The Current Landscape of P2P File Sharing: Challenges and Future Directions Kevin Bauer Ph.D. candidate University of Colorado.

Slides:



Advertisements
Similar presentations
Peter R. Pietzuch Peer-to-Peer Computing – or how to make your BitTorrent downloads go faster... Peter Pietzuch Large-Scale Distributed.
Advertisements

Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation Kevin Bauer 1 Micah Sherr 2 Damon McCoy 3 Dirk Grunwald 4 1 University of Waterloo 2.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
One-Click Hosting Services: A File-Sharing Hideout Demetris Antoniades Evangelos P. Markatos ICS-FORTH Heraklion,
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
The Bittorrent Protocol
P2P File Sharing Systems
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
1 Proceeding the Second Exercises on Computer and Systems Engineering Professor OKAMURA Laboratory. Othman Othman M.M.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
1 One-Click Hosting Services: A File-Sharing Hideout Demetris Antoniades Evangelos P. Markatos ICS-FORTH Heraklion,
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
P2P Investigation PEDRO GALLEGOS. Topics  Overview of P2P  Direct vs Hearsay  Investigation Steps  Analysis Gnutella Protocol  RoundUp.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 PPSP Protocol Considerations.
V IDEO D ISCUSSION 1: C OPYRIGHT AND P2P A PPLICATIONS 23 Sep DT052.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Internet Architecture and Governance
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Victor Farbman and Maxim Trosman Under guidance of Amichai Shulman.
Topics for iWORK 2005(st)
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Harnessing P2P Power in the Classroom Julita Vassileva Department of Computer Science University of Saskatchewan, Canada.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
05 - P2P applications and Sockets
An example of peer-to-peer application
NET 536 Network Security Firewalls and VPN
Shane Alcock and Richard Nelson University of Waikato
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Privacy Through Anonymous Connection and Browsing
Anupam Das , Nikita Borisov
PEER TO PEER BitTorrent.
The BitTorrent Protocol
Computer Networks Protocols
Chapter 2 Application Layer
Presentation transcript:

The Current Landscape of P2P File Sharing: Challenges and Future Directions Kevin Bauer Ph.D. candidate University of Colorado

Talk Outline P2P background Past P2P investigations Evading investigations with anonymity tools Alternate techniques to identify file sharers An emerging threat: “One-click” hosting services Proposal for a future study 1

Context: The Rise of Peer-to-Peer 2000: Peer-to-peer (P2P) protocols like Gnutella, FastTrack, Napster, & BitTorrent becoming popular for file sharing : Early Internet saw mostly web traffic 2006-Present: P2P traffic growing Source: CacheLogic Research January Web FTP Peer-to-Peer

Current P2P Landscape Source: Ipoque Internet Study 2008/2009 P2P still most common protocol class in 2008/2009 BitTorrent dominates P2P around the world 3

BitTorrent Background 1.Download torrent metadata for the file one wants to obtain 2.Contact tracker server to get peer list 3.Interact with other peers to share parts of the file File sharer Torrent metadata Peer list Implicitly register with tracker 4

What Kind of Content is Shared? Source: Ipoque Internet Study 2008/2009

Past Copyright Investigations Experience has shown that BitTorrent is often used to distribute copyright-protected media files Copyright holders hire investigators to identify and even prosecute suspected file sharers Investigators can query tracker for peer list Distribute DMCA take-down letters (US) to each IP address 6 Ping each peer’s IP address Copyright investigators Source: Piatek et al., HotSec 2008

Past Copyright Investigations Tracker lists can be corrupted with arbitrary IP addresses – Example: Register any IP addresses to the tracker lists Tracker lists cannot be trusted to prove file sharing 7 Source: Piatek et al., HotSec 2008 Copyright investigators

Consumer Advocate Reactions 8

Virtual Private Network Anonymizers Anonymous VPN services (BTGuard, IPREDator) are now available 9 Encrypted tunnel mitigates traffic shaping Hides identity Limitations of centralized VPN approach: 1.Technically feasible to know and disclose both client and destination 2.Susceptible to legal pressure Single-hop VPN service

Defeating Peer Identification with Strong Anonymity: Tor Client (file sharer) Destination Entry Guard Middle Router Exit Router Directory Server Circuit Router List Tor provides anonymity for TCP by tunneling traffic through a virtual circuit of three Tor routers using layered encryption 10 Tracker First hop knows the client Last hop knows the destination Tor Network Copyright investigators

Can BitTorrent Users Hide with Tor? We characterized how Tor is used in practice and observed significant BitTorrent traffic over a four day observation period Only 3.33%, but over 400,000 connections 11 Source: McCoy et al., Privacy Enhancing Technologies Symposium 2008

Can BitTorrent Users Hide with Tor? BitTorrent is using a disproportionate amount of Tor’s available bandwidth Over 40% of all Tor traffic 12 Source: McCoy et al., Privacy Enhancing Technologies Symposium 2008

Alternatives for Peer Identification 13 Tracker list queries are efficient, but not accurate Instead, we could download the entire file from every peer Accuracy Efficiency Accurate, but inefficient We want a technique that is accurate, but still efficient Worst Best

Identification Through Active Probing Our method accurately and efficiently collects concrete forensic evidence of a peer’s participation in file sharing 14 Obtain list of suspected peers from tracker Attempt a TCP connection Attempt handshake exchangeAttempt bitfield exchangeRequest a 16 KB data block Increasingly strong levels of evidence Peer is alive and listening on correct TCP port Peer speaks BitTorrent, provides SHA1 hash describing content being shared Provides list of all pieces that the peer possesses Concrete file data can be verified as the expected data

Experimental Setup We evaluate our approach with 10 real, large BitTorrent file shares – Popular TV shows and movies 15 Source: Bauer et al., 1 st IEEE International Workshop on Information Forensics and Security 2009

Fraction of Peers that Respond to Probes Repeating the probing increases the fraction that respond Over ten repetitions: – TCP connections: 26 – 44% – Handshakes and Bitfields: 18 – 36% – Block requests: 0.6 – 2.4% 16 Average fraction of peers identified by each probe type Low because of BitTorrent’s reciprocity mechanisms

Tides are Changing from P2P Back to HTTP 17 Source: CacheLogic Research 2006 P2P 2006: P2P made up 70% of traffic 2008/2009: P2P made up 43-70% of traffic Source: Ipoque Internet Study 2008/ /2010: P2P makes up < 14% of traffic HTTP makes up 57% of traffic Source: Maier et al., ACM Internet Measurement Conference 2009

Beyond P2P: “One-Click” Hosting Services 18 Example “one-click” hosting services: Source: Maier et al., ACM Internet Measurement Conference 2009 Distribution of HTTP Content Types Most Popular HTTP Destination Types

Beyond P2P: “One-Click” Hosting Services 19 Step 1. Transfer file to RapidShare Step 2. Give uploader a URL for file Step 3. Post URL to indexing site Upload user Download user Indexing site “One-click” hosting service Step 4. Search Step 5. Download

RapidShare vs. BitTorrent Throughput One-Click Hosting vs. BitTorrent 20 Content Availability for RapidShare vs. BitTorrent Fraction of Content Copyrighted (n=100) Source: Antoniades et al., ACM Internet Measurement Conference 2009

A Proposal for a Future Study File sharing trends change quickly We want to conduct a study aimed at identifying emerging file sharing trends One avenue of future study: 21 P2P traffic declined from > 43% in 2008 to < 14% in 2009/2010 The Road (2009) Up in the Air (2009)

Summary and Conclusion P2P is being replaced by file hosting services New investigative tools need to be developed to curb this new type of illegal file sharing – Monitor hosting sites for copyright-protected content – Partner with ISPs to identify file uploaders Up-to-date information on emerging file sharing trends is essential to proactively implement effective countermeasures 22

Questions? Kevin Bauer Department of Computer Science, University of Colorado 23

References Demetris Antoniades, Evangelos P. Markatos, Constantine Dovrolis. One-click hosting services: a file-sharing hideout. Proceedings of the 9 th ACM SIGCOMM conference on Internet measurement Kevin Bauer, Dirk Grunwald, Douglas Sicker. The Challenges of Stopping Illegal Peer-to-Peer File Sharing. National Cable & Telecommunications Association Technical Papers Kevin Bauer, Dirk Grunwald, Douglas Sicker. The Arms Race in P2P. 37 th Research Conference on Communication, Information, and Internet Policy (TPRC) Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker. BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic. 1 st IEEE International Workshop on Information Forensics and Security Gregor Maier, Anja Reldmann, Vern Paxson, Mark Allman. On dominant characteristics of residential broadband Internet traffic. Proceedings of the 9 th ACM SIGCOMM conference on Internet measurement Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker. Shining Light in Dark Places: Understanding the Tor Network. 8 th Privacy Enhancing Technologies Symposium Michael Piatek, Tadayoshi Kohno, Arvind Krishnamurthy. Challenges and Directions for Monitoring P2P File Sharing Networks –or– Why My Printer Received a DMCA Takedown Notice. 3 rd USENIX Workshop on Hot Topics in Security Ipoque Internet Study 2008/ _ _2009 P2P File Sharing-The Evolving Distribution Chain. CacheLogic Research