Corrupção, Mentiras e Isolamento: avaliação de impacto de ataques a BitTorrent
Resumo
BitTorrent se tornou uma das aplicações mais populares da Internet, dado o número de usuários e a fração do tráfego de Internet que ela consome. Sua ampla adoção tem exposto potenciais problemas, como comportamento egoísta de pares e vulnerabilidades de segurança. Esforços de pesquisa relacionados a isso têm se focado particularmente na dinâmica de enxames e em mecanismos de incentivo para melhorar a justiça sem sacrificar a eficiência. Em um trabalho recente, investigamos vulnerabilidades de segurança em BitTorrent. Este artigo expande o referido trabalho em diversos aspectos. Particularmente, há melhorias na modelagem de enxames, tornando resultados mais realistas, e um novo ataque é definido e avaliado: corrupção de peças. Nossa análise demonstra a gravidade do problema e a necessidade de mecanismos de contra-medida para tais ataques.Referências
(2007). Azureus website. http://azureus.sourceforge.net/.
(2007a). Bittorrent protocol specification v1.0. http://wiki.theory.org/BitTorrentSpecification.
(2007b). Bittorrent.org. http://www.bittorrent.org/protocol.html.
Barbera, M., Lombardo, A., Schembra, G., and Tribastone, M. (2005). A markov model of a freerider in a bittorrent P2P network. In IEEE Global Telecommunications Conference (GLOBECOM ’05), volume 2, pages 985–989, St. Louis, MO, USA.
Barcellos, M. P., Facchini, G., Muhammad, H. H., Bedin, G. B., and Luft, P. (2006). Bridging the gap between simulation and experimental evaluation in computer networks. In Simulation Symposium, 2006. 39th Annual, pages 8 pp.+.
Bharambe, A. R., Herley, C., and Padmanabhan, V. N. (2005a). Some observations on bittorrent performance. In Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS 2005), volume 33, pages 398–399, New York, NY, USA. ACM Press.
Bharambe, A. R., Herley, C., and Padmanabhan, V. N. (2005b). Understanding and deconstructing BitTorrent performance. Technical Report MSR-TR-2005-03, Microsoft Research.
Das, S., Tewari, S., and Kleinrock, L. (2006). The case for servers in a peer-to-peer world. In 2006 IEEE International Conference on Communications, volume 1, pages 331–336, Washington, DC, USA. IEEE Computer Society.
Douceur, J. R. (2002). The sybil attack. In 1st International Workshop on Peer-to-Peer Systems, pages 251–260, Cambridge, MA, USA.
Eger, K. and Killat, U. (2006). Bandwidth trading in unstructured p2p content distribution networks. In 6th IEEE International Conference on Peer-to-Peer Computing, 2006 (P2P 2006), pages 39–48, Washington, DC, USA. IEEE Computer Society.
Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., and Zhang, X. (2005). Measurements, analysis, and modeling of bittorrent-like systems. In Internet Measurement Conference (IMC ’05), pages 35–48.
Jun, S. and Ahamad, M. (2005). Incentives in BitTorrent induce free riding. In ACM SIGCOMM Workshop on Economics of Peer-to-Peer systems (P2P-ECON), pages 116–121.
Konrath, M. A., Barcellos, M. P., Silva, J. F., Gaspary, L. P., and Dreher, R. (2007). Atacando um enxame com um bando de mentirosos: vulnerabilidades em bittorrent. In XXV Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2007), volume 2, pages 883–896.
Legout, A., Urvoy-Keller, G., and Michiardi, P. (2006). Rarest first and choke algorithms are enough. Technical report, INRIA.
Liogkas, N., Nelson, R., Kohler, E., and Zhang, L. (2006). Exploiting bittorrent for fun (but not profit). In 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006).
Purandare, D. and Guha, R. (2006). Preferential and strata based p2p model: Selfishness to altruism and fairness. In 12th International Conference on Parallel and Distributed Systems, 2006. ICPADS 2006, volume 1, pages 561–570.
Qiu, D. and Srikant, R. (2004). Modeling and performance analysis of BitTorrent-like peer-to-peer networks. SIGCOMM Comput. Commun. Rev., 34(4):367–378.
Shneidman, J., Parkes, D., and Massoulie, L. (2004). Faithfulness in internet algorithms. In Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS’04), Portland, OR, USA. ACM SIGCOMM.
Singh, A., Ngan, T.-W., Druschel, P., and Wallach, D. S. (2006). Eclipse attacks on overlay networks: Threats and defenses. In 25th Conference on Computer Communications (INFOCOM 2006). IEEE.
Veciana, G. and Yant, X. (2003). Fairness, incentives and performance in peer-to-peer networks. In Proceedings of the 41st Annual Allerton Conference on Communication, Control and Computing.
Wang, G. (2006). An efficient implementation of sha-1 hash function. In IEEE International Conference on Electro/information Technology, 2006, pages 575–579.
Yang, X. and de Veciana, G. (2004). Service capacity of peer to peer networks. In INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, volume 4, pages 2242–2252.
(2007a). Bittorrent protocol specification v1.0. http://wiki.theory.org/BitTorrentSpecification.
(2007b). Bittorrent.org. http://www.bittorrent.org/protocol.html.
Barbera, M., Lombardo, A., Schembra, G., and Tribastone, M. (2005). A markov model of a freerider in a bittorrent P2P network. In IEEE Global Telecommunications Conference (GLOBECOM ’05), volume 2, pages 985–989, St. Louis, MO, USA.
Barcellos, M. P., Facchini, G., Muhammad, H. H., Bedin, G. B., and Luft, P. (2006). Bridging the gap between simulation and experimental evaluation in computer networks. In Simulation Symposium, 2006. 39th Annual, pages 8 pp.+.
Bharambe, A. R., Herley, C., and Padmanabhan, V. N. (2005a). Some observations on bittorrent performance. In Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS 2005), volume 33, pages 398–399, New York, NY, USA. ACM Press.
Bharambe, A. R., Herley, C., and Padmanabhan, V. N. (2005b). Understanding and deconstructing BitTorrent performance. Technical Report MSR-TR-2005-03, Microsoft Research.
Das, S., Tewari, S., and Kleinrock, L. (2006). The case for servers in a peer-to-peer world. In 2006 IEEE International Conference on Communications, volume 1, pages 331–336, Washington, DC, USA. IEEE Computer Society.
Douceur, J. R. (2002). The sybil attack. In 1st International Workshop on Peer-to-Peer Systems, pages 251–260, Cambridge, MA, USA.
Eger, K. and Killat, U. (2006). Bandwidth trading in unstructured p2p content distribution networks. In 6th IEEE International Conference on Peer-to-Peer Computing, 2006 (P2P 2006), pages 39–48, Washington, DC, USA. IEEE Computer Society.
Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., and Zhang, X. (2005). Measurements, analysis, and modeling of bittorrent-like systems. In Internet Measurement Conference (IMC ’05), pages 35–48.
Jun, S. and Ahamad, M. (2005). Incentives in BitTorrent induce free riding. In ACM SIGCOMM Workshop on Economics of Peer-to-Peer systems (P2P-ECON), pages 116–121.
Konrath, M. A., Barcellos, M. P., Silva, J. F., Gaspary, L. P., and Dreher, R. (2007). Atacando um enxame com um bando de mentirosos: vulnerabilidades em bittorrent. In XXV Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC 2007), volume 2, pages 883–896.
Legout, A., Urvoy-Keller, G., and Michiardi, P. (2006). Rarest first and choke algorithms are enough. Technical report, INRIA.
Liogkas, N., Nelson, R., Kohler, E., and Zhang, L. (2006). Exploiting bittorrent for fun (but not profit). In 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006).
Purandare, D. and Guha, R. (2006). Preferential and strata based p2p model: Selfishness to altruism and fairness. In 12th International Conference on Parallel and Distributed Systems, 2006. ICPADS 2006, volume 1, pages 561–570.
Qiu, D. and Srikant, R. (2004). Modeling and performance analysis of BitTorrent-like peer-to-peer networks. SIGCOMM Comput. Commun. Rev., 34(4):367–378.
Shneidman, J., Parkes, D., and Massoulie, L. (2004). Faithfulness in internet algorithms. In Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS’04), Portland, OR, USA. ACM SIGCOMM.
Singh, A., Ngan, T.-W., Druschel, P., and Wallach, D. S. (2006). Eclipse attacks on overlay networks: Threats and defenses. In 25th Conference on Computer Communications (INFOCOM 2006). IEEE.
Veciana, G. and Yant, X. (2003). Fairness, incentives and performance in peer-to-peer networks. In Proceedings of the 41st Annual Allerton Conference on Communication, Control and Computing.
Wang, G. (2006). An efficient implementation of sha-1 hash function. In IEEE International Conference on Electro/information Technology, 2006, pages 575–579.
Yang, X. and de Veciana, G. (2004). Service capacity of peer to peer networks. In INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, volume 4, pages 2242–2252.
Publicado
27/08/2007
Como Citar
MANSILHA, Rodrigo B.; KONRATH, Marlom A.; BARCELLOS, Marinho P..
Corrupção, Mentiras e Isolamento: avaliação de impacto de ataques a BitTorrent. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 7. , 2007, Rio de Janeiro.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2007
.
p. 93-106.
DOI: https://doi.org/10.5753/sbseg.2007.20920.