Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.

Slides:



Advertisements
Similar presentations
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Peer-to-Peer Systems Kulesh Shanmugasundaram Security Issues.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Routing indexes A. Crespo & H. Garcia-Molina ICDCS 02.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Antonis Papadogiannakis
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Can ISPs and P2P Users Cooperate for Improved Performance? Vinay Aggarwal, Anja Feldmann (German Telecom Laboratories) Christian Scheideler (TU, Munchen)
Exploring Tradeoffs in Failure Detection in P2P Networks Shelley Zhuang, Ion Stoica, Randy Katz HIIT Short Course August 18-20, 2003.
HyperCuP – P2P Network Boyko Syarov. 2 Outline  HyperCup: What is it?  Basic Concepts  Broadcasting Algorithm  Topology Construction  Ontology Based.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
1 Maximizing Remote Work in Flooding-based P2P Systems Qixiang Sun Neil Daswani Hector Garcia-Molina Stanford University.
Self Healing Wide Area Network Services Bhavjit S Walha Ganesh Venkatesh.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
P2P File Sharing Systems
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
P2P Architecture Case Study: Gnutella Network
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
P2p, Fall 06 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems Routing indexes A. Crespo & H. Garcia-Molina ICDCS 02.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Content Addressable Networks CAN is a distributed infrastructure, that provides hash table-like functionality on Internet-like scales. Keys hashed into.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Plug-in for Singleton Service in Clustered environment and improving failure detection methodology Advisor:By: Dr. Chung-E-WangSrinivasa c Kodali Department.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Presented by Edith Ngai MPhil Term 3 Presentation
Controlling the Cost of Reliability in Peer-to-Peer Overlays
CHAPTER 3 Architectures for Distributed Systems
A Scalable content-addressable network
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
A Scalable Content Addressable Network
Presentation transcript:

Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University

Introduction Gnutella is a P2P file sharing protocol The issue we are addressing is distributed recovery from malicious attacks in Gnutella Our solution is a mechanism for proactive failure detection and recovery Our experimental process and models The fruits of our labor: RESULTS!

Failure in Gnutella Failure of nodes in Gnutella can be caused by any number of reasons Failure of 4% of the most highly connected nodes in Gnutella fragments the network to the point where it is unusable by anyone The exact details of this are outlined in work done by Stefan Saroiu

Scale Free Networks (Gnutella, Internet) Abide by power law where – # of nodes of degree N is proportional to N -lambda – Lambda is observed to be roughly 2.3 Scale Free networks are highly resilient to large scale random failures but weak for malicious attacks on the most highly connected well known nodes

Exponential Networks Connections between nodes are random – No preferential connections ensures no node holds the entire network together They react the same way to malicious attacks and random failures

Scale Free and Exponential

Our Hypothesis In order to allow Gnutella to recover from malicious attacks nodes must plan for failures by discovering and maintaining backup connections to form an exponential network. These backups will be used to replace dead neighbors in the case of a malicious attack.

Recovery Method Build and maintain a virtual exponential network connecting all the nodes Accomplish this through random node discovery Detect malicious attacks on active network Switch over to exponential network

Random Node Discovery Problem: no centralized name authority to give a truly random node Solution: use random walks through the network to arrive at random node Random Discovery Ping (RDP) is forwarded to only one of a node’s neighbors, selected in such a way to give a random distribution RDPs use a hop count of 20, roughly equal to the network diameter

Maintenance of Virtual Exponential Network Each node discovers N random nodes, where N is the minimum number of connections the node wants to maintain Then periodically ping these nodes to make sure they are alive Discover new neighbors to replace them should they die

Failure Detection Random failures result in loss of 1 st degree neighbors Malicious attacks result in greater loss of 2 nd degree neighbors than 1 st degree Keep a history (30 seconds) of 1 st and 2 nd degree neighbor loss If 2 nd degree loss exceeds 1 st degree loss and a threshold (50%), mark as malicious

Reacting to Failures For each neighbor lost, replace it with a node from the virtual exponential network Only nodes local to an attack will switch, preserving the rest of the network structure Do not attempt to discover additional random nodes during an attack When attack is deemed to be over, return to normal operations

P2P Simulator Generalized P2P network simulator Handles message routing, time management Support for bringing nodes up or down, injecting failures, logging Also created a compatible Gnutella client, and our enhanced Gnutella client About 5k lines of Java

Modeling Gnutella No standard way to do this – Protocol only specifies message formats – Clients free to implement other aspects – Some degree of standardization We used the most common client in our simulation model - Bearshare

Bootstrapping How do nodes connect in our simulation? Defunct – Maintain list of highly-available, well- connected nodes – Clients connect by receiving one of these nodes Bearshare clients do something similar – Connect to service “pubic.bearshare.net” – Keep a range of neighbors (3-10)

Uptime Distribution How long do nodes stay up in our simulation? Modeled by a power law function Most nodes are up for a short period of time, few are up for a long period – Many users just sign off after getting their content – Most users are dialup users Within a reasonable time slice, nodes have uptimes following the power law distribution

Our Experiments Ran with recovery method and without No failures – just ran our simulator without removing any nodes (control) Malicious attack on most highly connected nodes

Malicious Attack Ran the experiment for 10 minutes We removed 5% of the most highly connected nodes over a 5 minute interval in the middle Representative of a coordinated distributed attack on the network

Metrics Large number of metrics that we could have used We picked metrics that measure – How partitioned the network is – How useful the network is in sending queries

Size of Largest Connected Component Largest set of nodes V, where any v m and v n  V have a path between each other Measures the number of nodes that can potentially communicate with each other Can get any data from any other node

# of Connected Components Number of separate pieces of the network If number of CC’s is large then the network is heavily partitioned – Not possible to retrieve content between CC’s – Want to monitor this number to make sure it is not increasing

Nodes Reachable Within 6 Hops Sum of number of 1 st, 2 nd..., 6 th degree neighbors of a node End to end measurement of how many nodes you can reach with a query – Typically queries are forwarded about 6 nodes – Rough estimate of the number of nodes a user can search.

Results – Largest CC

Results – Number of CCs

Results - % of nodes within 6 hops

Failure Detection Results

Random Node Distribution

Messages Per Node Results

Conclusions By planning for and detecting failures our recovery method can drastically increase the likelihood that the network will not become partitioned It lessens the impact of malicious attacks on the querying capability of the network

Further Work Investigating other techniques for random node discovery Restoring network to a scale free topology immediately following failures How the Gnutella network has changed over time

Thanks Stefan Saroiu and Steven Gribble for letting us use their data and giving us advice Armando Fox, George Candea, Dave Patterson, Aaron Brown Bling-Bling Industries, 2001