary tinkering and degeneracy

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 SP5 wider academic impact Involved in organising several workshops and conferences promoting the self-* / bio- socio-inspired approach (self-*, esoa, ece, sic, mabs, css-tw1, saso) SASO2007, a new IEEE conference was a significant success organised at MIT in July. Next conference in late 2008, Venice Many invited talks

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 SP5 activities in 2007 Empirical analysis and modelling of non-local evolution of open source programmer networks (D5.2.5) Applications (D5.3.2): Group selection inspired secure gossip P2P sampling service Towards an improved Bittorrent Firefly-inspired synchronisation in P2P overlay networks Multi-level selection (D5.4.3): Towards a group selection design pattern Multi-level structures in software and networks

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Secure Peer Sampling Service Identifying Malicious Peers Before It’s Too Late: A Decentralized Secure Peer Sampling Service Jesi, G., Hales, D., van Steen, M. (2007)

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Secure Peer Sampling Service Many proposed P2P protocols rely on a peer sampling service (PSS) The PSS provides a random node from the entire network One decentralised PSS method is to use Gossiping Nodes maintain a bounded list or view containing links to other nodes Periodically a random link is chosen and both nodes exchange view information It turns out that such an approach can give good results approximating random sampling and keeping the network connected But the approach is vulnerable to certain kinds of malicious attacks One such attack, termed here the “hub attack”, we attempted to address

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Secure Peer Sampling Service Hub attack involves some set of colluding nodes always gossiping their own ID’s only This causes a rapid spread of only those node links to all nodes in the network - we say their views become “polluted” At this point all non-malicious nodes are cut-off from each other The malicious nodes may then leave the network leaving it totally disconnected with no way to recover Hence the hub attack hijacks the speed of the Gossip approach to defeat the network

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Secure Peer Sampling Service

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Secure Peer Sampling Service Solution: Maintain multiple independent views in each node During a gossip exchange measure similarity of exchanged views With probability equal to proportion of identical nodes in two views reject the gossip exchange and blacklist the node Otherwise, whitelist the node and accept the exchange Apply an aging policy to to both white and black lists When supplying a random peer to API select the current “best” view

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Secure Peer Sampling Service

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Improved BitTorrent Multi-Swarm Dynamics for Fairness in BitTorrent. Picconi, F., Arteconi, S. (forthcoming)

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Improved BitTorrent BitTorrent uses a form of tit-for-tat to share files in a distributed way A shared file is distributed via a BitTorrent P2P swarm This enforces some degree of fairness But slow or hacked selfish clients (e.g. BitTyrant - Washington, BitTheif - ETH) exploit fast good guys By harnessing multi-swarm dynamics it should be possible to limit this form of exploitation Nodes stay in swarms that offer “fair” returns and leave swarms that offer “unfair” returns

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Improved BitTorrent

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Group Selection Design Pattern Towards a Group Selection Design Pattern Hales, D., Arteconi, S., Marcozzi, A., Chao, I. (2007)

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Group Selection Design Pattern A number of novel “group selection” models are coming from theoretical biology and computational social science We gave initial work towards a “group selection” design pattern or approach for creating cooperative distributed systems We presented a number of previous simulation models that use the approach in the form of a standard design template: Tag, Filesharing, Grid VO’s, Broadcasting, Content replication There are still open issues

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Group Selection Design Pattern Assumptions: A system is composed of individual entities that can benefit from interaction with other entities The population of entities is partitioned into groups such that interaction is mainly limited to entities within the same group Entities measure their own performance periodically producing a utility value Entities may spontaneously change their behavior and group membership Entities may view and copy some state of other entities Entities desire to increase their performance (utility)

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Group Selection Design Pattern Key Aspects: Collective Goal - A desirable goal that the population of entities should attain. Group Boundary Mechanism - How an entity can locate and communicate with in-group members. Intra-Group Interaction - What kinds of utility effecting interactions an entity participates in with other in-group members. Utility Calculation Metric - How an entity calculates a utility value based on its individual goal and in-group interactions. Group Migration Mechanism - How migration between groups is performed.

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Group Selection Design Pattern Emergent Process: Entities are grouped in some initially arbitrary way Interactions between entities within groups determine entity utilities Based on utility comparisons between entities, and possibly randomized change, group memberships and interaction behavior (strategy) change over time Groups which produce high utility for their members tend to grow and persist as entities join Groups which produce low utility for their members tend to disperse as entities leave Hence group beneficial behavior tends to be selected

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Group Selection Design Pattern

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 Empirical OS developer analysis Empirical analysis and modelling of non-local evolution of open source programmer networks (D5.2.5)

UniBO, UPF, Telenor, RAL Biologically Inspired Techniques for “Organic IT”Subproject 5 SP5 Fini!