116 research outputs found
Monitoring Challenges and Approaches for P2P File-Sharing Systems
Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University of Washington campus network found that file-sharing accounted for more than treble the volume of Web traffic observed, thus affirming the significance of P2P in the context of Internet traffic. Empirical studies of P2P traffic are essential for supporting the design of next-generation P2P systems, informing the provisioning of network infrastructure and underpinning the policing of P2P systems. The latter is of particular significance as P2P file-sharing systems have been implicated in supporting criminal behaviour including copyright infringement and the distribution of illegal pornograph
Peer-to-peer:is deviant behavior the norm on P2P file-sharing networks?
P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of scalability concerns and legal issues, such networks are moving away from the semicentralized approach that Napster typifies toward more scalable and anonymous decentralized P2P architectures. Because they lack any central authority, these networks provide a new, interesting context for the expression of human social behavior. However, the activities of P2P community members are sometimes at odds with what real-world authorities consider acceptable. One example is the use of P2P networks to distribute illegal pornography. To gauge the form and extent of P2P-based sharing of illegal pornography, we analyzed pornography-related resource-discovery traffic in the Gnutella P2P network. We found that a small yet significant proportion of Gnutella activity relates to illegal pornography: for example, 1.6 percent of searches and 2.4 percent of responses are for this type of material. But does this imply that such activity is widespread in the file-sharing population? On the contrary, our results show that a small yet particularly active subcommunity of users searches for and distributes illegal pornography, but it isn't a behavioral norm
Mitigating Free Riding in Peer-To-Peer Networks: Game Theory Approach
The performance of peer-to-peer systems is based on the quality and quantity of resource contributions from participating peers. In most systems, users are assumed to be cooperative, but in reality, sharing in peer-to-peer systems is faced with the problem of free riding. In this paper, we model the interactions between peers as a modified gift giving game and proposed an utility exchange incentive mechanism to inhibit free riding. This technique allows peers to either upload or download resources based on their best strategy and interest. Through extensive simulations, we show that this mechanism can increase fairness and encourage resource contribution by peers to the network. This will ensure a resourceful and stable peer- to-peer systems.http://dx.doi.org/10.4314/njt.v34i2.2
A framework for the dynamic management of Peer-to-Peer overlays
Peer-to-Peer (P2P) applications have been associated with inefficient operation, interference with other network services and large operational costs for network providers. This thesis presents a framework which can help ISPs address these issues by means of intelligent management of peer behaviour. The proposed approach involves limited control of P2P overlays without interfering with the fundamental characteristics of peer autonomy and decentralised operation.
At the core of the management framework lays the Active Virtual Peer (AVP). Essentially intelligent peers operated by the network providers, the AVPs interact with the overlay from within, minimising redundant or inefficient traffic, enhancing overlay stability and facilitating the efficient and balanced use of available peer and network resources. They offer an âinsiderâsâ view of the overlay and permit the management of P2P functions in a compatible and non-intrusive manner. AVPs can support multiple P2P protocols and coordinate to perform functions collectively.
To account for the multi-faceted nature of P2P applications and allow the incorporation of modern techniques and protocols as they appear, the framework is based on a modular architecture. Core modules for overlay control and transit traffic minimisation are presented. Towards the latter, a number of suitable P2P content caching strategies are proposed.
Using a purpose-built P2P network simulator and small-scale experiments, it is demonstrated that the introduction of AVPs inside the network can significantly reduce inter-AS traffic, minimise costly multi-hop flows, increase overlay stability and load-balancing and offer improved peer transfer performance
Controlling P2P File-Sharing Networks Traffic
Since the appearance of Peer-To-Peer (P2P) file-sharing networks some time ago, many
Internet users have chosen this technology to share and search programs, videos, music,
documents, etc. The total number of P2P file-sharing users has been increasing and
decreasing in the last decade depending on the creation or end of some well known P2P
file-sharing systems. P2P file-sharing networks traffic is currently overloading some data
networks and it is a major headache for network administrators because it is difficult to
control this kind of traffic (mainly because some P2P file-sharing networks encrypt their
messages). This paper deals with the analysis, taxonomy and characterization of eight Public
P2P file-sharing networks: Gnutella, Freeenet, Soulseek, BitTorrent, Opennap, eDonkey,
MP2P and FastTrack. These eight most popular networks have been selected due to their
different type of working architecture. Then, we will show the amount of users, files and the
size of files inside these file-sharing networks. Finally, several network configurations are
presented in order to control P2P file-sharing traffic in the network.GarcĂa Pineda, M.; Hammoumi, M.; Canovas Solbes, A.; Lloret, J. (2011). Controlling P2P File-Sharing Networks Traffic. Network Protocols and Algorithms. 3(4):54-92. doi:10.5296/npa.v3i4.1365S54923
Spiral Walk on Triangular Meshes : Adaptive Replication in Data P2P Networks
We introduce a decentralized replication strategy for peer-to-peer file
exchange based on exhaustive exploration of the neighborhood of any node in the
network. The replication scheme lets the replicas evenly populate the network
mesh, while regulating the total number of replicas at the same time. This is
achieved by self adaptation to entering or leaving of nodes. Exhaustive
exploration is achieved by a spiral walk algorithm that generates a number of
messages linearly proportional to the number of visited nodes. It requires a
dedicated topology (a triangular mesh on a closed surface). We introduce
protocols for node connection and departure that maintain the triangular mesh
at low computational and bandwidth cost. Search efficiency is increased using a
mechanism based on dynamically allocated super peers. We conclude with a
discussion on experimental validation results
Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies
The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet
protocols and networks lend themselves well to being exploited by criminals to
execute a large range of cybercrimes. The types of crimes aided by P2P
technology include copyright infringement, sharing of illicit images of
children, fraud, hacking/cracking, denial of service attacks and virus/malware
propagation through the use of a variety of worms, botnets, malware, viruses
and P2P file sharing. This project is focused on study of active P2P nodes
along with the analysis of the undocumented communication methods employed in
many of these large unstructured networks. This is achieved through the design
and implementation of an efficient P2P monitoring and crawling toolset. The
requirement for investigating P2P based systems is not limited to the more
obvious cybercrimes listed above, as many legitimate P2P based applications may
also be pertinent to a digital forensic investigation, e.g, voice over IP,
instant messaging, etc. Investigating these networks has become increasingly
difficult due to the broad range of network topologies and the ever increasing
and evolving range of P2P based applications. In this work we introduce the
Universal P2P Network Investigation Framework (UP2PNIF), a framework which
enables significantly faster and less labour intensive investigation of newly
discovered P2P networks through the exploitation of the commonalities in P2P
network functionality. In combination with a reference database of known
network characteristics, it is envisioned that any known P2P network can be
instantly investigated using the framework, which can intelligently determine
the best investigation methodology and greatly expedite the evidence gathering
process. A proof of concept tool was developed for conducting investigations on
the BitTorrent network.Comment: This is a thesis submitted in fulfilment of a PhD in Digital
Forensics and Cybercrime Investigation in the School of Computer Science,
University College Dublin in October 201
- âŚ