1 Where in the World is Carmen BitDiego? And who is she, anyways… Alexandru IOSUP The 12th annual ASCI Computing Workshop.

Slides:



Advertisements
Similar presentations
P2P Media Summit LA May 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
Advertisements

P2P Market Conference March 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
It’s here there and everywhere The Internet. in perspective in perspective The Internet is big. Bigger than the biggest thing ever.
The BitTorrent protocol A peer-to-peer file sharing protocol.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Akamai networks,48000 servers and 70 countries in the world.
1 Is Content Publishing in BitTorrent Altruistic or Profit-Driven? 梁懿.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
June 3, Correlating Topology and Path Characteristics of Overlay Networks and the Internet GP2PC’06, in conjunction with IEEE CCGrid2006 A. Iosup,
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture XV: Real P2P Systems.
One-Click Hosting Services: A File-Sharing Hideout Demetris Antoniades Evangelos P. Markatos ICS-FORTH Heraklion,
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 Chapter 9 The Internet in Business: Corporations, Businesses, and Entrepreneurs.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
File Distribution BitTorrents Mike Bohrer BitTorrents Mike Bohrer.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
Peer To Peer (P2P) And Torrenting James Jenkinson.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
The Bittorrent Protocol
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How VoIP and Skype Work.
1 One-Click Hosting Services: A File-Sharing Hideout Demetris Antoniades Evangelos P. Markatos ICS-FORTH Heraklion,
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Performance and Security of Internet Applications John Buten Manager, Enterprise Industries
1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
P2P For More Showcase Presentation Jessie Gardiner John Lasa Travis Sheppard April 29, 2010.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Skype P2P Kedar Kulkarni 04/02/09.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
Brussels, 18 th March, RURAL WINGS IP Network traffic and reliability evaluation for the Rural Wings project Final Test Runs results - D7.6 - Patricia.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Practical Use of the Internet By Jeremy Viegas. A Search Engine is like a Big Directory giving you links to websites on the internet computer program.
Multiclass P2P Networks: Static Resource Allocation for Service Differentiation and Bandwidth Diversity Florence Clévenot-Perronnin, Philippe Nain and.
P2P Traffic Localization by Alias Tracker for Tracker-based P2P applications (ATTP) draft-zhang-alto-attp-02 Yunfei Zhang China Mobile.
V IDEO D ISCUSSION 1: C OPYRIGHT AND P2P A PPLICATIONS 23 Sep DT052.
P2P: Grid-Oriented Distribution Systems KCCMG Fall Impact 2005 Lorin Olsen, Sprint Nextel.
An Overview of Peering; Benefits of Peering Andrew Ogilvie Managing Director, Xtraordinary Networks Ltd
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 78, July P2P Streaming for Mobile Nodes: Scenarios.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
1 workshop Barcelona, April 22, 2015.
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
IPv6 Matrix Project - Page 1 IPv6 Matrix Project Tracking IPv6 connectivity Worldwide Dr. Olivier MJ.
Traffic Localization with Information Guidance of Pseudo Peer Agent on BT-P2P Network 學生 : 楊宏昌 指導教授 : 曾黎明教授 在 BT 同儕通訊上利用參與者訊息引導對外流量之區域化節約.
Lecture XV: Real P2P Systems
Introduction to BitTorrent
What is the Internet? © EIT, Author Gay Robertson, 2016.
Tracking of P2P Networks
Get The Job Done.
(Parallel and) Distributed Systems Group
What is the World Wide Web (www)
Presentation transcript:

1 Where in the World is Carmen BitDiego? And who is she, anyways… Alexandru IOSUP The 12th annual ASCI Computing Workshop

2 Introduction (1 of 3) Peer-2-Peer File sharing Everybody has the same rights. P2P average everybody? Who? Where? When? How? Why? Tons of studies over the past 5 years Saroiu’02, Yazti’02, Yzal’04, Pouwelse’04 We go for something else! (tbs)

3 Introduction (2 of 3) BitTorrent Most used P2P network today (53% traffic) Attributes 2 nd gen. P2P network – no centralized servers; optimizes transfer speed; favors high-bandwidth users; files are split in chunks Peers – Trackers – Web sites Tit-for-tat sharing mechanism – everybody gives some; except when they don’t… no search at peer level Owners are called seeds, we are called leeches So much to know: I want my BitTorrent today!

4 Enters Carmen… Carmen SanDiego Famous spy Location: unknown Likes: to hide Clues to where she is: history, complicated hints Never caught Carmen BitDiego Famous P2P network Location: unknown Likes: who knows? Clues to where she is: some history, lightweight hints Caught (?) NO Multi-files studies NO Country-per-file NO Organizations NO, NO, NO… Who is this Carmen, anyways…

5 Introduction (3 of 3) We track Carmen BitDiego Tracked data attributes Users got 204,454,719,497,935B (ok, 204,5TB) 40,000,000 contacts 200,000 unique users (*) 120 files 9 specific media types The first aliased media view 7 unique views We got her now! Or is it…

6 Mission statement We want to know about Carmen BitDiego Where she goes Continent, country, city, organization When she goes Time-patterns per country Time-patterns in seeds/leeches ratio How many file chunks at any time? With whom she hangs out Special users? Super-peers, collector peers Is she a good companion? How many users get what they want? We’re getting to this info in no time…

7 Outline of the presentation Intro Enters Carmen… Mission statement Our data looks like this… Methods, or how to catch her Results, or how we caught her Conclusions (done) (we are here) (coming up next)

8 Our data looks like this… We track 120 files 120 trace files Time stamp, IP, port, # of chunks = record = 1 observation 12 big traces (+500,000 observations/trace) December 2003 – January small traces March global categories All, Big, Small 9 special categories Movies, Games, Music, Applications Alias media Same contents, different names Same language Different language

9 Outline of the presentation Intro Enters Carmen… Mission statement Our data looks like this… Methods, or how to catch her Results, or how we caught her Conclusions (we are here) (coming up next) (done)

10 Methods, or how to catch her We want to know about Carmen BitDiego Where she goes Un-DNS(*): continent (1), country (2), city (3), organization (4) When she goes (5) Parse and correlate Time-patterns per country Parse and correlate Time-patterns in seeds/leeches ratio Parse and correlate How many file chunks at any time? With whom she hangs out (6) Super-peers = nodes that own more than one complete file Collector peers = nodes that try to get more than one file Is she a good companion? (7) How many users get what they want? * Thanks MaxMind (GeoIP lib, database) and WebLog Expert (databases)

11 Outline of the presentation Intro Enters Carmen… Mission statement Our data looks like this… Methods, or how to catch her Results, or how we caught her Conclusions (we are here) (coming up next) (done) WARNING! We show only a selection of our results!

12 Results, or how we caught her Where she goes continent Europe is now the biggest BitTorrent consumer (not NA) Tit-for-tat discourages low-bandwidth users!

13 Results, or how we caught her Where she goes continent Not the same distribution for different sets of files! Europe is now the biggest BitTorrent consumer (not NA) Tit-for-tat discourages low-bandwidth users! Coarse media locality property Asia > North America (themed game)

14 Results, or how we caught her Where she goes country US still the biggest overall BitTorrent consumer – continent view can be misleading! NL is only 6 th !

15 US still the biggest overall BitTorrent consumer – continent view can be misleading! Where she goes country Not the same distribution for different sets of files! Localized versions of the files attract local users! Themed files attract very specific audiences! What about a marketing study based on BitTorrent file ranks? Fine media locality! Countries have habits! Results, or how we caught her Hong Kong, Chile : soccer management sim Israel : action movie Japan : animes The Nederlands 6 th Romania ~50 th

16 Results, or how we caught her Where she goes city Oldenburg, Eschborn, Herndon … Internet nodes placed outside major cities – cannot use this to track real users! 30% unknown – not reliable! Dispersed locations

17 Results, or how we caught her Where she goes organization Not the same distribution for different sets of files! We’d like to thank: The Walt Disney Company, Sony Corporation, SANYO Electric Software Co. Ltd., and Merrill Lynch for actively supporting BitTorrent! 1 ISP covers +60% users 10 ISPs cover <50% users ISP caching policy different for different files and communities! Academic institutions < 10% users!

18 Results, or how we caught her When she goes Time-patterns per country 8:30AM, 1PM, 6-9PM, 12-1AM mostly at work, during slow hours? Europe guides the time-patterns!

19 Results, or how we caught her When she goes How many file chunks at any time? The network is not robust all the time – attacks at these precise moments could be fatal! Causes: - trackers down - users interest down - others

20 Results, or how we caught her When she goes Time-patterns per no. of chunks/seeders/leeches ratio users:seeds ~ 10:1 leeches:seeds ~ 9:1 chunks:seeds ~ 1000:1

21 Results, or how we caught her With whom she hangs out Super-peers = nodes that own more than one complete file Collector peers = nodes that try to get more than one file # users / # files decreases exponentially! Group Small: Collectors (n files) ~ 2x Superpeers (n files)

22 Results, or how we caught her Is she a good companion?1 Point = 1% of any file Group Small users download whole files! Aliased Media results in exponential drop! people drop after getting 1/many Group Small Avg. (any) ~ 81 points Avg. (1 file) ~ 113 points Aliased Media Avg. (any) ~ 52 points Avg. (1 file) ~ 109 points Users download 1 file then disconnect! YES!

23 Outline of the presentation Intro Enters Carmen… Mission statement Our data looks like this… Methods, or how to catch her Results, or how we caught her Conclusions (done) (we are here) (done)

24 Conclusions Carmen BitDiego Famous P2P network Location: known Likes: established (study per specific file groups) Clues to where she is: complete hints Multi-files study Continents, Country, Cities, Organizations, global and per-file Time-patterns in the users/seeds/leeches behavior (also country) Super-nodes / collector nodes analysis Carmen BitDiego almost caught! Trivial and Non-trivial locality properties Alias media hints Need a full study w/ these methods to catch her!

25 Thank you… Questions? Remarks? Observations? All welcome! Alexandru IOSUP TU Delft I would like to thank Johan Pouwelse and Pawel Garbacki for all their help in creating this study. Thank you, Johan! Thank you, Pawel! Their previous work: