Having Fun with P2P Keith W. Ross Polytechnic University

Slides:



Advertisements
Similar presentations
The Index Poisoning Attack in P2P File Sharing Systems Keith W. Ross Polytechnic University.
Advertisements

1 The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel Xiaojun Hei Keith W. Ross Nitesh Saxena Polytechnic.
Layered Video for Incentives in P2P Live Streaming
P2P Live Video Streaming Polytechnic University Brooklyn, NY
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
The BitTorrent protocol A peer-to-peer file sharing protocol.
Incentives Build Robustness in BitTorrent Bram Cohen.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
BitTorrent Join the swarm! BY: Joe Petruska. What is BitTorrent? a peer-to-peer file sharing protocol used for distributing large amounts of data.
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks Karim El Defrawy, Minas Gjoka, Athina Markopoulou UC Irvine.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Using Layered Video to Provide Incentives in P2P Live Streaming
DDoS Vulnerability Analysis of BitTorrent Protocol CS239 project Spring 2006.
A survey of BitTorrent study Jian Liang EL933 Prof. Yong Liu.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
1 Incentives Build Robustness in BitTorrent? Analysis on Bit Torrent Client performance By Jimmy Wong.
Measurement and Diagnosis of Address Misconfigured P2P traffic Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic Lab for Internet and Security.
Efficient Sub-stream Encoding and Transmission for P2P Video on Demand 1 Efficient Sub-Stream Encoding and Transmission for P2P Video on Demand Zhengye.
Can Internet Video-on-Demand Be Profitable? SIGCOMM 2007 Cheng Huang (Microsoft Research), Jin Li (Microsoft Research), Keith W. Ross (Polytechnic University)
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
1 V1-Filename.ppt / yyyy-mm-dd / Initials P2P content distribution T Applications and Services in Internet, Fall 2008 Jukka K. Nurminen.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
BitTorrent Under a Microscope: Towards Static QoS Provision in Dynamic Peer-to-Peer Networks Tom H. Luan*, Xuemin (Sherman) Shen* and Danny H. K. Tsang.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
1 P2P Computing. 2 What is P2P? Server-Client model.
Securing Data Authentication with Cryptographic Signatures in BitTorrent Du Wei cc.hut.fi / Supervisor : Professor Jukka Manner Instructor.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 PPSP Protocol Considerations.
MULTI-TORRENT: A PERFORMANCE STUDY Yan Yang, Alix L.H. Chow, Leana Golubchik Internet Multimedia Lab University of Southern California.
HUAWEI TECHNOLOGIES CO., LTD. Page 1 Survey of P2P Streaming HUAWEI TECHNOLOGIES CO., LTD. Ning Zong, Johnson Jiang.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
A Simple Model for Analyzing P2P Streaming Protocols Zhou Yipeng Chiu DahMing John, C.S. Lui The Chinese University of Hong Kong.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Flashback: A Peer-to-Peer Web Server for Flash Crowds Presented by Tom Batkiewicz CS 587x Fall ‘07.
2: Application Layer 1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April.
A P2P On-Demand Video Streaming System with Multiple Description Coding Yanming Shen, Xiaofeng Xu, Shivendra Panwar, Keith Ross, Yao Wang Polytechnic University.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
An example of peer-to-peer application
FairTorrent: BrinGing Fairness to Peer-to-Peer Systems
Introduction to BitTorrent
Di Wu Polytechnic Institute of NYU
Part 4: Peer to Peer - P2P Applications
Small Is Not Always Beautiful
The BitTorrent Protocol
Content Distribution Networks + P2P File Sharing
Pure P2P architecture no always-on server
Chapter 2 Application Layer
#02 Peer to Peer Networking
Content Distribution Networks + P2P File Sharing
Presentation transcript:

Having Fun with P2P Keith W. Ross Polytechnic University

Many Apps Migrating Client-Server to P2P File sharing File and patch distribution Live video streaming Video on demand VoIP Hybrid CDN/P2P

Today’s Talk P2P security –Is BitTorrent Unstoppable? Survey of P2P video streaming research –Creating an open P2P video streaming ecosystem Research supported by: NSF, Microsoft, Movie Labs, Huawei, Verizon, Panasonic, Len Shustek

Why study P2P Security? P2P is potentially more vulnerable than client server. Need to understand the security issues for architecting future P2P apps Attacks from entertainment industry reveal weak spots in P2P

Security work joint with: Jian Liang Rakesh Kumar Prithula Dhungel Di Wu Naoum Naoumov Xiaojun Hei

Earlier work on Kazaa and eDonkey FastTrack/Kazaa –Unstructured P2P network Overnet/Kad –Structured (DHT) P2P network –Part of eDonkey/eMule

File Pollution: Infocom 05 pollution company polluted content original content

File Pollution pollution company pollution server pollution server pollution server pollution server file sharing network

File Pollution Unsuspecting users spread pollution !

File Pollution Unsuspecting users spread pollution ! Yuck

Index Poisoning: Infocom 06 index title location bigparty smallfun heyhey file sharing network

Index Poisoning index title location bigparty smallfun heyhey index title location bigparty smallfun heyhey bighit

FastTrack Copies

Overnet Copies

Is BitTorrent Unstoppable? (IPTPS 2008; extended version available) How can record/movie companies limit piracy in BitTorrent? –Suing companies? –Suing users? –Internet attacks? How vulnerable is BitTorrent to attacks?

BitTorrent tracker: tracks peers in torrent; provides tracker list torrent: group of peers exchanging chunks of a file trading chunks peer torrent index server: search for torrents; provides.torrent file

BitTorrent Ecosystem Open protocol –50+ client implementations –Dozens of tracker implementations –Dozens of torrent location sites 5 million simultaneous users & growing Evolving: –Peer discovery: DHTs, gossiping –Proprietary protocols, private torrents

BitTorrent Basics Seeds and leechers File divided into 256KB pieces. Each piece is 16 blocks. –Download blocks and assemble pieces –Hash piece to check integrity Peers advertise pieces they have to neighbors Peer sends blocks to four neighbors currently sending it data at the highest rate And also to one random neighbor

Classes of BitTorrent Attacks Attacks against an existing torrent – against leechers – against initial seed – against peer discovery – against peer discover Decoy attacks: attacker creates own torrent –Seeding a polluted file –Seeding a file and delivering only 99%

Fake Block Attack Attacker establishes TCP connections with legitimate peers Peer downloads one fake block from attacker –and 15 good blocks from legit peers –Hash failure – download is prolonged Acknowledgment: Thanks to Vishal Misra for bringing this attack to our attention.

Simple analysis of fake block attack What is the probability of a hash failure? n = # neighbors advertising piece m = attack nodes (m < n) k = # neighbors from which it is downloading the 16 blocks

Probability of a clean piece 70% failure requires 20% attack neighbors γ increases for rare pieces and in end game

Connection attack Attacker establishes many TCP connections to each target peer. –Doesn’t upload any blocks –Chatty peer: keeps connection active with repeated BT handshake messages

Passive Measurements Collect traces while downloading –Azureus and uTorrent –DSL and Ethernet –54 downloads of “Foo Fighters” (108 MB) Developed parser to analyze BT trace To estimate download time without attack: –Obtain blacklist from torrentfreak.com –Use Peer Guardian to prevent connections to blacklisted peers

Azureus results Download is NOT being prolonged by more than 50% for DSL

Zoom in one Azureus trace Chatty-peers make up a major fraction of the useful peers.

Handshake messages sent by chatty peers

uTorrent

Zoom in on uTorrent trace

Passive Measurement Conclusions Anti-P2P companies applying different strategies for different BT clients Largely ineffective for Ethernet clients For DSL, download time increases by 30-60%

Active Measurements Crawl peers in torrent and identify –Fake-block attack peers –Chatty peers Looked at 8 box-office movie torrents –Some under attack; some not Crawler speaks Azureus protocol to Azureus peers –and conventional protocol to all other peers

Active Measurement Conclusions Several, but not all, top-box movies are under attack Published blacklists do not cover all the attackers in a torrent Most attackers enter through gossiping

Seed Attack “Nip in the bud” Make many connections to seed, download at high rate Rationale: Conventional algo gives all its bandwidth to 5 highest downloaders

Planet Lab experiments Put 30 leechers on PL nodes; upload capacity capped at 512 kbps Seed upload capacity 160 kbps –Azureus and uTorrent 0-60 attack peers Start seed, start 5 leechers, start attack peers, start 25 leechers

Seed attack results delayattacker bandwidth

BitTorrent Conclusions Attacks against leechers can prolong downloads –But is 50% enough? –Blacklists are helpful; adaptive blacklist is needed Seed is surprisingly resilient to attacks Attacks must be tailored to client types BitTorrent ecosystem is difficult to stop!

Today’s Talk P2P security –Is BitTorrent Unstoppable? Survey of P2P video streaming research –Creating an open P2P video streaming ecosystem Research supported by: NSF, Microsoft, Movie Labs, Huawei, Verizon, Panasonic, Len Shustek

Live Streaming: Faculty Collaborators Professor Yong Liu Professor Yao Wang Professor Shiv Panwar and Professor Nitsesh Saxena (CS)

obtain list of peers trade chunks tracker peer Basic idea P2P live streaming Source of video

PPLive: Chinese New Year 2006

@ Polytechnic Infrastructure for measuring P2P live video systems –Xiaojun Hei, Jian Liang, Yong Liu Stochastic modeling of P2P live streaming –Rakesh Kumar, Yong Liu Incentives and scalable video for live P2P streaming –Zhengye Liu, Yanming Shen, Shiv Panwar, Yao Wang Security of P2P live streaming systems –Prithula Dhungel, Xiaojun Hei, Nitesh Saxena P2P VoD, Hybrid P2P-CDN –Angela Wang, MSR colleagues Developing our own live P2P video system –Master’s students

Open P2P Live Streaming Create an ecosystem for live streaming Need incentives –The more you upload the better the quality Layered video –Chunk-based –Substream-based Accommodate user generated content

Thank You !