Presentation is loading. Please wait.

Presentation is loading. Please wait.

Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.

Similar presentations


Presentation on theme: "Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri."— Presentation transcript:

1 Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri

2 What is peer to peer communication Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session. Each communication node has both server and client capabilities. Napster and Gnutella are examples of this kind of peer-to-peer software

3 How does P2P Work Peer to Peer communication consists of get requests, replies, and file transfers. Most of these programs currently use default ports, but can automatically or manually be set to use different ports User must first download and execute a peer-to-peer networking program.

4 How does P2P work (cont.) User enters the IP address of another computer belonging to the network Computer finds another network member on-line and connect to that user's connection Users can choose how many member connections to seek at one time

5 Vulnerabilities 3types of vulnerabilities exist when using P2P software. - Technical vulnerabilities are those that can be exploited remotely - Social vulnerabilities are those that are exploited by altering or masquerading - Legal vulnerabilities are those that can result from copyright infringement

6 Determining Vulnerabilities Monitoring traffic for common ports used by the software Searching traffic for certain application layer strings commonly used by P2P software Scan network storage locations for content commonly downloaded by users

7 Protection Against Vulnerabilities Enforce a policy against the downloading of copyrighted material Acceptable use policy for the corporate Internet connection Regular scanning of network storage and company workstations for unauthorized materials Network restrictions

8 References http://www.sans.org/top20/#w9 http://searchnetworking.techtarget.com /sDefinition/0,,sid7_gci212769,00.html http://h50043.www5.hp.com/psg/event s/relatedfile/SG/E236159AI%20Public.p df http://www.carnet.hr/cuc/tnc- cuc2003/program/slides/s3c1.pdf

9 Thank You Any Questions???


Download ppt "Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri."

Similar presentations


Ads by Google