Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Slides:



Advertisements
Similar presentations
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Advertisements

Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
© 2007 Cisco Systems, Inc. All rights reserved. Valašské Meziříčí Connecting to the Network.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Chapter 18. IP: Internet Protocol Addresses
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 2 Network Models.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
The OSI Model and the TCP/IP Protocol Suite
1 Pertemuan 7 Communication Protocols for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Chapter 2 Network Models.
The OSI Model and the TCP/IP Protocol Suite
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
TCP/IP Web Design & Layout January 23, TCP/IP For Dummies  The guts and the rules of the Internet and World Wide Web. A set of protocols, services,
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Tools of Web Development 1: Internet Protocols. Goals Understand what a protocol is. Understand how TCP/IP works. Understand how IP addresses work. Understand.
Common Devices Used In Computer Networks
The OSI Model and the TCP/IP Protocol Suite
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
TCP/IP Protocol.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications 1.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
Spring 2006Computer Networks1 Chapter 2 Network Models.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Presented by Rebecca Meinhold But How Does the Internet Work?
TCP/IP (Transmission Control Protocol / Internet Protocol)
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
BZUPAGES.COM 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
8/28/ Network Models - Lin 1 CPET/ECET Network Models Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 39 How Multicast IP and MBone Work.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
NETWORK DEVICES Department of CE/IT.
How Information Flows via the Internet By: Lee Farrell.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
K. Salah1 Security Protocols in the Internet IPSec.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Windows Vista Configuration MCTS : Advanced Networking.
Chapter 2 Network Models.
Anonymous Internet Protocols
Zueyong Zhu† and J. William Atwood‡
Introduction to Networking
ECEN “Internet Protocols and Modeling”
Firewalls Routers, Switches, Hubs VPNs
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cloud-Enabling Technology
Protocol Application TCP/IP Layer Model
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multicasting Unicast.
Presentation transcript:

Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED

Contents What is Darknet? Why use Darknet? How it works? Examples of Darknet Applications Conclusion Bibliography

What is Darknet? Darknet is a collection of networks and technologies used to share digital content. It is not a separate physical network but an application and protocol layer on existing networks. It is a private network where connections are made only between trusted peers. Unlike distributed peer-to-peer networks the sharing is anonymous as the IP addresses are not publicly shared. Sharing content over darknet is also known as Friend-Friend(F2F) sharing.

Why use Darknet? Anonymity on internet while retaining communication with large users is difficult. ISP allocated IP address can be used to locate the user, and to track network activity.

Why use Darknet? On the contrary, Darknet provides the following features:  Anonymity – Any content shared cannot be associated to a specific person.  Privacy – IP address is not publically shared over the network.  Trust – Content is shared between known peers.

How it works? Peering:  Darknet like internet are built on idea of peering.  The node is manually added to the list of nodes the application is allowed to connect and exchange information with. Anonymity:  A logical network is built upon the internets TCP/IP infrastructure.  Packets being sent into the network don’t use their machines IP addresses. Encryption:  The packet data is encrypted by the application multiple times along with the destination IP address.

How it works? Routing:  After joining the network, the packet is to be routed to the destination.  Different types of routing protocols can be used such as TOR(The Onion Router), BGP, etc.  There is no direct communication between source and destination peer’s.  Different routing algorithms can be used to forward the node to the destination.

Examples of Darknet Applications Bitblinder Freenet I2P Mnet anoNet Crowds P2PRIV

Conclusion Darknet is as dark as the intentions of the users. It provides a secure anonymous network for sharing files within the F2F network a.k.a friends. It uses non-standard protocols and ports for communication.

Bibliography Marc Seeger, The current state of anonymous file-sharing Amita A. Dwivedy, Secure File Sharing in Darknet Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, The Darknet and the Future of Content how-can-they-be-used-to-provide-security-and-anonymity-in how-can-they-be-used-to-provide-security-and-anonymity-in

Questions?