1 / 15 Attacks on Peer-to-Peer Networks Class Presentation CIS 510 – Peer-to-Peer Networking University of Oregon Christian Beckel Department of Computer.

Slides:



Advertisements
Similar presentations
Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies Michael.
Advertisements

Security Issues of Peer-to-Peer Systems February 14, 2001 OReilly Peer-to-Peer Conference Nelson Minar, CTO POPULAR POWER.
Peter R. Pietzuch Peer-to-Peer Computing – or how to make your BitTorrent downloads go faster... Peter Pietzuch Large-Scale Distributed.
Neighbour selection strategies in BitTorrent- like Peer-to-Peer systems L.G. Alex Sung, Herman Li March 30, 2005 for CS856 Web Data Management University.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
A Robust and Efficient Reputation System for Active Peer-to-Peer Systems Dominik Grolimund, Luzius Meisser, Stefan Schmid, Roger Wattenhofer Computer Engineering.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
On the Economics of P2P Systems Speaker Coby Fernandess.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Incentive-based Schemes Smita Rai ECS289L. Outline Incentives for Co-operation in Peer-to- Peer Networks. Incentives for Co-operation in Peer-to- Peer.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
CS 554. Peer-to-Peer Systems Faithfulness in Internet Algorithms Haridimos Kondylakis
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Introduction Widespread unstructured P2P network
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
Gnutella2: A Better Gnutella?

PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Towards Scalable and Robust Overlay Networks Christian Scheideler Institut für Informatik Technische Universität München Baruch Awerbuch Dept. of Computer.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
The Design of A Distributed Rating Scheme for Peer-to-peer Systems Debojyoti Dutta 1, Ashish Goel 2, Ramesh Govindan 1, Hui Zhang 1 1 University of Southern.
Ivan Osipkov Fighting Freeloaders in Decentralized P2P File Sharing Systems.
SPAM DETECTION IN P2P SYSTEMS Team Matrix Abhishek GhagDarshan Kapadia Pratik Singh.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
1 Maze A Hybrid P2P file sharing system Design by Networking and distributed System lab at Peking University Presenter:Elaine.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
An Evaluation of Routing Reliability in Non-Collaborative Opportunistic Networks Ling-Jyh Chen, Che-Liang Chiou, and Yi-Chao Chen Institute of Information.
The EigenTrust Algorithm for Reputation Management in P2P Networks
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Peer-to-Peer Networks 15 Game Theory Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
P2P Storage/Bandwidth Sharing: Fairness and Security.
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems 7 th.IEEE International Conference on Peer-to-Peer Computing Cristiano Costa,
POPULAR POWER Security Issues of Peer-to-Peer Systems
Early Measurements of a Cluster-based Architecture for P2P Systems
Determining the Peer Resource Contributions in a P2P Contract
Peer-to-Peer Information Systems Week 6: Performance
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

1 / 15 Attacks on Peer-to-Peer Networks Class Presentation CIS 510 – Peer-to-Peer Networking University of Oregon Christian Beckel Department of Computer and Information Science

2 / 15 Introduction ● Awareness of vulnerability ● Everybody can join the network ● Decentralized structure ● Fault tolerance ● General attacks ● Destroy the system ● Competitors, governments, music industry, bored people ● Rational attacks ● Exploit the system ● Personal benefits ● Colluded / single hop attacks

3 / 15 General Attacks ● DoS Attack ● Usually performed by a group of peers ● February 2000: $1.2 billion economic impact for Amazon, Yahoo!, CNN, eBay ● Centralized P2P Systems vulnerable ● Countermeasures ● Server farm ● Pure / Hybrid P2P

4 / 15 General Attacks ● Example: BitTorrent ● LokiTorrent attacked in 12/2004 [1] ● 100 Mbit connection down for 10 hours

5 / 15 ● Man-in-the-Middle Attack ● Originally a cryptographic attack ● Modify routing requests ● Corrupt files on their way ● Countermeasures ● Reputation scheme ● Signing Messages ● Hard to find out malicious node General Attacks

6 / 15 ● Example: CAN [2] ● 10,000 peers ● Modifying and dropping routing requests ● Intentionally / peer error ● 1 in 10 requests corrupted ● Countermeasures ● Multipath routing General Attacks

7 / 15 General Attacks ● File Pollution ● Music Industry pays Overpeer or Retsnap ● Damage audio files or destroy them ● Dangerous if peers leave their computer running ● Countermeasure: ● Reputation schemes ● Checksum ● Example:KaZaA ● More than 50% of recent popular songs are polluted [3] ● Vast majority intentional

8 / 15 Rational Attacks ● Selfish behavior ● Save bandwidth ● Earn credits ● Caused by rational actions ● Countermeasures ● Incentive solution to share resources ● Tit for Tat in BitTorrent ● Robustness important

9 / 15 Rational Attacks ● Example: Free-Riding on Gnutella [4] ● 70% of Gnutella users share no files ● 50% of responses returned by top 1%

10 / 15 Rational Attacks ● Zero-cost identities ● Peers avoid punishment ● Basis for other attacks ● Hard to distinguish new peers from whitewasher ● Punishing newcomers -> discourages new peers ● Generous to newcomers -> motivates whitewasher ● Goal ● Cooperate with good peers ● Defect bad peers ● Stranger Adaptive Strategy ● Cooperate with P(min{p s /c s },1) ● Policy that adapts to behavior of previous strangers

11 / 15 Rational Attacks ● Traitors ● Acquiring high reputation or stealing identity ● Turn into defective peers before leaving the system ● Duration of history important:

12 / 15 Rational Attacks ● False reports ● Influence credit assignment by faking reports ● Four scenarios where peers could lie [5] ● Providing service ● Increase personal reputation ● Solution: Proof of service ● Colluding peers -> economic countermeasure ● Receiving service ● Similar to above, punish receiver ● Not providing service ● Not receiving service ● Lowers other peer's reputation to increase the overall standing

13 / 15 Rational Attacks ● Proof of Service [6] ● Neither client nor server should be able to deny service ● p: provider ● r: receiver ● b i : file block

14 / 15 Rational / General Attack ● Sybil Attack [7] ● “One can have, some claim, as many electronic personas as one has time and energy to create” Judith S. Donath ● Virtual overlay of P2P systems ● Problems ● Redundancy ● Byzantine General Problem ● Biased reputation ● Solution ● True sybil-proof network needs central entity ● Otherwise:For what time period the network can be assumed to be not dominated by sybils with high probability

15 / 15 The End ● Conclusion ● Minimize possible damage caused by general attacks ● Design P2P network to be robust against rational attacks (up to a certain degree) ● Questions

16 / 15 References ● [1]: R. Lemos. BitTorrent servers under attack. CNET News.com, December ● [2]: T. Reidemeister, K. Böhm, P. A. S. Ward, and E. Buchmann. Malicious Behaviour in Content-Addressable Peer-to-Peer Networks. In CNSR, pages , ● [3]: J. Liang, R. Kumar, Y. Xi, and K. Ross. Pollution in P2P File Sharing Systems. In IEEE Infocom, March Miami, FL, USA. ● [4]: E. Adar and B. Huberman. Free Riding on Gnutella. Technical report, Xerox PARC, August ● [5]: M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust Incentive Techniques for Peer-to-Peer Networks. In ACM Electronic Commerce, ● [6]: J. Li and X. Kang. mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. In Proceedings of Annual Computer Security Applications Conference, pages , Tucson, Arizona, December ● [7]: J. Douceur. The Sybil Attack. In Proceedings of the IPTPS02 Workshop, Cambridge, MA (USA), March 2002.