On the Feasibility of Exploiting P2P Systems to Launch Ddos Attacks

Total Page:16

File Type:pdf, Size:1020Kb

On the Feasibility of Exploiting P2P Systems to Launch Ddos Attacks Peer-to-Peer Netw Appl DOI 10.1007/s12083-009-0046-6 On the feasibility of exploiting P2P systems to launch DDoS attacks Xin Sun · Ruben Torres · Sanjay G. Rao Received: 7 November 2008 / Accepted: 25 March 2009 © Springer Science + Business Media, LLC 2009 Abstract We show that malicious nodes in a peer-to- Keywords Peer-to-Peer · Security · DDoS · peer (P2P) system may impact the external Internet Evaluation · Measurement environment, by causing large-scale distributed denial of service (DDoS) attacks on nodes not even part of the overlay system. This is in contrast to attacks that disrupt 1 Introduction the normal functioning, and performance of the overlay system itself. We demonstrate the significance of the at- Peer-to-peer (P2P) systems are rapidly maturing from tacks in the context of mature and extensively deployed being narrowly associated with copyright violations, to P2P systems with representative and contrasting mem- a technology that offers tremendous potential to deploy bership management algorithms—Kad, a DHT-based new services over the Internet. The recently released file-sharing system, and ESM, a gossip-based video Windows Vista is equipped with its own, under-the- broadcasting system. We then present an evaluation hood P2P networking system [3], and several commer- study of three possible mitigation schemes and discuss cial efforts are exploring the use of P2P systems for live their strength and weakness. These schemes include media streaming [4, 15, 16]. Recent studies [9] indicate (i) preferring pull-based membership propagation over that over 60% of network traffic is dominated by P2P push-based; (ii) corroborating membership information systems, and the emergence of these systems has dras- through multiple sources; and (iii) bounding multiple tically affected traffic usage and capacity engineering. references to the same network entity. We evaluate With the proliferation of P2P systems, it becomes the schemes through both experiments on PlanetLab critical to consider how they can be deployed in a safe, with real and synthetic traces, and measurement of the secure and robust manner, and understand their im- real deployments. Our results show the potential of pact on an Internet environment already suffering from the schemes in enhancing the DDoS resilience of P2P several security problems. P2P systems enable rapid systems, and also reveal the weakness in the schemes deployment by moving functionality to end-systems. and regimes where they may not be sufficient. However, they are vulnerable to insider attacks coming from (potentially colluding) attackers that infiltrate the overlay or compromise member nodes. Several works [8, 12, 32, 33, 38] have studied how malicious nodes in a P2P system may disrupt the normal B · · X. Sun ( ) R. Torres S. G. Rao functioning, and performance of the system itself. In Purdue University, 465 Northwestern Avenue, West Lafayette, IN 47907, USA this paper, however, we focus on attacks where mali- e-mail: [email protected] cious nodes in a P2P system may impact the external In- R. Torres ternet environment, by causing large-scale distributed e-mail: [email protected] denial of service (DDoS) attacks on nodes not even S. G. Rao part of the overlay system. In particular, an attacker e-mail: [email protected] could subvert membership management mechanisms, Peer-to-Peer Netw Appl and force a large fraction of nodes in the system to describes the methodology we use to evaluate the believe in the existence of, and communicate with a schemes, and Section 6 presents the results. We discuss potentially arbitrary node in the Internet. Such attacks relatedworkinSection7, and finally conclude our may be hard to detect as the packets arriving at a victim paper in Section 8. are not distinguishable from normal protocol packets. These attacks may be viewed as a particular kind of reflector attacks [27], however the scale and unique 2 Vulnerabilities in P2P systems properties of P2P systems make them worthy of study in their own right. These attacks are in contrast to In this paper, we focus on DDoS attacks triggered by the traditional botnet-based DDoS attacks, where the exploiting the membership management algorithms of attacker has control over a large number of machines P2P systems. The membership management algorithms by infecting them with a malicious program that takes in a P2P system enable a node to join the group, instructions from her [17]. and maintain information about other members, even In this paper, as a first contribution, we show that though nodes may join or leave the system. To scale a potential attacker can launch attacks of hundreds to large group sizes, typical nodes maintain knowledge of megabits a second on an arbitrary Internet node of only a small subset of group members. While a such as a web server, by exploiting the popularly de- large number of P2P systems have emerged in recent ployed file distribution system Kad [13], and the exten- years, two of the most common approaches for mem- sively deployed video broadcasting system ESM [10]. bership management involve the use of distributed hash The systems represent contrasting applications, and tables (DHTs) [24, 28, 29, 34, 42], and gossip-based involve different and representative membership man- algorithms. While popular file-distribution systems like agement designs - structured DHT-based and unstruc- BitTorrent [7] and eMule [13] originally relied on cen- tured gossip-based. Our attacks exploit fundamental tralized servers (trackers) for group management, more design choices made by P2P system designers, and shed recent versions use decentralized mechanisms based on new insights on the interplay between membership DHTs. Many other systems such as ESM and Cool- management mechanisms, and the feasibility of exploit- Streaming [10, 41] employ gossip-like mechanisms to ing P2P systems to cause DDoS attacks. maintain group membership information. As a second contribution of the paper, we present To demonstrate the generality of the issues dis- an evaluation study of possible mitigation schemes, and cussed, we consider P2P systems targeted at applica- discuss their strength and weakness. These schemes tions with very contrasting properties and very different include (i) preferring pull-based membership propaga- membership management designs. In particular, we tion over push-based; (ii) corroborating membership consider file distribution and video broadcasting appli- information through multiple sources; and (iii) bound- cations. Video broadcast applications are distinguished ing multiple references to the same network entity. by their stringent real-time constraints requiring timely We evaluate the schemes through both experiments and continuously streaming delivery. Both applications on the PlanetLab and measurement studies of the real are bandwidth-intensive, and large scale, corresponding deployments. Our results shed light on the potential of to tens of thousands of users simultaneously participat- the schemes and in what scenarios and regimes they ing in the application. may be useful, and also point to the potential weakness The particular systems we consider in this work in- in the schemes. clude Kad[13] for file distribution and ESM [10]for This paper extends our preliminary work which ap- video broadcasting. Kad is a DHT based on Kademlia peared in the workshop paper [39]. While [39]pre- [24], add is supported by the popular eMule [13] clients sented attack heuristics on Kad and ESM, in this paper and other eMule-like clients such as aMule [5]and we also present an evaluation study of several mitiga- xMule [40]. To the extent of our knowledge, Kad is tion schemes (Section 4 to Section 6). the largest DHT currently used, with more than one The rest of the paper is organized as follows. million concurrent nodes [35]. ESM is a video broad- Section 2 presents vulnerabilities that we identified in casting system that employs gossip-based membership the Kad and ESM systems. Section 3 shows results algorithms. It is one of the first operationally deployed demonstrating the feasibility of exploiting these sys- systems and has seen significant real-world deployment tems for DDoS attacks. Section 4 discusses the strength [10]. We are motivated to use these systems given their and weakness of several mitigation schemes. Section 5 extensive deployment, the contrasting applications they Peer-to-Peer Netw Appl represent, and the different yet representative member- by creating a redirection attack. Whenever the attacker ship algorithms they employ. node receives a query from a benign node, it returns a (fake) response that contains the IP and port of the 2.1 DHT-based file distribution:Kad victim node (indicating that the victim is part of the system)alongwithafakeIDforthevictimwhichis In Kad, nodes and files have IDs that are globally closer to the target ID. This tricks the benign node into unique and randomly chosen from the same ID space thinking that the victim node is part of the Kad system of 128 bits. Each node maintains a routing table with and is likely to be an index node. Hence the benign a subset of peers that are part of the system. For any node may contact the victim for searches as well as file F, there are “index nodes” which maintain a list of other normal protocol operations. For example, Fig. 1b members that own a partial or complete copy of the file. shows how a malicious node M can make a benign These members are called “sources” of the file. Index node A send a query to the victim V, which can be an nodes are not dedicated nodes but regular participants, arbitrary Internet host (may not participate in Kad). who have an ID close to a file ID. For example, in The attack can be magnified if many benign nodes Fig. 1a, node A wishes to download a file F. A must query the malicious node when they conduct searches. first discover I, the index-node for file F, and obtain In addition, a coalition of malicious nodes could further a list of sources from I.
Recommended publications
  • Foxx Street Gossip Zip File Download Avtok V.1.0
    foxx street gossip zip file download AvtoK v.1.0. AvtoK - multi autoclicker. Software for recording and playback of action with a keyboard and mouse, which can be repeated in autoclicker. Despite the apparent simplicity of the main window is quite powerful in its class. Scope: In games and sites that require routine activities. To automate tedious and repetitive actions on the computer. By setting the control points can analyze the image on the screen and organize complex actions. Features. Read more. Rate: License: Freeware Category: Automation Tools Developer: Ocean games Downloads: 319 Size: 1.63 Mb Price: Free. To free download a trial version of AvtoK, click here To visit developer homepage of AvtoK, click here. Screen Shot. Click on a thumbnail for the larger image. System Requirements. AvtoK requires Win2000, Win7 x32, Win7 x64, Win98, WinServer, WinVista, WinVista x64, WinXP. Buzzer v.1.1.0.0. A massive red button that plays a sound of your choice from the config menu allowing you to have a game show style buzzer. Cockerel sound Smelly bottom sound Joke drum roll sound French tart sound Door bell sound Horny horn sound Bloke who’s trapped his figure in the car boot sound Wolf whistle sound Some nifty piece of. Read more. Rate: Release Date: 09/13/2012 License: Freeware Category: Recreation Developer: FluxedDev.com Downloads: 26 Size: 6 Mb Price: Free. To free download a trial version of Buzzer, click here To visit developer homepage of Buzzer, click here. Screen Shot. Click on a thumbnail for the larger image. System Requirements.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Copyright Infringement (DMCA)
    Copyright Infringement (DMCA) Why it is important to understand the DMCA: Kent State University (KSU) is receiving more and more copyright infringement notices every semester, risking the loss of ‘safe harbor’ status. Resident students, KSU faculty, staff, and student employees, and the University itself could be at risk of costly litigation, expensive fines, damage to reputation, and possible jail time. What you need to know about KSU’s role: ● KSU is not a policing organization. ● KSU does not actively monitor computing behavior. ● KSU reacts to infringement notices generated by agents of the copyright holders ● KSU expends a significant amount of time/money protecting the identity of students by maintaining ‘safe harbor’ status KSU is ‘the good guy’ – we’re focused on educating our community What you need to know if your student receives a copyright infringement notice: They were identified as using P2P software and illegally sharing copyrighted material (whether downloading to their computer or allowing others to download from their computer). They will be informed of the notice via email, and their network connection to external resources (sites outside of KSU) will be disabled to maintain ‘safe harbor’ status until such time as they have complied with the University’s requirements under the DMCA. They can face sanctions ranging from blocked connectivity to dismissal from the University. Definition of terms: DMCA: The Digital Millennium Copyright Act of 1998 was signed into law in the United States to protect the intellectual property rights of copyright holders of electronic media (music, movies, software, games, etc.). The DMCA allows KSU to operate as an OSP.
    [Show full text]
  • Gnutella Etc
    Uni Innsbruck Informatik - 1 Peer-to-Peer Systems Unstructured P2P File Sharing Systems Michael Welzl [email protected] DPS NSG Team http://dps.uibk.ac.at/nsg Institute of Computer Science University of Innsbruck, Austria Uni Innsbruck Informatik - 2 Unstructured vs. Structured P2P systems • Terms refer to information management: where are objects placed, how are they found? – Distributed “randomly“ across the network, with several replicas – Content source stays where it is – Structured P2P systems: rules bind content to (typically hash) keys, which are used as addresses (“document routing model“) • Systems like Napster, Gnutella etc. are unstructured • Three common models: – Centralized (also: “central server model“); e.g. Napster, BitTorrent –Pure; e.g. Gnutella 0.4, Freenet “flooded request model“ –Hybrid; e.g. Gnutella 0.6, Kazaa, JXTA Uni Innsbruck Informatik - 3 Development of P2P Applications 100% Freenet Direct Connect++ Shoutcast Carracho 90% Blubster Neo-M odus 80% FastTrack WinM X FastTrack Shoutcast 70% Audiogalaxy eDonkey2000 Hotline 60% Gnutella BitTorrent 50% 40% 30% datavolumes in per week % 20% edonkey BitTorrent Gnutella 10% 0% 18.02.2002 18.05.2002 18.08.2002 18.11.2002 18.02.2003 18.05.2003 18.08.2003 18.11.2003 18.02.2004 18.05.2004 18.08.2004 Data source: http://netflow.internet2.edu/weekly/ Traffic portions of the different P2P applications and protocols from the traffic measured per week in the Abilene backbone from 18.02.2002 until 18.010.2004 Uni Innsbruck Informatik - 4 Development of P2P applications
    [Show full text]
  • Shutter Limewire
    Case 1:06-cv-05936-KMW Document 235-2 Filed 06/04/2010 Page 1 of 15 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ARISTA RECORDS LLC; ATLANTIC RECORDING CORPORATION; BMG MUSIC; CAPITOL RECORDS, INC.; ELECTRA ENTERTAINMENT GROUP INC.; INTERSCOPE RECORDS; LAFACE RECORDS LLC; MOTOWN RECORD COMPANY, L.P.; PRIORITY RECORDS LLC; SONY BMG MUSIC ENTERTAINMENT; UMG RECORDINGS, 06 Civ. 05936 (KMW) INC.; and WARNER BROS. RECORDS INC., ECF CASE Plaintiffs, [PROPOSED] PERMANENT v. INJUNCTION AGAINST LIME WIRE LLC; LIME GROUP LLC; LIME WIRE LLC; LIME GROUP LLC; AND MARK GORTON MARK GORTON; GREG BILDSON; and M.J.G. LIME WIRE FAMILY LIMITED PARTNERSHIP, Defendants. By Opinion and Order entered May 11, 2010, and amended on May 25, 2010 (“Order”), this Court found defendants Lime Group LLC, Lime Wire LLC, and Mark Gorton (collectively, “Lime Wire”) liable for inducing copyright infringement on a “massive scale.” (Order at 33.) The Court now enters a Permanent Injunction in favor of the Plaintiffs, and against Lime Wire pursuant to 17 U.S.C. § 502 and Federal Rule of Civil Procedure 65, and in accordance with the following terms. I. PERMANENT INJUNCTIVE RELIEF IS WARRANTED In its Order, the Court held Lime Wire liable for inducement of copyright infringement, as well as for common law copyright infringement and unfair competition as to Plaintiffs’ protected pre-1972 works. The evidence showed as a matter of law that: Lime Wire “intentionally encouraged direct infringement” by Lime Wire users. (Order at 29.) 10710383.4 1 Case 1:06-cv-05936-KMW Document 235-2 Filed 06/04/2010 Page 2 of 15 The LimeWire client software is used “overwhelmingly for infringement,” and allows for infringement on a “massive scale.” (Id.
    [Show full text]
  • Ensemble Machine Learning for P2P Traffic Identification
    International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. #, No.# (Mon-20..) Ensemble Machine Learning for P2P Traffic Identification Md. Sarfaraj Alam Ansari1, Kunwar Pal2, Mahesh Chandra Govil1, Prajjval Govil3, Adarsh Srivastava1 1 Department of Computer Science and Engineering, National Institute of Technology Sikkim, India 2 Department of Computer Science and Engineering, Dr B R Ambedkar National Institute of Technology Jalandhar, India 3Department of Computer Science and Engineering, JK Lakshmipat University, Jaipur, Rajasthan 302 026, India E-mail address: [email protected], [email protected], [email protected], [email protected], [email protected], Received ## Mon. 20##, Revised ## Mon. 20##, Accepted ## Mon. 20##, Published ## Mon. 20## Abstract: Network traffic identification and classification in the current scenario are not only required for traffic management but in designing a future protocol for user-specific services and improve user experiences. This fundamental step of network management is perceived by the researcher long back and started developing techniques for the same. The traditional techniques for traffic identification and classification include port and payload based. The current large and complex network poses many challenges to the researchers in designing approaches for traffic classification by using dynamic ports, encryption, and masquerading techniques. The complexity is further enhanced due to increased dependence on the Internet and diverse applications to enable network administrators including ISPs to manage the network intelligently and efficiently. As traditional techniques are not effective to address the current challenges, a hybrid solution is explored. The hybrid approaches make use of statistics or behavioral-based, heuristic-based, machine learning-based along with feature selection techniques.
    [Show full text]
  • Download-Emule-Kad-Server-List.Pdf
    Download Emule Kad Server List Download Emule Kad Server List 1 / 3 2 / 3 web site page displaying list of all active servers on the eDonkey/eMule p2p network. ... ping test update servers list at client start download list in eMule.. 0.50a installed on my computer. I can connect to eD2K network easily but I can't connect to Kad network. I have tried to download from http://www.nodes-dat.com/ but the first button " Add to eMule (from Nodes Server)" did't work and the other two worked but the problem still remains.. Bezpieczna lista serwerów emule do pobrania. Pobierz listę zawsze aktualną. Download server.met & serverlist for eMule.. eMule now connects to both the eDonkey network and the Kad network. ... eMule will use clients it knows already from the ed2k servers to get connected to Kad .... The servers merely help hold the network together. Meanwhile, Kad is a network that is also connectable via eMule. Unlike the ED2K network, ... You can use the easy to use installer or you can download the binaries. The difference is that the .... nodes.dat nodes for emule kademlia net server edonkey overnet. ... von IP/Port im Kad-Fenster, oder. - per Download aus dem Internent, z.B. nodes.dat.. Connecting to servers hasn't been working for a long time. ... started them again (there is free drive space on the download drive) but can't get a Kad connection. ... Block4: ipfilter.dat, nodes.dat, server.met (emule-security.org). Dodaj do #eMule te 2 pliki : Do serwerów, czyli eD2k --- http://www.server-list.info/ Do Kad ---..
    [Show full text]
  • 00079-141173.Pdf (5.08
    CHRIS JAY HOOFNAGLE Adjunct Full Professor School of Information School of Law Faculty Director Berkeley Center for Law & Technology August 22, 2017 University of California, Berkeley VIA THE WEB Berkeley, CA Tel: 5 Federal Trade Commission https://hoofnagle.berkeley.edu Office of the Secretary 600 Pennsylvania Avenue NW. Suite CC–5610 (Annex B) Washington, DC 20580 Re: Comment of Chris Hoofnagle on Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN–SPAM Rule, 16 CFR part 316, Project No. R711010) Dear Mr. Brown, Thank you for soliciting public comment on the CAN–SPAM Rule. My comments below focus on the need for the CAN–SPAM Rule, the costs that spam imposes on consumers and the economy, the prospect that technical interventions on intermediaries can be effective, that spam senders strategically use transaction costs to deter recipients from opting out, that senders impose privacy penalties on those who opt out, for the FTC to consider third-party lookups for email addresses to be an aggravated violation of CAN–SPAM, to revisit that the idea of a Do-Not-Email Registry, and finally, to keep the computer science literature on spam in focus. There is a Continuing Need for the CAN–SPAM Rule Because the Injuries Caused by Spam Are Economic and Social and Are on Par with Serious Crimes In a 2001 speech, FTC Chairman Timothy Muris identified spam messages as injurious under the Commission’s “harm-based” approach.1 Today, the majority of e-mail is spam. Senders of marketing e- mails can leverage the technical and economic properties of the internet to send tens of billions of messages a day.
    [Show full text]
  • Hearing on P2P File-Sharing Technology
    Prepared Statement of The Federal Trade Commission Before the Subcommittee on Competition, Infrastructure, and Foreign Commerce of the Committee on Commerce, Science, and Transportation United States Senate Hearing on P2P File-Sharing Technology Washington, D.C. June 23, 2004 I. Introduction Mr. Chairman and members of the Committee, I am Howard Beales, Director of the Bureau of Consumer Protection, Federal Trade Commission (“Commission” or “FTC”).1 I appreciate this opportunity to provide the Commission’s views on peer-to-peer (“P2P”) file- sharing and protecting consumers online.2 The Federal Trade Commission is the federal government’s principal consumer protection agency. Congress has directed the Commission, under the FTC Act, to take law enforcement action against “unfair or deceptive acts or practices” in almost all sectors of the economy and to promote vigorous competition in the marketplace.3 With the exception of certain industries and activities, the FTC Act provides the Commission with broad investigative and enforcement authority over entities engaged in, or whose business affects, commerce.4 The FTC Act also authorizes the Commission to conduct studies and collect information, and, in the public interest, to publish reports on the information it obtains.5 1The written statement presents the views of the Federal Trade Commission. Oral statements and responses to questions reflect my views and not necessarily those of the Commission or any individual Commissioner. 2The views contained in this testimony are expressed to assist you in your review of peer- to-peer file sharing technology. Official Commission determinations of the legality of practices under the Federal Trade Commission Act are ordinarily made based on a complete record, after notice and the opportunity to fully brief the issues being considered.
    [Show full text]
  • (How to Get Away from the RIAA) Using Newgroups and Hel
    The Regulation of Peer-to-Peer File Sharing Networks: Legal Convergence v. Perception Divergence Dr Katerina Sideri, Email: [email protected] and [email protected] The Regulation of Peer-to-Peer File Sharing Networks: Legal Convergence v. Perception Divergence Dr Katerina Sideri Lecturer in Law School of Law, University of Exeter Email: [email protected] and [email protected] Paper prepared for the AHRB Workshop on Network Theme 2 (Globalisation, Convergence and Divergence) Incomplete working paper, do not quote without the author’s permission. 1 The Regulation of Peer-to-Peer File Sharing Networks: Legal Convergence v. Perception Divergence Dr Katerina Sideri, Email: [email protected] and [email protected] A P2P: Regulatory Convergence Millions of people around the globe use peer-to-peer (P2P) file sharing networks. However, as these networks function like search engines, allowing looking into files stored in users’ hard discs, many engage in downloading music and movies for free, without compensating copyright holders. Digital technology makes the distribution of multiple perfect copies of copyright material so easy that the entertainment industry has been alerted and brought proceedings before courts in the US, Europe, Canada, Australia and Asia, targeting users and the makers of P2P software for copyright violations, and submitting that it has lost millions as a result of the piracy and counterfeiting taking place in such networks. However, P2P networks are not meant to be primarily designed to promote piracy.1 They play the role of a new distribution channel to promote music or other kinds of art, or even share personal photos with some million other users, thus advancing cultural expression and creativity.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, on page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for November 28, 2019. None in this release. All Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols and applications supported until ADC Plugin release on October 31, 2019. Peer-to-Peer Protocol and Application Detection Support 1 Peer-to-Peer Protocol and Application Detection Support All Supported Protocols and Applications Protocol / Client Client Version Group Classification Supported from Application Release 120Sports 120Sports 1.6
    [Show full text]