KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

Skype & Network Management Taken from class reference : An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning Schulzrinne.
Review of a research paper on Skype
Network Layer and Transport Layer.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
TCP/IP: the transport layer Skills: none IT concepts: layered protocols, transport layer functions, TCP and UDP protocols, isochronous applications This.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
More about Skype. Overview Any node with a public IP address having sufficient CPU, memory and network bandwidth is a candidate to become a super node.
EMule behind the scenes. Overview Extends the eDonkey protocol File sharing network Several hundreds of eMule servers Millions of eMule clients Each server.
Network Analyzer Example
Peer-to-Peer Intro Jani & Sami Peltotalo.
The internet layer Skills: None IT concepts: layered protocols, the internet layer, IP protocol, router, dumb (“end-to- end,” “neutral”) networks This.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
1 TCP/IP architecture A set of protocols allowing communication across diverse networks Out of ARPANET Emphasize on robustness regarding to failure Emphasize.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Module 1: Reviewing the Suite of TCP/IP Protocols.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
IT 210 The Internet & World Wide Web introduction.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How VoIP and Skype Work.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Hands-on Networking Fundamentals
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Skype P2P Kedar Kulkarni 04/02/09.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
--Harish Reddy Vemula Distributed Denial of Service.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Linux Networking and Security
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk.
FastTrack Network & Applications (KaZaA & Morpheus)
An analysis of Skype protocol Presented by: Abdul Haleem.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
IT ELECTRONIC COMMERCE THEORY NOTES
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
#16 Application Measurement Presentation by Bobin John.
Skype.
Music Downloads By: Demetria Norman And Jacquelyn Menner.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Networks Problem Set 3 Due Nov 10 Bonus Date Nov 9
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
CHAPTER 3 Architectures for Distributed Systems
Monitoring Network Bias
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Starting TCP Connection – A High Level View
A tool for locating QoS failures on an Internet path
The Case for DDoS Resistant Membership Management in P2P Systems
Protocol Application TCP/IP Layer Model
Computer Networks Protocols
Presentation transcript:

KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University

Fasttrack network Created in Mar 2001, Fasttrack was a software company that developed a software library for a P2P network. KaZaA was their first application to use the library. Today, Grokster and iMesh are other licensed clients of the Fasttrack network.

Why Fasttrack? KaZaA has over 200million downloads and shows over 4 million users online at any time. It’s a closed protocol All Traffic is encrypted Minimal information available about the network – scalability, robustness and operation.

What we know? 2-tier Architecture: nodes & supernodes Supernodes are high bandwidth users who aid searches of neighborhood nodes. Supernode {File 1?} Supernode Peer 1Peer 2Peer 3 File 2 File 4 File 5 File 1 File 3 File 6 File 3 File 7 File 10 Search query {File 1?} Peer 2: File 1 GET File 1 A detailed study was done earlier by…?? RIAA of course

Project Idea / Goals To understand how the Fasttrack network works. No focus on cryptanalysis of the traffic. Understand behavior (communication, allocation etc.) of supernodes. Establish patterns in supernode communication.

Methodology Ran KaZaA software on a lab machine for about 4 weeks. Using a custom packet sniffer we logged the packet information such as: Date & Time of Packet, Source Address, Destination address and Protocol. Analyzed the log files using Perl scripts to give us detailed report of each log file: Total Unique Destination IP Addresses List of destination IP addresses and number of packets sent to each. Total Unique Source IP Addresses List of source IP addresses and number of packets received from each. Besides this, we also analyzed the traffic during the login of KaZaA.

Install & Login Observations The available KaZaA setup file is just a web install. During setup, it connects to a peer and downloads the KaZaA install file – kmd210.exe Each time you try to install it connects to a new peer with varying download speeds. At login Connects to a central login server rr1.kazaa.com (7 IP addresses) in Denmark. Sends information like country, client, version etc.

Immediately after, the peer sends ICMP ping messages to about 4 – 5 other peers. Those who reply to these messages are then contacted by a separate TCP connection on specific destination ports. The purpose of this communication seems to be to let the peer know of a port to contact us. On repeated attempts to login – different sets of peers are contacted! If none of the peers reply to initial ping messages then a different set of peers are sent UDP packets. Then the same procedure as above.

Traffic Analysis and Observations Parsed the list of IP addresses in each report to get their frequency. About 7 address were communicating with our machine on a regular basis for over 4 days. (3 from Lehigh ;), 3 from other universities and 1 broadband) These were our candidates for supernodes. Also, our node had reached the status of Guru (309 points). A new node starts with a status of medium (100 points). We were now set to do further detailed analysis with an improved packet sniffer when …

…the Traffic Stopped!

This is not the first of its kind. The giFT project, a relatively big project, was successful in reverse engineering the Fasttrack protocol. Fasttrack changed their protocol (and encryption) and things were back to where they started. Currently two projects are working on this task: Project Fasttrack RapidRoad None of the above companies have released any public software or documentation to validate their claimed progress.

Queries? Thank You!