P2P Taxonomy and Security Concerns Ryan Lackey CTO, HavenCo, Ltd. RSA Conference 2002 San Jose 0900 20-02-2002.

Slides:



Advertisements
Similar presentations
2/15/2001O'Reilly P2P Conference Characterizing P2P Infrastructure Wesley Felter Editor, Hack the Planet
Advertisements

Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Applicability of Instant Messaging in the Military Command and Control Systems Author: Juha Vermaja Superviser: Jorma Jormakka Instructor: Marko Luoma,
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
A Swarming Architecture is Good for Internet Data Transfer ? Offensed by Jiazhen Chen & Alexander Kiaie.
Jurisdictional Arbitrage for Risk Management Ryan Lackey HavenCo, Ltd. RSA Conference 2002 San Jose.
1 On Death, Taxes, & the Convergence of Peer-to-Peer & Grid Computing Adriana Iamnitchi Duke University “Our Constitution is in actual operation; everything.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
RBAC and JXTA 1 Role Based Access Control and the JXTA P2P Framework Mark Stamp Dept. of Computer Science San Jose State University
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Can ISPs and P2P Users Cooperate for Improved Performance? Vinay Aggarwal, Anja Feldmann (German Telecom Laboratories) Christian Scheideler (TU, Munchen)
Network Shared Services. Shared Services –Network Authentication and Authorization Services –Exchange Network Discovery Service –Universal Description.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Peer-to-Peer Computing
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
Jay Sheth P2P Basics Jay Sheth CE, UMBC. Jay Sheth P2P Agenda What is P2P Why P2P Components and algorithms Characteristics Different P2P systems Future.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Brian Dwyer – CITA370. Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
1 Anonshare 2.0 P2P Anonymous Browsing History Share Frank Chiang Terry Go Rui Ma Anita Mathew.
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.

 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
| E. Marocco, G. Canal Lucent, 2006, 26 th October P2PSIP: Interworking Enrico Marocco Research Engineer
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Economic Incentives in Information- Centric Networking: Implications for Protocol Design and Public Policy Group Members: Muhammad Kamran Siddique Adel.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Controversial Hosting Onshore, Offshore, or Online?
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
Lecture Week 3 Application Layer Functionality and Protocols Network Fundamentals.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
A Scalable Virtual Registry Service for jGMA Matthew Grove DSG Seminar 3 rd May 2005.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
1/30/2002Collaborative Computing in Higher Education1 Design Choices in P2P Infrastructure Wes Felter IBM Austin Research Lab
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Universitatea Politehnica Bucureşti - Facultatea de Automatică şi Calculatoare Towards a Peer-to-Peer Recommender System Based on Collaborative Filtering.
Michael Miller Senior Director Real-Time Collaboration Products Oracle Collaboration Suite 10g Oracle Corporation.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
P2P Cullen Jennings Out of scope Mechanisms File Sharing Fluffy’s Hair XCAP.
Multicast in Information-Centric Networking March 2012.
Scott Cantor April 10, 2003 Shibboleth and PKI Scott Cantor April 10, 2003.
Comparison of LAN, MAN, WAN
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

P2P Taxonomy and Security Concerns Ryan Lackey CTO, HavenCo, Ltd. RSA Conference 2002 San Jose

Introduction Variety of P2P systems P2P is not a new thing

Types of Systems “Traditional” p2p File Sharing Proxies Chat systems Infrastructure systems

Major File Systems Napster Gnutella KaZaA/Fasttrack/Morpheus Freenet Mojonation

Traditional SMTP is peer to peer Deployed with “supernodes” with smtp/pop3 and inter-realm communication via supernodes

Cypherpunks-style r ers 35 or so nodes “Onion routing”

Chat Systems IRC isn’t really p2p AIM/ICQ with centralized presence Gale, Jabber, IMPP proposals

Infrastructure Protocols DNS NTP PKI Certification Authorities

Design Comparison Target applications Transport Interactivity Degree of centralization Design/compile-time organization or install/configuration or runtime/evolving Security: traffic encryption, DoS protection, Replication for reliability

Implementation Comparison “Official” vs. covert adoption Importance of “network effects” for minimal utility Legal issues (content, copyright controls) Administrative control – what functionality is possible, who exercises it?

Security Issues Users provided an incentive to violate security model System not designed to be compatible with non-P2P restrictions Modifies underlying assumptions about connectivity

Observations “Old” p2p systems ( , etc.) seem to be designed into security models, so newer systems can emulate Power ultimately wins over security Systems can be re-deployed internally for security

Summary Since P2P applications have been popular, and continue to be popular, security practices must take them into account Deployment choices are as important as implementation choices; even unsafe technologies can be wrapped in a security model

Q&A