‘SECURITY ISSUES OF P2P COMPUTING’ Presented By Sravan K Abbaraju CS - 843.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Chapter 12 Network Security.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Computer Networks IGCSE ICT Section 4.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
A Brief Taxonomy of Firewalls
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
By : Windi Widiastuti XII TKJ  DEFINITION.
Introduction Widespread unstructured P2P network
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Firewalls Julie Petrusa S.A.M. Matiur Rahman Carlo Mormina.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
The Intranet.
FastTrack Network & Applications (KaZaA & Morpheus)
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Computer Data Security & Privacy
Firewalls Jiang Long Spring 2002.
FIREWALL.
Presentation transcript:

‘SECURITY ISSUES OF P2P COMPUTING’ Presented By Sravan K Abbaraju CS - 843

Introduction Definition Users share information No centralized Server Scalable & Fault tolerant Applications beyond file sharing like multicast systems, anonymous communication systems, and web caches May be already running on your network

Different P2P Frameworks Centralized Frameworks – Controls network access & directs communication e.g.: Napster Decentralized Frameworks – A user has no control over which clients are allowed e.g.: Gnutella, Searching takes a long time Controlled Decentralized Frameworks – server operators control which clients are allowed to access a server e.g.: Morpheus, judicious use of metadata (XML descriptors)to describe the contents of files. Speed of query engine is high

Notes: A firewall is a process that filters traffic between a protected "inside" network and a less trustworthy "outside" network. A firewall implements security policy. An example would be preventing all access from outside coming in and but allowing traffic to go out or to permit access only from certain places, from certain users on certain activities. In implementing a firewall, two approaches are taken. The first is to allow all services to pass by default with the exception of those services that have been identified as disallowed. The second is the classic model used in all areas of information security. It is a stringent approach, allowing access only to identified services. In implementing a firewall, all traffic to and from a network has to pass through a specific entry/exit point. The result of all this would be a process that prevents unwanted and unauthorized communication into or out of the network.

Notes: Firewalls are not exclusive to the Internet. In a company with multiple LAN's, the administrator of LAN 1 may know that his LAN is secure but can he really be sure of LAN2 in another department is secure. Typically, anything outside an immediate LAN should be deemed "untrustworthy". In effect, any point of entry into a trusted network is justification to a firewall.

Notes: What is required are ways to implement security when information traverses the local "trusted" boundaries and ventures on into the unknown. What we need are tools that help us implement security. One of these tools is firewall.

Notes: This is by far the most secure configuration. Notice once again, the screening router and the proxy firewall are on their own LANs. This configuration combines packet filtering and proxy servers. The router filters and blocks inherently dangerous packets. It rejects or accepts packets based on the following criteria: 1. If the traffic is originating from outside the system, only traffic addressed to the application gateway is passed on. 2. The proxy server filters the traffic based on defined proxies. 3. All traffic from within the system can only come from the proxy server.

Distributed computing uses of P2P  Sharing of unused computing resources  Distributed computing (also referred to as grid computing) harnesses the idle processing cycles of the PCs on a network e.g.: (15 teraflop machine)  If taken to its logical conclusion, one can imagine a world where many personal files may no longer be on your hard drive, or even on a central server somewhere on the Internet, but on somebody else's hard drive in, say, Topeka (presumably encrypted and secure). And they will stay on that computer only as long as there is room for it there; they'll be moved around by an intelligent, almost self- regulating, network as the need arises.

Pros and Cons of P2P Advantages: Scalability Strong Affinity groups Low Costs Disadvantages: Image of p2p Technology Limitations Security

P2P THREAT Old friends such as Worm and Viruses e.g.: Gnuman/W32 worm, Hello.exe virus Bugs in AOL (AIM) DOS, password and data theft Violating intellectual property laws Violating corporate security policies Defeat “one way only” firewall behavior-Rendezvous server

Other issues related to P2P Rather than being designed specifically for the purpose of sharing unlawful music, these systems provide a powerful platform for the construction of a variety of decentralized services, including network storage, content distribution, web caching, searching and indexing, and application-level multicast Ejecting misbehaving nodes Storage Distributed Auditing Fairness issues Trust issues

Conclusion While the issues, surrounding peer-to-peer computing will not be resolved any time in the near future, and there will continue to be significant legal and regulatory battles over the rights of copyright holder, this new technology offers both benefits and worries to the content and code community. Business uses within firewalls should not be tarred with the same brush as uncontrolled file sharing.

References 1. Michael Hurwicz, Network Magazine "http: // :// magazine.com/article", John Leyden, "Security fears are barrier for P2P networking take-off", The Register, white paper, July 31, Dan S Wallach, “A Survey of peer – to – peer security issues”, Rice University, Houston, A. S. Tanenbaum: "Computer Networks", Prentice-Hall International, 1996.