Tackling the Illegal Trade in the Digital World

Total Page:16

File Type:pdf, Size:1020Kb

Tackling the Illegal Trade in the Digital World Cyber-laundering: dirty money digitally laundered- Tackling the illegal trade in the Digital world Graham Butler Special Presentation to the Academy of European Law Budapest – March 2016 Co-funded by the Justice Programme of the European Union 2014-2020 Graham Butler – Chairman Bitek Group of Companies © 2016 Tackling the illegal trade in the Digital world Supporting the Cyber-Security agenda ERA (Academy of European Law) – Lisbon / Trier / Sofia / Brussels Address: Threats to Financial Systems – VoIP, lawful intercept, money laundering CTO (Commonwealth Telecommunications Organisation) London Address: Working group on strategic development for 2016-2020 ITU High level Experts Group – Cybersecurity Agenda – Geneva (United Nations) Address: VoIP and P2P Security – Lawful Intercept ENFSC (European Network Forensic and Security Conference) - Maastricht Address: Risks of P2P in Corporate Networks CTITF (Counter Terrorism Implementation Taskforce) - Seattle Address: Terrorist use of encrypted VoIP/P2P protocols - Skype Norwegian Police Investigation Section - Oslo Address: Next Generation Networks – VoIP Security (fixed and mobile networks) IGF (Internet Governance Forum) – Sharm El Sheikh, Egypt Address: Threats to Carrier Revenues and Government Taxes – VoIP bypass EastWest Institute Working Group on Cybercrime - Brussels / London Working Groups: Global Treaty on Cybersecurity / Combating Online Child Abuse CANTO (Caribbean Association of National Telecoms Org) – Belize / Barbados Address: Reversing Declines in Telecommunications Revenue ICLN (International Criminal Law Network) - The Hague Address: Cybercrime Threats to Financial Systems CIRCAMP (Interpol / Europol) - Brussels Working Groups: Online Child Abuse – The Fight Against illegal Content Graham Butler – President and CEO Bitek © 2013 1 Tackling the illegal trade in the Digital world The evolution of interception - circuit switched networks 1. Threat to National Security 3. Court application for LI warrant 2. Suspect identified 4. Court issues interception warrant Court Order Lawful Interception 5. Agency provides warrant to Operator 6. Operator sends LI data to agency Time-Division Multiplexing (TDM) Traditional Circuit Switched Networks TDM ‘numbered’ calls TDM Interconnect 2G / 3G / 4G / 5G Circuit Switch 2G / 3G / 4G / 5G Graham Butler – President and CEO Bitek © 2013 2 Next Generation Traffic Challenges (ML) The evolution of interception - packet switched networks CLOUD A The World Wide Web CLOUD B National IP Network Inbound VoIP / OTT SERVICES SIM Bank SIM Bank Unlicensed / Bypass / Fraud PBX/VoIP Switch PBX/VoIP Switch Media Gateway Media Gateway Diversity and encryption? creates a ‘safe haven’ for crime/terrorism TDM ‘numbered’ call TDM ‘numbered’ call IP Gateway IP Gateway 2G / 3G / 4G 2G / 3G / 4G WiFi, WiMax WiFi, WiMax 3G, 4G 3G, 4G A B Broadband Broadband Router Router VoIP Packets VoIP/OTT (Encrypted Services?) VoIP/OTT app call app call VoIP/OTT (Gaming Console) (Gaming Console) VoIP/OTT app call VoIP/OTT app VoIP/OTT app app call 3 Graham Butler – President and CEO Bitek © 2013 Tackling the illegal trade in the Digital world Diversity of Internet Activity (Intel) Graham Butler – President and CEO Bitek © 2013 4 Tackling the illegal trade in the Digital world Unlicensed SIP VoIP (RFC 3261 variants) 373 competitors aamranetworks.com, Abovenet Communications, Acess Kenya Group, ACN_DSL, Atlantic Broadband, Airtel Broadband, Akamai, ALGX, Amazon.com, AmazonHosting, Angel Drops, Aruba, ASKTel, ASTA Net, 24/7 Real Media ARTNET, AT&T U-verse, AT&T wireless, Bandcom, Beeline, Beam Telecom, Belgacom Skynet, BellCanada, Bell Mobility, BellSouth, BTS, Bharti Airtel, Bankstown-Clinical-School , BICS, Blast_Comms , Bluewin, Bouygues Telecom, Bright House Networks, Broadvoice, BSNL, BT Italia, Beyond The Network America, Cable 1, Cablecom, Cablevision, Cabel Digital Kabel TV, Cable and Wireless Americas Operations, CANTV services, Century Link, Checkbox, Charter Communications, China Telecom, China Mobile, China Telecom YunNan, China Telecom Jiangsu, China Telecom Sichuan, CJSC Ural Trans Telecom, Completel, Cameroon Telecommunications Ltd, China Tie Tong, CoLoSolutions, Cogent Communications, CommPeak (Amazon Hosted), Canaca.com, China Unicom, Claro Dominican Republic, Claro Peru, Clear Wireless, Comnet, CANL, Choopa, Connexions 4 London, Cogeco Cable, Compass , ComCast, Corgi Tech Ltd, Chunghwa telecom, Consejo Hondureno de Ciencie y Tecnologia, CTBC, Cybercon, CYTA HELLAS, nyc callcenter 1, Datacenter, Dedibox, Dial Telecom, Digital Networks CJSC, Distributel Communications, Dixivox, Deltathree, DIGI Ltd, Digicel Jamaica, Dooel Kavadarci, Donbass Electronic Communications Ltd, DNA Oy, DODO, DTS Ltd, E Networks, Econocall, Ecatel, Ecuador Telecoms, EdgeCast Networks, EGNET,373 Elionoffshore Enterprises GANDI,SIP operators Eircom, Elisa OYJ Mob(Haitiile, Emirates telecoms) Telecom, Enterprise Networks, Entertainment Television, Eweka Internet Services, FibreNet, Fibernetica Corp, FLOW, Fonebee, FORTHnet, Freeport-McMoran, Free SAS, Gateway Communications, Galaxy Communications, Gestora de infraestructursa de telecomm, GetGeorgeMobile, GCA Telecom El Salvador, GCN/DCN Networks, GIO Moblie Ghana, Globalinx, Global Net Access, Global Village, Globe Telecom, googletalk, Godaddy.com, GoandCall,Unlicensed GoGent, Golden competition Lines Cable, Guandong causes Molile false Communications, market Hadara, rates Haiti (anti-competitive) Networking Group, Haiti Telecom, Hanaro Telecom, H3G Italy, Home Network Japan, Hong Kong Broadband Networks, Hotwire Communications, Hubei, Hurricane Electric, INDIT Hostings, Infracom Italia, Inphonex, Inei international, Internap Network Services, Icall, IDT Corporation, iweb, Incapsula.com, Inet Limited, Internetcalls/Freecall, Internet Development Company, IPCommunications, Lifeisbetteron, Iscon Internet,Policy Isotropicdecision Networks, to remove Ispro Lietisum, fraudulent IPTelligentLLC, bypass ITIBITI.COM, services Jazz Telecom, Joyent, JSC, JSC Kazakhtelecom, Kabel Deutschland, Kampung Communications, Karib Cable, KEKU (Amazon), Kimsufi.com, Korea Telecom, Krypt Technologies, KPN B>V>, Lankacom, Lbisat, Leaseweb BV, Level 3 Communication, Lexis-nexis, LgDacomCo, Libantelecom, Lightspeed_SBCglobal, Lightyear Network, Limelight Networks, Link Egypt, LG Powercom, LG Telecom, LLP Asket, LowRateVoIp, Mana S>A>,Create Magma, a regulatory Maroc Telecom, Magyarenvironment Telecoms, LINODE, where Mobil eOne,SIP Mainehealthoperators Medical are Centre, licensed Mauritius Telecom, Mediaserv, Mediaring network services, Mediacom Communications, Megapath, merkenmarketeers (BICS), MS Hotmail, Microsoft corporation, Microsoft Hosting, MIR Telematiki, M2 Telecomms Group, Microsoft Ltd, Microsoft Internet data center, MTNBusiness (telkom Hosted), Mobitel, Movistar, Multilink, Multiregional Transit Telecom, MWEB Connect, mycingilar.net, N Layer, Nec Biglobe, NCSIPNummericable, operators Netvision, will Net2Wholesale, pay the appropriate Net2Phone, Netzquadrat, fees NexG,and Nexgentaxes Networks, Nextgen tel, NetstreamTechnology, NetTalk, Netia SA, NOC4HOSTS, ntlworld, NTT&Verio, Nymgo, Net 1, OFFRATEL, Open Market, Onavo, Open Computer network, Oi Internet, Oi Velox, OVH SASOOREDOO, OVH Hosting, Orange Espania, Orange Dominica Power phone, Orange France, Orange Home UK, Orange Palastine Group, OJSC Kyrgyztelecom, OJSC Rostelom, OJSC MegaFon, Ortel Communications M/S,Fair Pakistan market Telecommunications conditions Company, will Palastine, establish Packet Exchange,correct Rackspace market Pixius rates Communications, Primus, Paetec, Peer1, Pinger, Peru_S.a.c, PLDT (Philippine Long Distance Telephone), Republican Unitary Telecommunications, RCS & RDS Residential, RNADTA, Quadranet, Reflected Networks, Rodgers Cable, ROM Telecom, Rostelcom Kaluga, RCN, RSL COM Canada, R Cable y telecomuniciones Galicia ServerCentral, Samjung Data Service, SSDN Communications, sakura internet inc, SaudiNet, SFR, Sedel, SK Telecom, SKY Broadband, Singlehop, Smart Broadband, Softbank Telecom Corp, Softlayer, SoftlayerMGBlock, STS, SONATEL, Sprint, Speedclick, Splendor, Spectrmnet,What Starnet, is the Starhub financial Internet, Subisu model Cablenet behind (pvt )each Ltd, Switchspace, operator? Syrian Linked Telecommunications, to ML? TATA Communications, Telefonica USA, Telecommunications Company, Time Warner Cable, T Mobile, Telebec, Telkom Internet, Telstra Internet, Telecom Algeria, telenet N.V., Telio Holdings, Telefonica De Argentina, Telus Communications, TPG Internet Pty, TalkFree, Telenor, TeliaCarrier, Tikona Digital Networks Pvt, Telefonica De Espana, Telia Network Services, Telecom Internet, Telecom Services Trinidad & Tobago, Tiscali, Telecom Malaysia Berhad, Tricom, Talk4Free, Telgua, Telinta VoIP Company, Telefonica Moviles Panama, Tirpitz, Tim Celular S.A. Telecom Indonesia, TOT Public Company Limited, Turk Telecom, UK Rtelecom, Ubiquity Servers, UCOM, UPC AUSTRIA, UPC Polska, Vonage (Leaseweb.B.V), Voyager Internet Limited, Verat DOO, Verizon, Verizon Sweden, Vivacom, VideoTron, VDC, VIVO, VOO, Vosox, voxsun.net, ViVox, Vitelity, Virtustream, Vonage, VolumeDrive, Vaboomz, Voipms, Yahoo, VoX Communications, Voxee, Wave Internet Services, WebNX, Webair, WholeSale Internet, WindTelecom, Windstream Communications, XO_Communications, Xplornet Communications, YahooSIP, YOU Broadband, ZAMTEL, Ziggo, ZON TV cabo, ZSR-ZT Bratislava, 44Direct, 8 x 8 5 Graham Butler – President and CEO Bitek © 2013 Tackling the illegal trade in the Digital world
Recommended publications
  • Peer-To-Peer Software and Use of NRC Computers to Process SUNSI Frequently Asked Questions
    Peer-to-Peer Software and Use of NRC Computers to Process SUNSI Frequently Asked Questions 1. What is peer-to-peer software? Peer-to-peer, or P2P, file-sharing systems provide users with the ability to share files on their computers with other people through the Internet. The most popular P2P software is free and is used to share music, movies, and games, and for Instant Messaging. 2. Why is P2P a problem? P2P software provides the capability for users to access files on other users’ computers beyond those intended for sharing (i.e., music). For example, if you have P2P software on your computer and you also do your own tax preparation on your computer and store a copy of the tax return on your hard drive, other people anywhere in the world may be able to access the files containing your tax return. 3. Have sensitive government files been obtained through the use of P2P? Yes. There are documented incidents where P2P software was used to obtain sensitive government information when peer-to-peer software was installed on a government or home computer. 4. Is someone obtaining sensitive information the only threat? No. P2P can also make it easier for computer viruses and other malicious software to be installed on your computer without your knowledge. 5. Have other Federal agencies adopted similar policies? Yes, other Federal agencies have adopted similar policies. The Office of Management and Budget wrote the requirements for government-wide adoption in 2004. Additionally, due to the increased awareness of the P2P threat that has arisen since 2004, DOT, DHS, DOE, DOD, and other agencies have issued specific P2P policies.
    [Show full text]
  • Indian Entertainment and Media Outlook 2010 2 Indian Entertainment and Media Outlook 2010 Message
    Indian entertainment and media outlook 2010 2 Indian entertainment and media outlook 2010 Message To our clients and friends both in and beyond the entertainment and media industry : Welcome to the 2010 edition of PricewaterhouseCoopers’ Indian Entertainment and Media (E&M) Outlook, covering the forecast period of 2010–2014. Our forecasts and analysis for this edition focus on eight major E&M industry segments and one emerging segment. Each segment details out the key trends observed and challenges faced apart from providing the prospects for the segment. In the industry overview section, we have highlighted the key theme observed during 2009 and what we perceive as future trends in the coming years. We have a chapter on the tax and regulatory impact on the various E&M segments and for the very first time we have included a chapter on how technology can be leveraged in the E&M industry. In 2009, the economy severely impacted the world, translating into steep declines in advertisement as well as consumer spending. India though impacted, did manage to show growth with increased consumer spending as well as innovative action on the part of the industry. Against this backdrop, across the world, except certain markets, speed of digital spending increased due to changing consumer behavior as well as technology available to deliver the same. In India, while the spend on digital media is likely to grow, it is unlikely that it will dominate in the forecast period. This is largely due to the relative unavailability as well as unaffordability of the broadband and mobile infrastructure.
    [Show full text]
  • Time Warner Cable Inc. and 10-Q, Quarterly Report of Time Warner Cable Inc
    FILED 7-02-15 04:59 PM EXHIBITA1507009 E: Form 10-K, Annual Report of Time Warner Cable Inc. and 10-Q, Quarterly Report of Time Warner Cable Inc. TIME WARNER CABLE INC. FORM 10-K (Annual Report) Filed 02/13/15 for the Period Ending 12/31/14 Address 60 COLUMBUS CIRCLE, 17TH FLOOR NEW YORK, NY 10023 Telephone 212-364-8200 CIK 0001377013 Symbol TWC SIC Code 4841 - Cable and Other Pay Television Services Industry Broadcasting & Cable TV Sector Services Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2015, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2014 Commission file number 001-33335 TIME WARNER CABLE INC. (Exact name of registrant as specified in its charter) Delaware 84-1496755 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) 60 Columbus Circle New York, New York 10023 (Address of principal executive offices) (Zip Code) (212) 364-8200 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Name of each exchange on which Title of each class registered Common Stock, par value $0.01 New York Stock Exchange 5.750% Notes due 2031 New York Stock Exchange 5.250% Notes due 2042 New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • OPEN SOURCE Software Enter the World Of
    OPEN SOURCE Software http://www.bacula.org http://eraser.heidi.ie Eraser is a secure data Bacula is a set removal tool for Win- of computer programs that permit manag- dows. It completely removes sensitive data ing backup, recovery, and verification of from your hard drive by overwriting it several computer data across a network of com- times with carefully selected patterns. Eraser puters of different kinds. Based on Source is currently supported under Windows XP Forge downloads, Bacula is the most popu- lar Open Source backup program. (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Win- dows Server 2008, Windows 7 and Windows Server 2008 R2. http://www.emule-project.net e M u l e is a filesharing client which is based on http://shareaza.sourceforge.net/ the eDonkey2000 network but offers more features than the standard client. Shareaza is a very powerful multi-network eMule is one of the biggest and most peer-to-peer ( P2P ) file-sharing client sup- reliable peer-to-peer file sharing clients porting Gnutella² ( G2 ), Gnutella ( G1 ), around the world. eDonkey2000 ( eMule ), DC++, HTTP, FTP and BitTorrent protocols for Windows (or Wine). It allows you to download any file-type For more OSS, visit sourceforge found on several popular P2P networks. Shareaza is FREE & contains NO Spyware or third-party products. http://www.scintilla.org Scintilla is a free source code editing compo- nent which includes useful features such as syntax styling, error indicators, folding, code completion and call tips. The project includes SciTE (SCIntilla based Text Editor).
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Faster Interconnects for Next-Generation Data Centers 2
    Faster Interconnects for Next- Generation Data Centers Summary Insight With the data deluge washing over today’s data centers, IT Author: Jean S. Bozman infrastructure benefits from Introduction faster interconnects. Faster storage requires faster A wave of change is sweeping over the data center – and a multi- networks. Even more terabyte data deluge is coming along with it. This rapid change is being generated by new sources of data coming from Cloud performance can be achieved by Computing, Mobility, Social Media and Big Data/Analytics. All of using iSER, a maturing these workloads must now be supported, along with transactional standard for extending iSCSI processing, enterprise applications and data warehouses. with RDMA (Remote Direct For many IT professionals, the new demands are causing a “rethink” Memory Access). Using iSER, of their data-transfer infrastructure. The Fibre Channel high-performing storage can be interconnects and slower Ethernet links are showing their age – and connected to fast Ethernet links the aging links must be updated or replaced as quickly as possible. via iSCSI, speeding data Otherwise, these slow links will be “bottlenecks” that slow down the transfers from the network to business or organization that depends on that IT infrastructure. servers and storage systems. This process of data center transformation requires thoughtful These technologies can be used planning – but IT organizations cannot afford to wait too long, or together to replace aging high- performance of mission-critical applications and databases will speed interconnects, such as suffer. Fibre Channel links and older Ethernet links. Flash Storage and Your Network Many technologies will need to become more efficient in the process, including the storage systems that house the data – and send it to the compute engines for processing.
    [Show full text]
  • Software to Download from File Sharing Sites 10 Best File Sharing Software for Peer to Peer File Sharing
    software to download from file sharing sites 10 Best File Sharing Software for Peer to Peer File Sharing. Sharing files online isn’t that much easy as it should be, especially, if you have large files with size in GBs. Thankfully, we can use P2P (peer-to- peer) file sharing software to easily share files with anyone online of no matter what size. You can easily upload or download TBs of data without any restrictions. P2P file sharing software can be quite handy, but at the same time, they also have some negative points. These p2p file sharing software also host illegal downloads so that it may lead to any action against you. Furthermore, these peer to peer file sharing software are also known to spread viruses and malware; you will have to be careful about downloading too. Top 10 Best File Sharing Software for Peer to Peer File Sharing. There are dozens of P2P file sharing software to choose from, but it is essential to choose the best P2P file sharing software that is safe and features rich. To help you find the best file sharing software for your needs, we have compiled a list of best file sharing software. You can just select the one that seems right for your needs. 1. uTorrent. Even after being acquired by BitTorrent.inc and becoming closed-sourced with ads, uTorrent is still the leader when it comes to P2P file sharing software. Although you need to subscribe for a premium membership to take full advantage of the client, even its free version offers all the required features to upload and download files without limitations.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • UTEP Standard 20: Software Licensing 20.1 All Software Used On
    UTEP Standard 20: Software Licensing 20.1 All software used on University devices will be used in accordance with the applicable software license. Unauthorized or unlicensed use of software is regarded as a serious violation subject to disciplinary action and any such use is without the consent of the University. (a) UTEP Information Security Policies: UTEP provides a sufficient number of cost-effective, licensed copies of core business software to enable faculty members, staff, and students to perform their work in an expedient and effective manner. (b) Systems administrators have the right to remove software from University devices for cause. For example, if a user in unable to show proof of license, or if the software is not required for University business purpose, or causes problems on the University- owned device. (c) All departments/colleges are responsible for the accurate accounting of software purchased by their respective department/ college and must ensure that the installation of the software complies with the license agreement of the software. For audit purposes, departments/colleges must maintain proof of purchase and/or original installation media for each software package. Third- party software in the possession of UTEP must not be copied unless such copying is consistent with relevant license agreements and prior management approval of such copying has been obtained, or copies are being made for contingency planning purposes. (d) All software purchases shall go through the UTEP Purchasing Department. (e) All commercial software used on computing systems must be supported by a software license agreement that specifically describes the usage rights and restrictions of the product and shall be purchased through the Purchasing Department.
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Big Data for Measuring the Information Society
    BIG DATA FOR MEASURING THE INFORMATION SOCIETY COUNTRY REPORT SWEDEN 1 / 44 Acknowledgments: The big data analysis contained in this report was carried out by Ivan Vallejo Vall, Market Analyst at the ICT Data and Statistics Division within the Telecommunication Development Bureau of ITU. Fredrik Eriksson, Statistician in the same division, made substantial contributions to the analysis. The Internet Foundation in Sweden (IIS) provided the data used in this report, as well as insightful information on the methodology of the data collection. IIS’s cooperation is duly acknowledged. 2 / 44 CONTENTS Contents ........................................................................................................................................................ 3 1. Background and Context ........................................................................................................................... 4 1.1. Project Description ............................................................................................................................. 4 1.2. Pilot Country Context ......................................................................................................................... 4 1.3. Stakeholders in the pilot and project timeline .................................................................................. 6 2. Getting Access to the Data: Procedures, Legal Documents and Challenges ............................................ 7 2.1. Legal Documents and Challenges .....................................................................................................
    [Show full text]