- Content Security in P2P

Similar documents
Peer-to-Peer Internet Applications: A Review

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

1(11) Peer to peer networking

P2P Networks - General

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.

Introduction to Security. Computer Networks Term A15

Unit background and administrivia. Foundations of Peer-to- Peer Applications & Systems

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Course Curriculum for Master Degree in Network Engineering and Security

Peer-to-peer & Energy Consumption

Peer-to-Peer Networks

Peer-to-peer systems and overlay networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Finding and Supporting Collaboration Needs and Opportunities

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Introduction to Peer-to-Peer Systems

GCIH. GIAC Certified Incident Handler.

Elementary Computing CSC 100. M. Cheng, Computer Science

Ethical Hacking and Prevention

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:

Scaling Problem Computer Networking. Lecture 23: Peer-Peer Systems. Fall P2P System. Why p2p?

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

NetDefend Firewall UTM Services

Peer-to-Peer Computing

Cyber Security Practice Questions. Varying Difficulty

Fast Traffic Tactics

Mobile Peer-to-Peer Business Models T Network Services Business Models. Mikko Heikkinen

Why Highly Distributed Computing Matters. Tom Leighton, Chief Scientist Mike Afergan, Chief Technology Officer J.D. Sherman, Chief Financial Officer

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Overview Computer Networking Lecture 17: Delivering Content Peer to Peer Examples Peter Steenkiste

Unit 2 Assignment 2. Software Utilities?

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Unit 8 Peer-to-Peer Networking

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

end systems, access networks, links circuit switching, packet switching, network structure

Indian Journal of Science and Technology Vol. 5 No. 7 (July 2012) ISSN:

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

Making Gnutella-like P2P Systems Scalable

EE 122: Peer-to-Peer Networks

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Extreme Computing. BitTorrent and incentive-based overlay networks.

Content Search. Unstructured P2P

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Georges Da Costa Introduction on Peer to Peer systems

IJITKM Special Issue (ICFTEM-2014) May 2014 pp (ISSN )

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

Network Security Fundamentals

Peer-to-Peer Architectures and Signaling. Agenda

Content Search. Unstructured P2P. Jukka K. Nurminen

A Server-mediated Peer-to-peer System

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?

Peer-to-Peer Applications Reading: 9.4

Distributed Knowledge Organization and Peer-to-Peer Networks

ITU-T Workshop on Multimedia in NGN

Systems and Network Security (NETW-1002)

Introduction and Overview. Why CSCI 454/554?

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Wide Area Networking Technologies

Broadband Internet Access Disclosure

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

USG2110 Unified Security Gateways

Malware, , Database Security

Chapter 10: Security and Ethical Challenges of E-Business

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

DNS Security. Ch 1: The Importance of DNS Security. Updated

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Chapter 2: Application layer

Peer-to-Peer Signalling. Agenda

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

CIH

From Packet Blasting to Application and Service Awareness Testing

DumpsTorrent. Latest dumps torrent provider, real dumps

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

Peer-to-Peer Protocols and Systems. TA: David Murray Spring /19/2006

Experimental Study of Skype. Skype Peer-to-Peer VoIP System

The process by which a user can associate specific permissions to each username.

Cyber Criminal Methods & Prevention Techniques. By

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

The Influence of the Internet

SECURITY ISSUES IN P2P NETWORK USING ANALYSIS OF STREAMING SERVICES

ACN Peer-to-Peer Networks. Günther Langmann

Applied Architectures, Part 2

e-commerce Study Guide Test 2. Security Chapter 10

CSci530 Final Exam. Fall 2014

Certified Ethical Hacker (CEH)

MASTER DEGREE COMPUTER SCIENCE COMPUTER SCIENCE AND NETWORKING. Peer to Peer Systems LAURA RICCI 2/5/2011

Scaling Problem Millions of clients! server and network meltdown. Peer-to-Peer. P2P System Why p2p?

Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer

Outline. Peer-to-Peer. P2p file-sharing. Wither p2p? What s out there? The p2p challenge C1: Search(human s goals) -> file

Computer Security. Solutions

(C) Chukiat Worasucheep 1

Transcription:

Why Jenny can t share the content with Jane? - Content Security in P2P Heather Yu Huawei Technologies heathery@ieee.org Future of Networked Home A vision voice video text Data gaming IPTV streaming IM Applications Internet Devices/ appliances P2P Content Security, WOCC2007

The World of Content Sharing Napster made its debut in 1999 P2P content sharing became immensely popular 200million users downloading sw using KaZaA >5million BitTorrent population ~ 10million Gnutella, FastTrack, edonkey 50%-75% Internet traffic Skype Oct. 2006 135,900,000 world wide 21,744,000 in US Total revenue $50million in last quarter of 2006 6.6 billion skype-to-skype minutes 1.1 billion skype-out minutes

P2P Overlay Multicast and Streaming PPLive 12/2004, created at Huazhong Univ. of Science and Tech., China P2P television network Largest live multimedia streaming system in the world 12/2005, 20million downloads 400,000 aggregated users/day 1 overlay/channel; 400+ channels; thousands of peers/channel at peek 200,000 peers at Chinese New Year2006 Why Is It So Popular Free content Opportunity for high availability and scalability Provide user ability to locate and obtain a wide variety of content Fueled academic research

What s Against P2P Low and asymmetric bandwidth ADSL - 1.4Mbps down, 400Kbps up Cable modems - 1.5-3Mbps down, 400-600Kbps up Best effort service insufficient for most applications Lack of interoperability Law suits against service provider and users Lack of trust, security, DRM mechanisms Skype Hybrid Supernode & ordinary node Privacy Specify privacy level only allow calls from contact list Virus, worm, spyware, fishing, No protection Firewalls Allow calls to go through firewall Skype central server issue Digital Certificate based on user name and password Establish identity Skype messages encrypted end-to-end

Content security is not just a technology problem Lawsuit, lawsuit, lawsuit

Outline P2P Content Security Open Problems P2P Content Security in OM How to Win the Game in the P2P War P2P Content Security

Security a Barrier to P2P Adoption The downside Distributed in nature, wide availability of replicated objects Exposed to network poison, distributed viruses worms, Trojan horses, or spyware Existing client-server based security tech. does not apply to p2p Hard to make those with different security systems on different platforms and etc. to interoperate When go through firewall to public net, security and privacy issues go up several orders of magnitude Fairness issues in resource sharing Free content distribution, free malicious/fake content Hijacking of queries, denial of service Trust and privacy issues Looking Forward Content Security Tracing Auditing/reputation Incentive mechanisms Distributed/relay trust Scalable content protection scheme Distributed mechanism for authentication Distributed message encryption P2P key management Secure message forwarding Content authentication Access control

The Hopeful The upside information is distributed no convenient point of attack for intruders Smaller damage of DoS attack P2P Content Security in OM - Secure Message Forwarding

Attacks and Anti-attacks Goals of Attacks Stole data/false data forwarding Traffic analysis Resource abuse/manipulation by selfish peer Network overlay application layer Secure overlay routing Best-effort service malicious peers many opp. to corrupt content/p2p communications at overlay Sybil attack, node ID attack, routing table attacks, DoS, overlay partition attacks, data placement attack, message forwarding attack, traffic analysis, unmerited resource sharing overlay level attack Ensure integrity and authenticity of data Network poisoning, returning false data to query application level attack Stole Content via NodeID Attack To obtain a specific nodeid Max probability to be closer to an object/content Mediate victim s access to content/censor content object Straightforward anti-attack mechanism Centralized certificate authority? How to assign random nodeids securely w/o centralized authority

False Content via Message Forwarding Attacks Attacks Network poison Query hijacking Message hijacking On the road message swapping Secure message forwarding Ensure at least one copy of a message sent to a key(peer) reaches the correct peer with high probability Secure Message Forwarding Previous art Failure testing Replicated messaging through multiple routes Random route Real time constraint, cost

P2P will play a key role in next-gen networks & business applications How can we make it possible for Jenny to share the content w/ Jane in a way that is easy and convenient

Protect content w/o hijacking user convenience Jenney will be able to share the content w/ Jane! The Possibilities, Diff. Approach? Can security be improved by? Can we?