DNA of Peer to Peer Communication

19
right 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com www.cyberoam.com Our Products © Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Network Security Appliances - UTM, NGFW (Hardware & Virtual) Modem Router Integrated Security appliance Presenter: Ravindra Krishna Manager - Pre Sales DNA of Peer-to-Peer Communication

description

Peer-to-peer communication has been a major security risk for businesses and individuals alike. Internet users who use P2P software applications or networks to share entertainment content like music, pictures and video face security risks like involuntary publishing of private information, exposure to viruses, worms and spyware. However, peer-to-peer networks and applications now see growing adoption in other verticals for collaborative and other more advanced usage such as e-commerce and P2P payment systems. P2P has evolved beyond file sharing of entertainment content. Emergence of disruptive technologies such as Skype further changed the way P2P could be seen. Through this webinar Cyberoam explains the evolution of P2P networks and apps and aims to share how peer-to-peer industry dynamics are contributing to the security problem over a two-part webinar.

Transcript of DNA of Peer to Peer Communication

Page 1: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

www.cyberoam.com

Our Products

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.

Network Security Appliances - UTM, NGFW (Hardware & Virtual)

Modem Router Integrated Security appliance

Presenter: Ravindra KrishnaManager - Pre Sales

DNA of Peer-to-Peer Communication

Page 2: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Agenda of presentation

Client – Server architecture P2P-Overview, advantages & Utilization P2P architecture and types Protocols used in P2P Advantages and disadvantages of P2P Next Thursday

Page 3: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Client-Server ArchitectureClient-Server Architecture

Resources

Number of nodes

Server Cluster

More Reliable

Client Server

Centralized Authority

Scalability

Setup and Maintenance

Cost

Page 4: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

P2P - IntroductionP2P - Introduction

Decentralized Distributed architecture

NodesSupplier/Receiver Receiver/Supplier

Page 5: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

P2P communicationP2P communication

Autonomity Dynamic Discovery of Information Least Maintenance Scalability Load Distribution Every one can share and receive data

at same time Unreliable Resistant to DOS attack But More security Concerns

Utilization of Edge resources- CPU cycles - Bandwidth- Storage Space - Data - People- Camera, Microphone, Sensor, Service

Resources

Number of nodes

MobilePager

Server

Laptop

Desktop

Page 6: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Utilization of P2P communicationUtilization of P2P communication

Bioinformatics

Education and academic

Military

Business

Television

Telecommunication

Page 7: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Importance of P2P todayImportance of P2P today

Project

The new Web Real-Time Communications Working Group responsible for developing standards like HTML and HTTP that drive the Web—has set up a new working group that, among other things, currently developing capabilities / APIs / standards for peer-to-peer (P2P) communications between browsers.

The technology would enable P2P applications to run inside a Web browser without plug-ins or additional downloads.

from

Page 8: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Importance of P2P todayImportance of P2P today

New America Foundation—recently received a US $2 million grant from the Department of State to help coordinate its MANET development effort, called Commotion Wireless.

Aimed at enabling P2P-based Mobile Social Media Delivery Methodology. Commotion aims to build a new type of tool for democratic organizing: an open source “device-as-infrastructure” distributed communications platform that integrates users’ existing cell phones, WiFi-enabled computers, and other WiFi-capable personal devices to create a metro-scale peer-to-peer (mesh) communications network.

Mobile Ad-Hoc Network | MANET initiative

Page 9: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Classification of P2P communicationClassification of P2P communication

Centralized - NAPSTER

Decentralized - Gnutella

Structured Overlay

Unstructured Overlay

Hybrid

Page 10: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Centralized - NapsterCentralized - Napster

Title User Speed

song1 User1 DSL

song2 user1 T1

song3 user2 28.8

song4 user3 28.8

song 5 user4 DSL

song 6 User5 T1

song6 User6 28.8

Server ( broker ) runs on port 8888 or 7777.

User1song1.mp3song2.mp3song3.mp3

User5song4.mp3song5.mp3song6.mp3

User6song5.mp3Song6.mp3song7.mp3

Query for song 5

List of users with speed

Direct P2P Connection

Page 11: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Decentralized - Gnutella Decentralized - Gnutella

Search

Results

SearchResults

Search

Results

Search

Results

Connection Handler Coordination Instance

Download Instance

Upload Instance

Gnutella PeerSix states: offline, waiting for ack, ping, online, search, and connection request

Initially the Coordination ping, search, pong, client push request search result

1 Search message =

21845 Similar messages

Page 12: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Centralized Vs DecentralizedCentralized Vs Decentralized

Flooding Bottleneck: Communication Overhead False negatives

Central Server

Bottleneck: Memory, CPU, Network Availability

?Scalable solution

between both extremes?

Page 13: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Network Communications Layer

Overlay Nodes Management Layer

Features Management layer

Application-level Layer

Services-specific Layer

Structured and Unstructured OverlayStructured and Unstructured Overlay

Robust

Wide-area routing architecture

efficient search of data items

Selection of nearby peers

redundant storage

Permanence

hierarchical

trust and authentication

Anonymity

Massive scalability

fault tolerance.

Page 14: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Points to discuss:Points to discuss:

Geography Distance Number of peers in the routing table

Number of peers in the routing table Efficiency in search

Page 15: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Bit-TorrentBit-Torrent

Tracker

.Tor File details and the source – file name is x1(file name, size, format and other details)

X1 {1,2,3,4,5,6,7,8,9,10}

{8,9,10}

{1,2,3,4}

X1

X1

{8,9,10} {1,2,3,4}

SEEDER

LEECHER

X1

Page 16: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Protocols Used in P2PProtocols Used in P2P

Most used protocols

Bit Torrentbit torrent plain

encryption

Page 17: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Advantages of P2P applicationsAdvantages of P2P applications

Scalability, Efficiency and Performance quality over emerging high-speed networks makes P2P a highly sought after technology for content sharing & distribution.

Emerging P2P networks are decentralized, self-organized, and dynamic; an alternative to the traditional client-server model of computing

Has important role in High Performance Computing - Grid Computing; Sharing of resources like computation power, network bandwidth, and disk space will benefit from P2P

Next generation tech projects such as Google Wallet are applying P2P networking concepts for customer acquisitions & retention and revenue generation;

Page 18: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Security issues with P2PSecurity issues with P2P

Poisoning Polluting

Defection Insertion of viruses

Malware Denial of Service

Filtering Identity attacks

Spam

Page 19: DNA of Peer to Peer Communication

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com

Thank you