Peer-to-Peer Systems and Security

Size: px
Start display at page:

Download "Peer-to-Peer Systems and Security"

Transcription

1 Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universität München April 13, 2013

2 Salsa & AP3 Goal: eliminate trusted blender server Idea: Use DHT (AP3: Pastry, Salsa: custom DHT) to find peers Sybil defense with trusted authority (AP3) or IP-based hash (Salsa)

3 Attacks on Salsa & AP3 [2] Passive attack: detect lookup, then correlate with path construction later Active attack: return malicious peers during lookup

4 Defenses against Active Attack: Redundant lookups

5 Defenses against Passive Attack: Minimize lookup footprint

6 Defending against the Combined Attack r = 3 is optional for f < 0.1,then r = 6 becomes optimal.

7 An Attack on Tor [1] Result: All the Tor nodes involved in a circuit can be discovered, reducing Tor users level of anonymity and revealing a problem with Tor s protocol

8 An Attack on Tor [1] Result: All the Tor nodes involved in a circuit can be discovered, reducing Tor users level of anonymity and revealing a problem with Tor s protocol Note: this was fixed since the attack was published in 2009.

9 Key Tor Properties Data is forwarded through the network Each node knows only the previous hop and the next hop Only the originator knows all the hops Number of hops is hard coded (currently set to three) Key security goal: No node in the path can discover the full path

10 Our Basis for Deanonymization Target user is running Tor from 2009 with default settings Three design issues enable users to be deanonymized 1. No artificial delays induced on connections 2. Path length is set at a small finite number (3) 3. Paths of arbitrary length through the network can be constructed

11 Regular Path Example Client Tor Node 3 Tor Node 1 Tor Node 2 Server

12 Circular Path Example 1/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server

13 Circular Path Example 2/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server

14 Circular Path Example 3/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server

15 Circular Path Example 4/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server

16 Circular Path Example 5/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server

17 Attack Implementation Exit node injects JavaScript ping code into HTML response Client browses as usual, while JavaScript continues to phone home Exit node measures variance in latency While continuing to measure, attack strains possible first hop(s) If no significant variance observed, pick another node from candidates and start over Once sufficient change is observed in repeated measurements, initial node has been found

18 Attack Example Client Tor Node 1 - Unknown Node Malicious Client Tor Node 3 - Our Exit Node Tor Node 2 - Known High BW Tor Node 1 Server High BW Tor Node 2 Malicious Server

19 Queue example 1 (3 circuits) A B C B5 B4 B3 B2 B1 A0 B0 C1 Output Queue t = 0 C0

20 Queue example 2 (3 circuits) A B C B5 B4 B3 B2 B1 B0 C1 Output Queue t = 1 t = 0 A0 C0

21 Queue example 3 (3 circuits) A B C B5 B4 B3 B2 B1 C1 Output Queue t = 2 t = 1 t = 0 B0 A0 C0

22 Queue example 4 (3 circuits) A B C B5 B4 B3 B2 B1 Output Queue t = 3 t = 2 t = 1 t = 0 C1 B0 A0 C0

23 Queue example 5 (3 circuits) A B C B5 B4 B3 B2 Output Queue t = 4 t = 3 t = 2 t = 1 t = 0 B1 C1 B0 A0 C0

24 Queue example 6 (3 circuits) A B C B5 B4 B3 Output Queue t = 5 t = 4 t = 3 t = 2 t = 1 t = 0 B2 B1 C1 B0 A0 C0

25 Queue example 7 (3 circuits) A B C B5 B4 Output Queue t = 6 t = 5 t = 4 t = 3 t = 2 t = 1 t = 0 B3 B2 B1 C1 B0 A0 C0

26 Queue example 8 (3 circuits) A B C B5 Output Queue t = 7 t = 6 t = 5 t = 4 t = 3 t = 2 t = 1 t = 0 B4 B3 B2 B1 C1 B0 A0 C0

27 Queue example 1 (15 circuits) A A0 A1 A2 A3 B B0 B1 B2 B3 C C1 C2 C3 C4 D D0 D1 D2 D3 D4 D5 E E0 E1 E2 E3 E4 F G G0 G1 H H0 H1 I I0 I1 I2 I3 I4 J J0 J1 K K0 L L0 L1 L2 L3 M M0 M1 N N0 N1 N2 N3 N4 N5 N6 O O0 O1 O2 O3 O4 O5 C0 t = 0 Output Queue

28 Queue example 2 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 E4 I4 N4 O4 A3 B3 C4 D4 E3 I3 L3 N3 O3 A2 B2 C3 D3 E2 I2 L2 N2 O2 A1 B1 C2 D2 E1 G1 H1 I1 J1 L1 M1 N1 O1 A0 B0 C1 D1 E0 G0 H0 I0 J0 K0 L0 M0 N0 O0 Output Queue t = 1 t = 0 D0 C0

29 Queue example 3 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 I4 N4 O4 A3 B3 C4 D4 E4 I3 L3 N3 O3 A2 B2 C3 D3 E3 I2 L2 N2 O2 A1 B1 C2 D2 E2 G1 H1 I1 J1 L1 M1 N1 O1 A0 B0 C1 D1 E1 G0 H0 I0 J0 K0 L0 M0 N0 O0 Output Queue t = 2 t = 1 t = 0 E0 D0 C0

30 Queue example 4 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 I4 N4 O4 A3 B3 C4 D4 E4 I3 L3 N3 O3 A2 B2 C3 D3 E3 I2 L2 N2 O2 A1 B1 C2 D2 E2 H1 I1 J1 L1 M1 N1 O1 A0 B0 C1 D1 E1 G1 H0 I0 J0 K0 L0 M0 N0 O0 Output Queue t = 3 t = 2 t = 1 t = 0 G0 E0 D0 C0

31 Queue example 5 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 I4 N4 O4 A3 B3 C4 D4 E4 I3 L3 N3 O3 A2 B2 C3 D3 E3 I2 L2 N2 O2 A1 B1 C2 D2 E2 I1 J1 L1 M1 N1 O1 A0 B0 C1 D1 E1 G1 H1 I0 J0 K0 L0 M0 N0 O0 Output Queue t = 4 t = 3 t = 2 t = 1 t = 0 H0 G0 E0 D0 C0

32 Queue example 6 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 N4 O4 A3 B3 C4 D4 E4 I4 L3 N3 O3 A2 B2 C3 D3 E3 I3 L2 N2 O2 A1 B1 C2 D2 E2 I2 J1 L1 M1 N1 O1 A0 B0 C1 D1 E1 G1 H1 I1 J0 K0 L0 M0 N0 O0 Output Queue t = 5 t = 4 t = 3 t = 2 t = 1 t = 0 I0 H0 G0 E0 D0 C0

33 Queue example 7 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 N4 O4 A3 B3 C4 D4 E4 I4 L3 N3 O3 A2 B2 C3 D3 E3 I3 L2 N2 O2 A1 B1 C2 D2 E2 I2 L1 M1 N1 O1 A0 B0 C1 D1 E1 G1 H1 I1 J1 K0 L0 M0 N0 O0 Output Queue t = 6 t = 5 t = 4 t = 3 t = 2 t = 1 t = 0 J0 I0 H0 G0 E0 D0 C0

34 Queue example 8 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 N4 O4 A3 B3 C4 D4 E4 I4 L3 N3 O3 A2 B2 C3 D3 E3 I3 L2 N2 O2 A1 B1 C2 D2 E2 I2 L1 M1 N1 O1 A0 B0 C1 D1 E1 G1 H1 I1 J1 L0 M0 N0 O0 Output Queue t = 7 t = 6 t = 5 t = 4 t = 3 t = 2 t = 1 t = 0 K0 J0 I0 H0 G0 E0 D0 C0

35 Queue example 9 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 N4 O4 A3 B3 C4 D4 E4 I4 N3 O3 A2 B2 C3 D3 E3 I3 L3 N2 O2 A1 B1 C2 D2 E2 I2 L2 M1 N1 O1 A0 B0 C1 D1 E1 G1 H1 I1 J1 L1 M0 N0 O0 Output Queue t = 8 t = 7 L0 K0 t = 6 J0 t = 5 I0 t = 4 t = 3 t = 2 t = 1 H0 G0 E0 D0 t = 0 C0

36 Queue example 10 (15 circuits) A B C D E F G H I J K L M N O N6 N5 O5 D5 N4 O4 A3 B3 C4 D4 E4 I4 N3 O3 A2 B2 C3 D3 E3 I3 L3 N2 O2 A1 B1 C2 D2 E2 I2 L2 N1 O1 A0 B0 C1 D1 E1 G1 H1 I1 J1 L1 M1 N0 O0 Output Queue t = 9 t = 8 t = 7 t = 6 t = 5 t = 4 t = 3 t = 2 t = 1 t = 0 M0 L0 K0 J0 I0 H0 G0 E0 D0 C0

37 Attack Example Client Tor Node 1 - Unknown Node Malicious Client Tor Node 3 - Our Exit Node Tor Node 2 - Known High BW Tor Node 1 Server High BW Tor Node 2 Malicious Server

38 Attack Implementation Modified exit node Modified malicious client node Lightweight malicious web server running on GNU libmicrohttpd Client side JavaScript for latency measurements Instrumentation client to receive data

39 Gathered Data Example (1/8) Latency measurement graph freedomsurfers Latency variance (in seconds) Control Run Attack Run Downloaded Data Bytes expended by attacker (in kb) Sample number

40 Gathered Data Example (2/8) Latency variance (in seconds) Control Run Attack Run Downloaded Data Latency measurement graph bloxortsipt Bytes expended by attacker (in kb) Sample number

41 Gathered Data Example (3/8) Latency variance (in seconds) Control Run Attack Run Downloaded Data Latency measurement graph carini Bytes expended by attacker (in kb) Sample number

42 Gathered Data Example (4/8) Latency measurement graph carini Latency variance (in seconds) Control Run Attack Run Downloaded Data Bytes expended by attacker (in kb) Sample number

43 Gathered Data Example (5/8) Histogram of latency measurements for freedomsurfers Control Run Attack Run Control Run Regression Line Attack Run Regression Line Number of measurements in range Range of measurements (in seconds)

44 Gathered Data Example (6/8) Histogram of latency measurements for bloxortsipt Control Run Attack Run Control Run Regression Line Attack Run Regression Line Number of measurements in range Range of measurements (in seconds)

45 Gathered Data Example (7/8) Histogram of latency measurements for carini Control Run Attack Run Control Run Regression Line Attack Run Regression Line Number of measurements in range Range of measurements (in seconds)

46 Gathered Data Example (8/8) Histogram of latency measurements for carini Control Run Attack Run Control Run Regression Line Attack Run Regression Line Number of measurements in range Range of measurements (in seconds)

47 Statistical Analysis Use modified χ 2 test Compare baseline distribution to attack distribution High χ 2 value indicates distribution changed in the right direction Product of χ 2 confidence values over multiple runs Iterate over suspect routers until single node stands out

48 Cumulative Product of χ 2 p-values Product of Confidence Values 1-1x x10-10 Rattensalat SEC wie6ud6b hamakor yavs auk dontmesswithme cthor Raccoon eponymousraga BlueStar88a wranglerrutgersedu conf555nick mf62525 miskatonic WeAreAHedge anon1984n2 c bond server3 Product of Confidence Values 1-1x Privacyhosting c DieYouRebelScum1 ArikaYumemiya auk mrkoolltor TorSchleim myrnaloy judas Doodles123 tin0 baphomet kallio diora aquatorius Einlauf dontmesswithme askatasuna century Number of Runs Number of Runs

49 What We Actually Achieve We do identify the entire path through the Tor network We do achieve this on the 2009 Tor network Attack works on routers with differing bandwidths This means that if someone were performing this attack from an exit node, Tor becomes as effective as a network of one-hop proxies

50 Why Our Attack is Effective Since we run the exit router, only a single node needs to be found Our multiplication of bandwidth technique allows low bandwidth connections to DoS high bandwidth connections (solves common DoS limitation)

51 Fixes Don t use a fixed path length (or at least make it longer) Don t allow infinite path lengths (this is fixed in Tor now!) Induce delays into connections (probably not going to happen) Monitor exit nodes for strange behavior (been done somewhat) Disable JavaScript in clients Use end-to-end encryption

52 Attack Improvements/Variants Use meta refresh tags for measurements instead of JavaScript Parallelize testing (rule out multiple possible first nodes at once) Improved latency measures for first hop to further narrow possible first hops

53 Conclusion Initial Tor implementation allowed arbitrary length paths Arbitrary path lengths allow latency altering attack Latency altering attack allows detection of significant changes in latency Significant changes in latency reveal paths used

54 Motivation Efficient fully decentralized routing in restricted-route topologies is important: Friend-to-friend (F2F) networks ( darknets ) WiFi ad-hoc and sensor networks Unstructured networks Clarke & Sandberg claim to achieve O(log n) routing in the dark (Freenet 0.7) Is this new routing protocol reasonably resistant against attacks?

55 Freenet 101 Freenet is a anonymous peer-to-peer network Overlay based on cyclic address space of size 2 32 Nodes have a constant set of connections (F2F) All data identified by a key (modulo 2 32 ) Data assumed to be stored at closest node Routing uses depth-first traversal in order of proximity to key

56 Routing in the Dark Small world network assumption Sparsely connected graph There exists a short path (O(log N)) between any pair of nodes Common real world phenomenon (Milgram, Watts & Strogatz) Freenet s routing algorithm attempts to find short paths Uses locations of nodes to determine proximity to target Uses swapping of locations to structure topology

57 Swap Example Swap?

58 Result of Swap

59 Location Swapping Nodes swap locations to improve routing performance Each connected pair of nodes (a, b) computes: L a L o L b L p P a,b := (a,o) E L b L o (b,p) E (a,o) E (b,p) E L a L p (1) If P a,b 1 the nodes swap locations Otherwise they swap with probability P a,b

60 Routing of GET Requests GET requests are routed based on peer locations and key: 1. Client initiates GET request 2. Request routed to neighbor with closest location to key 3. If data not found, request is forwarded to neighbors in order of proximity to the key 4. Forwarding stops when data found, hops-to-live reaches zero or identical request was recently forwarded (to avoid circular routing) Depth-first routing in order of proximity to key.

61 GET 1/ Figure: A GET request from node 0.90 searching for data with identifier 0.22 (which is stored at node identified by 0.25)

62 GET 2/ Figure: A GET request from node 0.90 searching for data with identifier 0.22 (which is stored at node identified by 0.25)

63 GET 3/ Figure: A GET request from node 0.90 searching for data with identifier 0.22 (which is stored at node identified by 0.25)

64 GET 4/ Figure: A GET request from node 0.90 searching for data with identifier 0.22 (which is stored at node identified by 0.25)

65 GET 5/ Found! 0.10 Figure: A GET request from node 0.90 searching for data with identifier 0.22 (which is stored at node identified by 0.25)

66 GET 6/ Figure: A GET request from node 0.90 searching for data with identifier 0.22 (which is stored at node identified by 0.25)

67 GET 7/ Figure: A GET request from node 0.90 searching for data with identifier 0.22 (which is stored at node identified by 0.25)

68 PUT Requests PUT requests are routed the same as GET requests: 1. Client initiates PUT requests 2. Request routed to neighbor closest to the key 3. If receiver has any peer whose location is closer to the key, request is forwarded 4. If not, the node resets the hops-to-live to the maximum and sends the put request to all of its neighbors 5. Routing continues until hops-to-live reaches zero (or node has seen request already)

69 Put Example Figure: Put example from node with ID 0.25 inserting data identified by the ID 0.93

70 Put Example 1/ Figure: Put example from node with ID 0.25 inserting data identified by the ID 0.93

71 Put Example 2/ Figure: Put example from node with ID 0.25 inserting data identified by the ID 0.93

72 Put Example 3/ Figure: Put example from node with ID 0.25 inserting data identified by the ID 0.93

73 Basic Idea for the Attack Freenet relies on a balanced distribution of node locations for data storage Reducing the spread of locations causes imbalance in storage responsibilities Peers cannot verify locations in swap protocol, including location(s) they may receive use swap protocol to reduce spread of locations!

74 Attack Details Initialize malicious nodes with a specific location If a node swaps with the malicious node, the malicious node resets to the initial location (or one very close to it) This removes the good node location and replaces it with one of the malicious nodes choosing Each time any node swaps with the malicious node, another location is removed and replaced with a bad location Bad location(s) spread to other nodes through normal swapping behavior Over time, the attacker creates large clusters of nodes around a few locations

75 Attack Example 1/ Figure: Node 0.90 is sent a signal to become malicious

76 Attack Example 2/ Figure: Malicious node resets its location to malicious location (0.500)

77 Attack Example 3/ Figure: Malicious node forces a swap with 0.85

78 Attack Example 4/ Figure: Malicious node resets its location to malicious location (0.501) removing good location 0.85

79 Attack Example 5/ Figure: Malicious node forces a swap with 0.10

80 Attack Example 6/ Figure: Malicious node resets its location to malicious location (0.502) removing good location 0.10

81 Attack Example 7/ Figure: Malicious node forces a swap with 0.60

82 Attack Example 8/ Figure: Malicious node resets its location to malicious location (0.503) removing good location 0.60

83 Attack Example 9/ Figure: Even with low probability, a swap can occur between and 0.45

84 Attack Example 10/ Figure: Malicious node forces a swap with 0.45

85 Attack Example 11/ Figure: Malicious node resets its location to malicious location (0.504) removing good location 0.45

86 Attack Implementation Malicious node uses Freenet s codebase with minor modifications Attacker does not violate the protocol in a detectable manner Malicious nodes behave as if they had a large group of friends Given enough time, a single malicous node can spread bad locations to most nodes Using multiple locations for clustering increases the speed of penetration

87 Experimental Setup Created testbed with 800 Freenet nodes Topology corresponds to Watts & Strogatz small world networks Instrumentation captures path lengths and node locations Content is always placed at node with closest location Nodes have bounded storage space

88 Dispersion Example with 800 Nodes Figure: Plot of node locations before attack. Figure: Plot of node locations after attack.

89 Data Loss Example (2 attack nodes) 100 Average Loss over time with Std. Dev. 80 % data loss Time (in iterations of 90 seconds) Figure: Graph showing average data loss over 5 runs with 800 nodes and 2 attack nodes using 8 bad locations with the attack starting after about 2h.

90 Data Loss Example (4 Attack nodes) 100 Average Loss over time with Std. Dev. 80 % data loss Time (in iterations of 90 seconds) Figure: Graph showing average data loss over 5 runs with 800 nodes and 4 attack nodes using 8 bad locations with the attack starting after about 2h.

91 Data Loss Example (8 Attack nodes) 100 Average Loss over time with Std. Dev. 80 % data loss Time (in iterations of 90 seconds) Figure: Graph showing average data loss over 5 runs with 800 nodes and 8 attack nodes using 8 bad locations with the attack starting after about 2h.

92 How to protect against this? Check how frequently a node swaps similar locations? Limit number of swaps with a particular peer? Determine a node is malicious because its location is too close? Periodically reset all node locations? Secure multiparty computation for swaps? In F2F networks, you can never be sure about the friends of your friends!

93 Churn Leave join churn Nodes are not constantly in the network They leave for some period of time and then come back into the network Join leave churn Nodes join the network for a time, then disconnect permanently This also causes load imbalance similar to our attack

94 Churn Example 1/ Figure: Example stable core network Figure: Node location plot

95 Churn Example 2/ Swap? Figure: Node 0.95 joins the network Figure: Node location plot

96 Churn Example 3/ Yes Figure: Node 0.95 swaps with 0.60 Figure: Node location plot

97 Churn Example 4/ Figure: Node (now 0.60) leaves the network Figure: Node location plot

98 Churn Example 5/ Swap? 0.30 Figure: Node 0.30 joins the network Figure: Node location plot

99 Churn Example 6/ No 0.30 Figure: Node 0.30 does not swap Figure: Node location plot

100 Churn Example 7/ Figure: Node 0.30 leaves the network Figure: Node location plot

101 Churn Example 8/ Swap? 0.90 Figure: Nodes 0.70 and 0.90 consider a swap Figure: Node location plot

102 Churn Example 9/ Yes 0.70 Figure: 0.70 and 0.90 swap Figure: Node location plot

103 Churn Example 10/ Figure: Result after the swap Figure: Node location plot

104 Churn Example 11/ Swap? 0.05 Figure: Node 0.05 joins the network Figure: Node location plot

105 Churn Example 12/ Yes 0.70 Figure: Node 0.05 swaps location with 0.70 Figure: Node location plot

106 Churn Example 13/ Figure: Node (now 0.70) leaves the network Figure: Node location plot

107 Churn Simulation Created stable core of nodes Simulated join-leave churn, let network stabilize Ran exactly the native swap code Repeat n number of times Revealed drastic convergence to single location

108 Conclusion Freenet s routing algorithm is not robust Adversaries can easily remove most of the content Attack exploits location swap, where nodes trust each other Swap is fundamental to the routing algorithm Natural churn causes similar results

109 References Nathan S. Evans, Roger Dingledine, and Christian Grothoff. A practical congestion attack on tor using long paths. In 18th USENIX Security Symposium, pages USENIX, Prateek Mittal and Nikita Borisov. Information leaks in structured peer-to-peer anonymous communication systems. In Proceedings of the 15th ACM conference on Computer and communications security, CCS 08, pages , New York, NY, USA, ACM.

A Modern Congestion Attack on Tor Using Long Paths

A Modern Congestion Attack on Tor Using Long Paths A Modern Congestion Attack on Tor Using Long Paths Towards Nathan S. Evans 1 Christian Grothoff 1 Roger Dingledine 2 1 University of Denver, Denver CO 2 The Tor Project June, 22 2009 Why attack Tor? Tor

More information

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München Anonymity With Tor The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 5, 2012 It s a series of tubes. Ted Stevens Overview What is Tor? Motivation Background Material

More information

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Anonymity With Tor. The Onion Router. July 21, Technische Universität München The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 21, 2011 Overview What is Tor? Motivation Background Material How Tor Works Hidden Services Attacks Specific Attack

More information

Deanonymizing Tor. Colorado Research Institute for Security and Privacy. University of Denver

Deanonymizing Tor. Colorado Research Institute for Security and Privacy. University of Denver Deanonymizing Tor Nathan S. Evans Nathan.S.Evans@du.edu Christian Grothoff christian@grothoff.org Colorado Research Institute for Security and Privacy University of Denver 1 Motivation Tor is probably

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information

Metrics for Security and Performance in Low-Latency Anonymity Systems

Metrics for Security and Performance in Low-Latency Anonymity Systems Metrics for Security and Performance in Low-Latency Anonymity Systems Tor user Entry node Tor Network Middle node Exit node Bandwidth per node (kb/s) (log scale) 1e+01 1e+03 1e+05 Encrypted tunnel Web

More information

Routing in the Dark: Pitch Black. A Thesis Presented to the Faculty of Engineering and Computer Science University of Denver

Routing in the Dark: Pitch Black. A Thesis Presented to the Faculty of Engineering and Computer Science University of Denver Routing in the Dark: Pitch Black A Thesis Presented to the Faculty of Engineering and Computer Science University of Denver In Partial Fulfillment of the Requirements for the Degree Master of Science by

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Ian Clarke Oskar Sandberg

Ian Clarke Oskar Sandberg Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

c 2010 Prateek Mittal

c 2010 Prateek Mittal c 2010 Prateek Mittal A SECURITY EVALUATION OF THE SALSA ANONYMOUS COMMUNICATION SYSTEM BY PRATEEK MITTAL THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information

Securing Chord for ShadowWalker. Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign

Securing Chord for ShadowWalker. Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign Securing Chord for ShadowWalker Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign tiku1@illinois.edu ABSTRACT Peer to Peer anonymous communication promises to eliminate

More information

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul THE SECOND GENERATION ONION ROUTER Roger Dingledine Nick Mathewson Paul Syverson 1 -Presented by Arindam Paul Menu Motivation: Why do we need Onion Routing? Introduction : What is TOR? Basic TOR Design

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum Paul Syverson (U.S. Naval Research Laboratory) (U.S. Naval

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

Debunking some myths about structured and unstructured overlays

Debunking some myths about structured and unstructured overlays Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured

More information

Design and Analysis of Efficient Anonymous Communication Protocols

Design and Analysis of Efficient Anonymous Communication Protocols Design and Analysis of Efficient Anonymous Communication Protocols Thesis Defense Aaron Johnson Department of Computer Science Yale University 7/1/2009 1 Acknowledgements Joan Feigenbaum Paul Syverson

More information

Identifying and characterizing Sybils in the Tor network

Identifying and characterizing Sybils in the Tor network Identifying and characterizing Sybils in the Tor network August 12, 2016 USENIX Security Symposium Philipp Winter Princeton University and Karlstad University Roya Ensafi Princeton University Karsten Loesing

More information

A Traceback Attack on Freenet

A Traceback Attack on Freenet A Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract Freenet

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Overlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen

Overlay and P2P Networks. Unstructured networks: Freenet. Dr. Samu Varjonen Overlay and P2P Networks Unstructured networks: Freenet Dr. Samu Varjonen 1.2.2015 Contents Last week Napster Skype Gnutella BitTorrent and analysis This week: Freenet Introduction to structured networks

More information

Shadow: Real Applications, Simulated Networks. Dr. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Shadow: Real Applications, Simulated Networks. Dr. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems Shadow: Real Applications, Simulated Networks Dr. Rob Jansen Center for High Assurance Computer Systems Cyber Modeling and Simulation Technical Working Group Mark Center, Alexandria, VA October 25 th,

More information

R/Kademlia: Recursive and Topology-aware Overlay Routing

R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science. Masters Thesis

Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science. Masters Thesis Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Masters Thesis Experimental Comparison of Byzantine Fault Tolerant Distributed Hash Tables submitted by Supriti

More information

ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies

ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies ABSTRACT Prateek Mittal Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign

More information

Purpose and security analysis of RASTER

Purpose and security analysis of RASTER Purpose and security analysis of RASTER Oliver Gasser Advisor: Christian Grothoff Seminar Future Internet SS2010 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

A Routing Table Insertion (RTI) Attack on Freenet

A Routing Table Insertion (RTI) Attack on Freenet A Routing Table Insertion (RTI) Attack on Freenet Technical Report University of Hawaii at Manoa Project Members Todd Baumeister Yingfei Dong Zhenhai Duan Guanyu Tian Date 9/18/2012 1 Table of Contents

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Toward Improving Path Selection in Tor

Toward Improving Path Selection in Tor Toward Improving Path Selection in Tor Fallon Chen Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 203-00 Email: ftchen@cs.ucsd.edu Joseph Pasquale Department

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

ENEE 459-C Computer Security. Security protocols (continued)

ENEE 459-C Computer Security. Security protocols (continued) ENEE 459-C Computer Security Security protocols (continued) Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p

More information

Feasibility, Effectiveness, Performance and Potential Solutions on Distributed Content Sharing System

Feasibility, Effectiveness, Performance and Potential Solutions on Distributed Content Sharing System www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 1 January 2016, Page No. 15638-15649 Feasibility, Effectiveness, Performance and Potential Solutions

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

Information Leak in the Chord Lookup Protocol

Information Leak in the Chord Lookup Protocol Information Leak in the Chord Lookup Protocol Charles W. O Donnell Vinod Vaikuntanathan Massachusetts Institute of Technology August 25, 2004 4 th IEEE International Conference on Peer-to-Peer Computing

More information

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818

Security for Structured Peer-to-peer Overlay Networks. Acknowledgement. Outline. By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 Security for Structured Peer-to-peer Overlay Networks By Miguel Castro et al. OSDI 02 Presented by Shiping Chen in IT818 1 Acknowledgement Some of the following slides are borrowed from talks by Yun Mao

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed

More information

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson Tor: The Second-Generation Onion Router Roger Dingledine, Nick Mathewson, Paul Syverson Introduction Second Generation of Onion Routing Focus on deployability Perfect forward secrecy Separation of protocol

More information

Social Networking for Anonymous Communication Systems: A Survey

Social Networking for Anonymous Communication Systems: A Survey Social Networking for Anonymous Communication Systems: A Survey Rodolphe Marques Instituto de Telecomunicações Aveiro, Portugal rmarques@av.it.pt André Zúquete Universidade de Aveiro/IEETA Aveiro, Portugal

More information

The New Cell-Counting-Based Against Anonymous Proxy

The New Cell-Counting-Based Against Anonymous Proxy The New Cell-Counting-Based Against Anonymous Proxy Yadarthugalla Raju M.Tech Student, Department of CSE, Dr.K.V.S.R.I.T, Kurnool. K. Pavan Kumar Assistant Professor, Department of IT, Dr.K.V.S.R.I.T,

More information

Sybil defenses via social networks

Sybil defenses via social networks Sybil defenses via social networks Abhishek University of Oslo, Norway 19/04/2012 1 / 24 Sybil identities Single user pretends many fake/sybil identities i.e., creating multiple accounts observed in real-world

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.

More information

Freenet Darknet Mapping

Freenet Darknet Mapping Freenet Darknet Mapping K.C.N. Halvemaan University of Amsterdam System and Network Engineering Research Project 2 (#86) July 24, 2017 1 Introduction 2 Research question 3 Freenet 4 Related work 5 Method

More information

CS526: Information security

CS526: Information security Cristina Nita-Rotaru CS526: Information security Anonymity systems. Based on slides by Chi Bun Chan 1: Terminology. Anonymity Anonymity (``without name ) means that a person is not identifiable within

More information

Overlay Networks in ScaleNet

Overlay Networks in ScaleNet Overlay Networks in ScaleNet Dipl-Inform. Ingmar Baumgart Prof. Dr. Martina Zitterbart VDE ITG 5.2.1 Fachgruppentreffen, Ericsson, Aachen, 5.5.06, The ScaleNet Project : Scalable, efficient and flexible

More information

Coordinate-based Routing:

Coordinate-based Routing: Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing

More information

Analyzing the Dual-Path Peer-to-Peer Anonymous Approach

Analyzing the Dual-Path Peer-to-Peer Anonymous Approach Analyzing the Dual-Path Peer-to-Peer Anonymous Approach Ehsan Saboori K.N Toosi University of Technology Tehran, Iran Majid Rafigh Shahid Beheshti University (Former National University) Tehran, Iran Alireza

More information

Efficient and Secure Decentralized Network Size Estimation

Efficient and Secure Decentralized Network Size Estimation Efficient and Secure Decentralized Network Size Estimation Nathan Evans 1, Bartlomiej Polot 2, and Christian Grothoff 2 1 Symantec Research Labs, nathan evans@symantec.com 2 Free Secure Network Systems

More information

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance

More information

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring Onion Routing Varun Pandey Dept. of Computer Science, Virginia Tech 1 What is Onion Routing? a distributed overlay network to anonymize TCP based routing Circuit based (clients choose the circuit) Each

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Implications of Neighbor Selection on DHT Overlays

Implications of Neighbor Selection on DHT Overlays Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract

More information

Onion services. Philipp Winter Nov 30, 2015

Onion services. Philipp Winter Nov 30, 2015 Onion services Philipp Winter pwinter@cs.princeton.edu Nov 30, 2015 Quick introduction to Tor An overview of Tor Tor is a low-latency anonymity network Based on Syverson's onion routing......which is based

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

2 ND GENERATION ONION ROUTER

2 ND GENERATION ONION ROUTER 2 ND GENERATION ONION ROUTER Roger Dingledine, Nick Mathewson and Paul Syverson Presenter: Alejandro Villanueva Agenda Threat model Cells and circuits Other features Related work How does it work? Rendezvous

More information

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT 1 Avinash Chaudhari, 2 Pradeep Gamit 1 L.D. College of Engineering, Information Technology, Ahmedabad India 1 Chaudhari.avi4u@gmail.com,

More information

Anonymous communications: Crowds and Tor

Anonymous communications: Crowds and Tor Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Scalable Anonymous Communication with Provable Security

Scalable Anonymous Communication with Provable Security Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, {mittal2,nikita}@illinois.edu Carmela

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Ken Y.K. Hui John C. S. Lui David K.Y. Yau Dept. of Computer Science & Engineering Computer Science Department The Chinese

More information

Anonymity in Structured Peer-to-Peer Networks. Nikita Borisov and Jason Waddle

Anonymity in Structured Peer-to-Peer Networks. Nikita Borisov and Jason Waddle Anonymity in Structured Peer-to-Peer Networks Nikita Borisov and Jason Waddle Introduction Existing P2P systems offer anonymity or structured routing, but not both We aim to investigate the interaction

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

DHT Overview. P2P: Advanced Topics Filesystems over DHTs and P2P research. How to build applications over DHTS. What we would like to have..

DHT Overview. P2P: Advanced Topics Filesystems over DHTs and P2P research. How to build applications over DHTS. What we would like to have.. DHT Overview P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar DHTs provide a simple primitive put (key,value) get (key) Data/Nodes distributed over a key-space High-level idea: Move

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

TSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs

TSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs TSAR : A Two Tier Sensor Storage Architecture using Interval Skip Graphs Authors: Peter Desnoyers, Deepak Ganesan, Prashant Shenoy ( University of Massachusetts, Amherst, MA) Presented by: Nikhil Raghavan

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

Pisces: Anonymous Communication Using Social Networks

Pisces: Anonymous Communication Using Social Networks Pisces: Anonymous Communication Using Social Networks Prateek Mittal University of California, Berkeley pmittal@eecs.berkeley.edu Matthew Wright University of Texas at Arlington mwright@cse.uta.edu Nikita

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

Motivation for peer-to-peer

Motivation for peer-to-peer Peer-to-peer systems INF 5040 autumn 2015 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Ø Inherent restrictions of the standard client/ server model

More information

Improving Search In Peer-to-Peer Systems

Improving Search In Peer-to-Peer Systems Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003 Goals Present alternative searching methods for systems with loose integrity constraints Probabilistically optimize over

More information

PrivCount: A Distributed System for Safely Measuring Tor

PrivCount: A Distributed System for Safely Measuring Tor PrivCount: A Distributed System for Safely Measuring Tor Rob Jansen Center for High Assurance Computer Systems Invited Talk, October 4 th, 2016 University of Oregon Department of Computer and Information

More information

Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services

Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services Albert Kwon 1 Mashael Saad Al-Sabah 123 David Lazar 1 Marc Dacier 2 Srinivas Devadas 1 1 CSAIL/MIT 2 Qatar Computing Research

More information

Anonymity. Christian Grothoff.

Anonymity. Christian Grothoff. Anonymity christian@grothoff.org http://grothoff.org/christian/ You look at this and you say this is insane. It s insane. And if it is only Hollywood that has to deal with this, OK, that s fine. Let them

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Slides for Chapter 10: Peer-to-Peer Systems

Slides for Chapter 10: Peer-to-Peer Systems Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Overview of Chapter Introduction Napster

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

FreeNet. A Distributed Anonymous Information Storage and Retrieval System. Presented By Xiao Wei-Cheng

FreeNet. A Distributed Anonymous Information Storage and Retrieval System. Presented By Xiao Wei-Cheng FreeNet A Distributed Anonymous Information Storage and Retrieval System Presented By Xiao Wei-Cheng 2004.04.06 Outline Introduction Architecture Keys and searching files Inserting, Storing, Retrieving,

More information

Distributed hash table - Wikipedia, the free encyclopedia

Distributed hash table - Wikipedia, the free encyclopedia Page 1 sur 6 Distributed hash table From Wikipedia, the free encyclopedia Distributed hash tables (DHTs) are a class of decentralized distributed systems that provide a lookup service similar to a hash

More information

Chapter 10: Peer-to-Peer Systems

Chapter 10: Peer-to-Peer Systems Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources

More information

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms EJ Jung Goals 1. Hide what you wrote encryption of any kind symmetric/asymmetric/stream 2. Hide to whom you sent and when pseudonym?

More information

Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies

Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies Gerald Fry and Richard West Boston University Boston, MA 02215 {gfry,richwest}@cs.bu.edu Introduction Internet growth

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information