Top Banner
Peer-to-Peer Systems and Security Introduction Christian Grothoff Technische Universit¨ at M¨ unchen April 14, 2013 “They seem to have forgotten that, and are back saying the only purpose of P2P networks is for illegal trading of owned goods. We claim part of the reason for P2P is for legal trading of what ought to be in public domain. And what is in public domain in many cases.” – John Perry Barlow
24

Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Jun 11, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Peer-to-Peer Systems and SecurityIntroduction

Christian Grothoff

Technische Universitat Munchen

April 14, 2013

“They seem to have forgotten that, and are back saying the onlypurpose of P2P networks is for illegal trading of owned goods. Weclaim part of the reason for P2P is for legal trading of what ought

to be in public domain. And what is in public domain in manycases.” – John Perry Barlow

Page 2: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Peer-to-Peer Systems

Definition:

I A Peer-to-Peer (P2P) system is a system where participantswork together as equals, with symmetric roles, rights andresponsibilities.

I A pure P2P system is a P2P system where all (important)services are realized by peers.

This course is about P2P systems that use the Internet forcommunication between peers (also known as overlay networks).

Page 3: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Famous P2P Systems: Democracy

Page 4: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Famous P2P Systems: Ethernet

Page 5: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Famous P2P Systems: Internet (IP/BGP)

Page 6: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Famous P2P Systems: SMTP

Page 7: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Famous P2P Systems: World Wide Web

Page 8: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Famous P2P Overlay Systems

I Napster

I Gnutella

I Freenet

I Bittorrent

I Tor

Page 9: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Client-Server Benefits

Client-server architectures make it easy to:

I establish trust, and restrict access

I manage resources, and charge fees

I deploy updates, and remove features

I collect data, and sell it

Page 10: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Why not use Client-Server architecture?

If you use a server, you give up control of your:

I data

I computation

I free software

Page 11: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Why study overlay P2P Systems?

I Easier to develop and deploy

I Layered architecture: make use of existing abstractions

I Envision the future of the Internet!

Page 12: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Distributed Systems

An overlay P2P network is a distributed system. Deutschformulated “The Eight Fallacies of Distributed Computing”:

I The network is reliable

I Latency is zero

I Bandwidth is infinite

I The network is secure

I Topology does not change

I There is one administrator

I Transport cost is zero

I The network is homogeneous

Page 13: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Questions?

?

Page 14: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Learning Goals

In this course, you will learn about:

I Protocol design

I Distributed algorithms & data structures

I System programming

I Game theory / Reputation Systems

I Network security & privacy

Page 15: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Learning Methods

I Lectures on existing designs and implementations

I Study current research papers

I Present (and discuss) your own ideas

I Implement your own protocol / extension

Page 16: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Deliverables

I Quizzes

I Written reports (design document, progress report, finalreport)

I Individual presentation on group project

I Project code

I Final individual interview

I NO final exam

Details athttp://grothoff.org/christian/teaching/2013/2194/.

Page 17: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

The Project

I Webiste gives suggestions

I Teams of one or two students

I One project-related presentation per student

I Joint project reports

I Individual interview

Using GNUnet for the project is a suggestion, not a requirement.

Page 18: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Schedule

I Introduction & GNUnet architecture

I Security & unstructured protocols

I Structured Routing Algorithms & NAT traversal

I Game theory & Anonymity

I Attacks & Evil P2P networks

I Visions for the future

I Presentations

I Tor Hacker Meeting (July 22-26)

Page 19: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Schedule

I Introduction & GNUnet architecture

I Security & unstructured protocols

I Structured Routing Algorithms & NAT traversal

I Game theory & Anonymity

I Attacks & Evil P2P networks

I Visions for the future

I Presentations

I Tor Hacker Meeting (July 22-26)

Page 20: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Schedule

I Introduction & GNUnet architecture

I Security & unstructured protocols

I Structured Routing Algorithms & NAT traversal

I Game theory & Anonymity

I Attacks & Evil P2P networks

I Visions for the future

I Presentations

I Tor Hacker Meeting (July 22-26)

Page 21: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Project Ideas

I Tor-like OR in GNUnet

I In-network monitoring to detect attacks

I Distributed search engine [1]

I Cubit DHT [4] (or other “interesting” DHT [3])

I P2P over DNS, SMTP [5], SCTP, Satellite, ...

I Improved NAT traversal [2]

I M2M applications

I Asynchronous messaging

I Distributed constraint optimization [6]

I ...

Page 22: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Remember

I Study assigned reading before each class

I Review previous lectures before each class

I Form teams, e-mail team information to Andreas Korsten

I Prepare design documents, first presentation due in 6 weeks!

Page 23: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

Questions?

?

Page 24: Peer-to-Peer Systems and Security - Introduction · Peer-to-Peer Systems and Security Introduction Christian Grotho Technische Universit at Munchen April 14, 2013 \They seem to have

ReferencesYacy.

http://yacy.net/, 2013.

A. Muller and A. Klenk and G. Carle.

Behavior and Classification of NAT devices and implications for NAT-Traversal.

IEEE Special issue on Middleboxes, pages 14–19, September 2008.

Ioannis Aekaterinidis and Peter Triantafillou.

PastryStrings: a comprehensive content-based publish/subscribe DHT network.

In Proc. 26th IEEE Int. Conf. on Distributed Computing Systems (ICDCS ’06), Lisboa, Portugal, page 23,2006.

Aleksandrs Slivkins Bernard Wong and Emin Gn Sirer.

Approximate matching for Peer-to-Peer overlays with Cubit.

Technical report, Cornell University, Computing and Information Science, 2008.

Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth.

A Transport Layer Abstraction for Peer-to-Peer Networks.

In Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (GRID 2003), pages398–403. IEEE Computer Society, 2003.

Pragnesh Jay Modi, Wei-Min Shen, Milind Tambe, and Makoto Yokoo.

Adopt: asynchronous distributed constraint optimization with quality guarantees.

Artificial Intelligence, 161(1–2):149–180, January 2005.