Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Data and Computer Communications
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Scalable Content-Addressable Network Lintao Liu
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
Small-world Overlay P2P Network
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Improving Robustness in Distributed Systems Jeremy Russell Software Engineering Honours Project.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Searching in Unstructured Networks Joining Theory with P-P2P.
An Evaluation of Scalable Application-level Multicast Using Peer-to-peer Overlays Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony Rowstron,
P2P Course, Structured systems 1 Introduction (26/10/05)
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Node Lookup in P2P Networks. Node lookup in p2p networks In a p2p network, each node may provide some kind of service for other nodes and also will ask.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
Chord Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber Google,
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
1 30 November 2006 An Efficient Nearest Neighbor (NN) Algorithm for Peer-to-Peer (P2P) Settings Ahmed Sabbir Arif Graduate Student, York University.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Peer to Peer Network Design Discovery and Routing algorithms
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Node Lookup in P2P Networks. Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Middleware issues: From P2P systems to Ad Hoc Networks
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Peer-to-Peer Information Systems Week 12: Naming
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Early Measurements of a Cluster-based Architecture for P2P Systems
DHT Routing Geometries and Chord
Chi Zhang, Yang Song and Yuguang Fang
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007

What is a social network? A social network is a social structure of nodes tied together by one or more specific types of relations. A social network is a social structure of nodes tied together by one or more specific types of relations. Examples: Examples: Classmates.com Classmates.com Friendster Friendster Myspace Myspace Facebook Facebook

SPROUT Introduction Why do we need it? Why do we need it? P2P vulnerable to routing Denial of Service Attacks P2P vulnerable to routing Denial of Service Attacks Misrouting attacks Misrouting attacks What is misrouting? What is misrouting? Any failure by a node to forward a message to the appropriate peer according to the correct routing algorithm. Any failure by a node to forward a message to the appropriate peer according to the correct routing algorithm.

SPROUT Introduction Malicious users Malicious users Masquerade as index owner of keys Masquerade as index owner of keys Can acquire several valid network identifiers to control multiple nodes – Sybil attack. Can acquire several valid network identifiers to control multiple nodes – Sybil attack. Can avoid this by sending messages only to “trusted” nodes like people we know personally perhaps in a real life social context. Can avoid this by sending messages only to “trusted” nodes like people we know personally perhaps in a real life social context. They propose to use existing social network services to build P2P Networks to add highly trusted links at little additional cost. They propose to use existing social network services to build P2P Networks to add highly trusted links at little additional cost.

SPROUT Trust Model Big Assumption Big Assumption Friends are not likely to be selfish or malicious. Friends are not likely to be selfish or malicious. Also, friends of friends are also unlikely to be malicious. Also, friends of friends are also unlikely to be malicious. Also assume that likelihood that B purposefully misroutes A’s message is proportional to distance between A’s owner and B’s owner. Also assume that likelihood that B purposefully misroutes A’s message is proportional to distance between A’s owner and B’s owner.

SPROUT Trust Function T ( A, B) is the trust A has in B T ( A, B) is the trust A has in B Probability f = 0.95 that friends will route correctly, 0.90 that friends’ friends route correctly, 0.85 that friends’ friends’ friends route correctly and so on. Probability f = 0.95 that friends will route correctly, 0.90 that friends’ friends route correctly, 0.85 that friends’ friends’ friends route correctly and so on. Probability r = 0.6 that any random node will route correctly. Probability r = 0.6 that any random node will route correctly. This means 40% of randoms are malicious This means 40% of randoms are malicious

SPROUT Path Rating Path trust rating, P, found by multiplying separate node trust ratings for each node. Path trust rating, P, found by multiplying separate node trust ratings for each node. Source node = S, Destination = D Source node = S, Destination = D P = T(S,A) * T(S,B) * T(S,C) * T(S,D)

SPROUT Social Path Routing Algorithm Build a DHT routing algorithm built on basic Chord algorithm. Build a DHT routing algorithm built on basic Chord algorithm. Can be applied to other DHT designs like CAN or Pastry. Can be applied to other DHT designs like CAN or Pastry. Like in Chord, user joins, gets randomly assigned a network identifier. Establishes links to sequential neighbors, but THEN add additional links to any friends that are online. Like in Chord, user joins, gets randomly assigned a network identifier. Establishes links to sequential neighbors, but THEN add additional links to any friends that are online. Most popular instant messenger services keep user aware of when friends enter or leave network. Most popular instant messenger services keep user aware of when friends enter or leave network.

SPROUT Social Path Routing Algorithm

SPROUT Optimization Lookahead Lookahead Can see friends’ friends Can see friends’ friends Minimum Hop Distance MHD Minimum Hop Distance MHD May have friend at each sequential neighbor, gives worst case routing O(n). May have friend at each sequential neighbor, gives worst case routing O(n). Use MHD of 0.25 then next friend must be at least a quarter away, or we use Chord. Use MHD of 0.25 then next friend must be at least a quarter away, or we use Chord.

SPROUT Simulations Used data from Club Nexus community website at Stanford University. Used data from Club Nexus community website at Stanford University. About 2200 users, on average each node had about 8 links. About 2200 users, on average each node had about 8 links. Also ran experiments on 130,000 AOL Instant Messenger users. Also ran experiments on 130,000 AOL Instant Messenger users. Used f = 0.95 and r = 0.6. Used f = 0.95 and r = 0.6.

SPROUT VS. CHORD Avg. Path LengthAvg. Reliability Regular Chord Augmented Chord SPROUT(1,0.5)

Evaluating Lookahead and MHD MHD Lookahead None 1 - level 2 - level LengthRatingLengthRatingLengthRating

Performance of SPROUT and AC Fig. 1. Performance of SPROUT and AC in different size Small World networks. The third curve shows the relative performance of SPROUT with respect to AC, plotted on the right- hand y-axis. Note that the x-axis is logscale.

SPROUT Calculating Trust

SPROUT Message Load Biggest problem for SPROUT Biggest problem for SPROUT Uneven distribution. Load bigger than AC. Uneven distribution. Load bigger than AC. Can use as advantage, Can use as advantage, One highly connected large capacity node increases reliability and decreases load on other nodes. One highly connected large capacity node increases reliability and decreases load on other nodes.

Searching Social Networks Only small bit pertains to P2P Only small bit pertains to P2P P2P uses brute force to find things, they propose a referral agent system. P2P uses brute force to find things, they propose a referral agent system. Most P2P algorithms don’t fit social networks because they cannot be partitioned by IP address. Also P2P have fixed routing tables for each node so network is not reconfigurable. Most P2P algorithms don’t fit social networks because they cannot be partitioned by IP address. Also P2P have fixed routing tables for each node so network is not reconfigurable.

The End Questions?? Questions??