Accountability and Resource Management in Higher Ed P2P David Molnar, Free Haven Project and ShieldIP, Inc.

Slides:



Advertisements
Similar presentations
Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies Michael.
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction.
Internet Online Safety How to have FUN and Stay in Control.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
How (not) to use your firewall Jurjen N.E. Bos Information Security Consultant.
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture XV: Real P2P Systems.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
S ELECTION OF WEB HOST AND WEB PAGE SYSTEM. W EB HOST stores all the pages of your website and makes them available to computers connected to the Internet.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Instant Gift Store, Inc. We specialize in Online Gift Certificate Sales for your business. We offer a program, an attached page to your website that allows.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Chapter 15 Designing Effective Output
Computer Concepts 2014 Chapter 7 The Web and .
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
Copyright © 2014 Pearson Education, Inc. 1 It's what you learn after you know it all that counts. John Wooden Key Terms and Review (Chapter 5)
1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
ADVANTAGES & DISADVANTAGES OF INTERNET STORAGE Advantage: Easy Access  Online storage websites are important to people who travel and don't always have.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
| E. Marocco, G. Canal VoIP Conference 2006, 26 th October P2PSIP for Communications in New Network Topologies Enrico Marocco Research Engineer
Data Structures & Algorithms and The Internet: A different way of thinking.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
Introduction. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Limiting Denial of Service Using Client Puzzles Presented by Ed Kaiser.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Case Study ProsperaSoft’s global sourcing model gives the maximum benefit to customers in terms of cost savings, improved quality, access to highly talented.
How To Automate At Least 80% Of Your Online Business With.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Advertising 1 *The red circles show the position of the keyframes on the timeline. What are banner and pop-up advertisements? 1 Answer Banner and pop-up.
Internet Safety Internet Safety LPM
1 LIZETTE PEREZ IS 440 FEBRUARY 21, 2008 Modeling/Markup Tools: Skrbl ConceptShare ImaginationCube 1.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Unit 9: Distributing Computing & Networking Kaplan University 1.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Introduction TO Network Administration
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Oman College of Management and Technology Course – MM Topic 7 Production and Distribution of Multimedia Titles CS/MIS Department.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
CREATE, IMPLEMENT AND ENJOY! Blogs,Wikis & RSS Readers.
Microsoft ® Outlook & Microsoft Exchange Delivering Value & Choice across PC, Phone, and Browser The Right Tool for the Job Delivering Value & Choice.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
Lecture XV: Real P2P Systems
Common Methods Used to Commit Computer Crimes
Internet Identity, Safety, & Security
Unit 4 IT Security.
Password Management Limit login attempts Encrypt your passwords
Sarang Nazari California State University, Los Angeles
Peer to Peer networks and Performance
Unit# 5: Internet and Worldwide Web
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Accountability and Resource Management in Higher Ed P2P David Molnar, Free Haven Project and ShieldIP, Inc.

25 Minutes  Show Problems  Approaches and Tools  Example Applications  Why You Should Care!  What to Watch – Where Next

P2P Problems  Too much bandwidth! (Napster)  File sharing fills with “garbage” Intentional – “fake” songs Unintentional – searching doesn’t work  “Free Riding”  Misbehaving Clients

Resource Management Accountability  Lesson – P2P won’t save you!  Cornucopia and Tragedy of the Commons  Resource Management – prevent resources from being “abused.”  Accountability – prevent member from using “too many” resources without giving something back.

Two Approaches  Micropayments  Reputation Systems

Micropayments  Pay for Play!  Not necessarily “real” money.  Make attack “more trouble than it’s worth.”  Slow down DoS attack  Maybe get something useful on side?  Many many different embodiments We’ll skip the details; see P2P book chapter.

Micropayment Example: “Postage” against Spam In real life, Post Office charges money Online, “free”  “unlimited” spam Charge “postage,” limit spam Too hard to charge $$ online Solve “Medium-Hard” problems for postage Maybe use the solution for something else! Dwork & Naor “Pricing via Processing”, Back “hashcash”, Juels & Jakobsson “Bread Pudding Protocols,” camram mailing list

Micropayment Example: Protecting SSL Handshake  SSL = “Secure Sockets Layer”  Public-key handshake hard for server, but easy for client!  One laptop  DoS large server  Solution: force laptop to “pay” for handshake  Stubblefield & Dean “Client Puzzles and TLS” in USENIX 2001

Micropayment Example: MojoNation   Buy and sell services with “mojo” “swarm” download, better content distribution  Transition period Will Mojo ever be worth “real money?” Is Mojo just for “load balancing?” Will users accept micropayments?

Reputation Systems  Reputation as Everyday Concept Consumer Reports, book reviews, etc.  Pitfalls of Reputation Online Pseudospoofing – many identities, one “adversary” Erasing bad reps Shilling  How to Automate Reputation?

Reputation Example – Free Haven  Free Haven – content storage service  Servers have “reputations”  “Probationary period” – store for “free”  Server “loses” content  loses reputation  Idea: amount lost < total amount ever stored  Still researching details

Slashdot, AIM  Slashdot moderation system Frequent users annotate posts as “good”/``bad” Site displays aggregate of all votes  AIM “warn/block” system Buddy harasses you – warn ‘em Too many times – blocked

Pseudospoofing and Advogato  Pseudospoofing – many “identities” controlled by single adversary May shill for each other May pretend to attack each other  Advogato “trust metric” Create “trust graph,” find maximum flow from “trust source” to user. Pseudospoofing nodes have small flow from “trust source”  can’t “meaningfully” affect each other

Higher Ed P2P Why is Higher Ed special? More bandwidth Fluid user population (wireless coming…) “Bottleneck” bandwidth Early adopters on network What can P2P do for Higher Ed?

Example – Lecture Video  Watch lecture video on PC screen  P2P  no central video server  Issue: more popular class videos harder to find than less popular?  Issue: peers die in middle of serving video?

Example – Course Materials  Central web page  P2P access/storage  Students add course materials easily Old final exams, personal notes, links  Tools - wiki, P2P filesharing + naming, P2P groupware  Issues include moderation, DoS, “which is the real handout?”

Why You Should Care Designing new P2P systems? Can’t ignore these issues! Using existing P2P systems? Judge between systems. Manage a network? Encourage better P2P systems.

Things To Watch “Supernode” routing (KaZa/Morpheus) Content-aware routing Bandwidth-aware routing Consistent hashing (Chord) User Interfaces for picking P2P nodes

Where To Go Next  P2P-hackers mailing list Current technical P2P discussions.  Free Haven Project All the details I left out, recent work on reputations.  CiteSeer Indexes research papers like no one else.  O’Reilly OpenP2P.com