The Index Poisoning Attack in P2P File Sharing Systems Keith W. Ross Polytechnic University.

Slides:



Advertisements
Similar presentations
- 1 - Using an SMT Solver and Craig Interpolation to Detect and Remove Redundant Linear Constraints in Representations of Non-Convex Polyhedra Christoph.
Advertisements

George Anadiotis, Spyros Kotoulas and Ronny Siebes VU University Amsterdam.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Peer to Peer and Distributed Hash Tables
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
A Robust and Efficient Reputation System for Active Peer-to-Peer Systems Dominik Grolimund, Luzius Meisser, Stefan Schmid, Roger Wattenhofer Computer Engineering.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks Karim El Defrawy, Minas Gjoka, Athina Markopoulou UC Irvine.
Having Fun with P2P Keith W. Ross Polytechnic University
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Skills: finding and downloading files with Bit Torrent Concepts: client-server, peer-to-peer, copyright, Creative Commons This work is licensed under a.
Application Layer Overlays IS250 Spring 2010 John Chuang.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Peer-to-Peer Intro Jani & Sami Peltotalo.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
P2P WeeSan Lee
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
Sensor Networks Storage Sanket Totala Sudarshan Jagannathan.
P2P File Sharing Systems
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.

1 P2P Computing. 2 What is P2P? Server-Client model.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
1 Understanding Pollution Dynamics in P2P File Sharing Uichin Lee, Min Choi *, Junghoo Cho M. Y. Sanadidi, Mario Gerla UCLA, KAIST * IPTPS’06 Elaine.
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
P2P File Sharing in VANET Fenggang Wu Dept. of Comp. Sci. and Eng., SJTU Dec.15 th 2011.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Understanding KaZaA Jian Liang Rakesh Kumar Keith Ross Polytechnic University Brooklyn, N.Y.
Content distribution networks (CDNs) r The content providers are the CDN customers. Content replication r CDN company installs hundreds of CDN servers.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
An analysis of Skype protocol Presented by: Abdul Haleem.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Experience Sharing in Mobile Peer Communities EPI Planete, INRIA International Consortium Meeting (Oulou) 10 June, 2009.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Data Indexing in Peer- to-Peer DHT Networks Garces-Erice, P.A.Felber, E.W.Biersack, G.Urvoy-Keller, K.W.Ross ICDCS 2004.
Measurements and Mitigation of Peer-to-peer Botnets: A Case Study on Storm Worm Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bruce Hammer, Steve Wallis, Raymond Ho
Freenet: Anonymous Storage and Retrieval of Information
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.
Peer to Peer Information Retrieval
Di Wu Polytechnic Institute of NYU
Presentation transcript:

The Index Poisoning Attack in P2P File Sharing Systems Keith W. Ross Polytechnic University

Jian LiangNaoum Naoumov Joint work with:

Internet Traffic CF: CacheLogic

File Distribution Systems: 2005

Attacks on P2P: Decoying Two types: File corruption: pollution Index poisoning Investigated in two networks: FastTrack/Kazaa –Unstructured P2P network Overnet –Structured (DHT) P2P network –Part of eDonkey

File Pollution pollution company polluted content original content

File Pollution pollution company pollution server pollution server pollution server pollution server file sharing network

File Pollution Unsuspecting users spread pollution !

File Pollution Unsuspecting users spread pollution ! Yuck

Index Poisoning index title location bigparty smallfun heyhey file sharing network

Index Poisoning index title location bigparty smallfun heyhey index title location bigparty smallfun heyhey bighit

Overnet: DHT (version_id, location) stored in nodes with ids close to version_id (hash_title, version_id) stored in nodes with ids close to hash_title First search hash_title, get version_id and metada Then search version_id, get location

Overnet Publish Query Download

FastTrack Overlay Each SN maintains a local index ON = ordinary node SN = super node SN ON

FastTrack Query ON = ordinary node SN = super node SN ON

FastTrack Download ON = ordinary node SN = super node SN ON HTTP request for hash value

FastTrack Download ON = ordinary node SN = super node SN ON P2P file transfer

Attacks: How Effective? For a given title, what fraction of the copies are –Clean ? –Poisoned? –Polluted? Brute-force approach: –attempt download all versions –For those versions that download, listen/watch each one How do we determine pollution levels without downloading?

Titles, versions, hashes & copies The title is the title of song/movie/software A given title can have thousands of versions Each version has its own hash Each version can have thousands of copies A title can also have non-existent versions, each identified by a hash

Definition of Pollution and Poisoning Levels (t, t+ Δ): investigation interval V: set of all versions of title T V 1, V 2, V 3 : sets of poisoned, polluted, clean versions C v : number of advertised copies of version v

How to Estimate? Need C v, vєV Need V 1, V 2, V 3 –Dont want to download and listen to files! Solution: Harvest C v, vєV, and copy locations –Overnet: Insert node, receive publish msgs –FastTrack: Crawl Heuristic for V 1, V 2, V 3

Copies at Users FastTrackOvernet

Heuristic Identify heavy and light publishers H h = set of hashes from heavy publishers H l = set of hashes from light publishers polluted versions clean versions poisoned versions HhHh HlHl

Heuristic: More Evaluation#Download# Success#Accuracy# False Polluted8,4508, %0.6% (positive) Poisoned33,1861, %3.5% (negative) Heuristic is accurate & does not involve any downloading!

FastTrack Versions

FastTrack Copies

Overnet Copies

Blacklisting Assign reputations to /n subnets –Bad reputation to subnets with large number of advertised copies of any title Obtain reputations locally; share with distributed algorithm Locally blacklist /n subnets with bad reputations

Blacklisting: More

The Inverse Attack Attacks on P2P systems: But can also exploit P2P sytems for DDoS attacks against innocent host:

Summary & Thank You!