Preventing Ddos Attacks with P2P Systems Through Robust Membership Management

Total Page:16

File Type:pdf, Size:1020Kb

Preventing Ddos Attacks with P2P Systems Through Robust Membership Management Preventing DDoS Attacks with P2P Systems through Robust Membership Management Xin Sun, Ruben Torres and Sanjay Rao School of Electrical and Computer Engineering, Purdue University West Lafayette, IN 47907 {sun19, rtorresg, sanjay}@ecn.purdue.edu ABSTRACT in a safe, secure and robust manner, and understand We show that malicious nodes in a peer-to-peer system may their impact on an Internet environment already suf- impact the external Internet environment, by causing large- fering from several security problems. Peer-to-peer sys- scale distributed denial of service attacks on nodes not even tems enable rapid deployment by moving functionality part of the overlay system. This is in contrast to attacks that to end-systems. However, they are vulnerable to insider disrupt the normal functioning, and performance of the over- attacks coming from (potentially colluding) attackers lay system itself. We formulate several principles critical that infiltrate the overlay or compromise member nodes. to the design of membership management protocols robust Several recent works [8,12,28,29,34] have studied how to such attacks. We show that (i) pull-based mechanisms malicious nodes in a peer-to-peer system may disrupt are preferable to push-based mechanisms; (ii) it is critical the normal functioning, and performance of the system to validate membership information received by a node, and itself. In this paper, however, we focus on attacks where even simple probe-based techniques can be quite effective; malicious nodes in a peer-to-peer system may impact (iii) validating information by requiring corroboration from the external Internet environment, by causing large- multiple sources can provide good security properties with scale distributed denial of service (DDoS) attacks on insignificant performance penalties; and (iv) it is important nodes not even part of the overlay system. In particu- to bound the number of distinct logical identifier (e.g. IDs in lar, an attacker could subvert membership management a DHT) corresponding to the same physical identifier (e.g., mechanisms, and force a large fraction of nodes in the IP address), which a participating node is unable to vali- system to believe in the existence of, and communicate date. We demonstrate the importance of these principles in with a potentially arbitrary node in the Internet. Such the context of the Kad system for file distribution, and ESM attacks may be hard to detect as the packets arriving at system for video broadcasting. To our knowledge, this is a victim are not distinguishable from normal protocol the first systematic study of issues in the design of member- packets. These attacks may be viewed as a particu- ship management algorithms in peer-to-peer systems so they lar kind of reflector attacks [23], however the scale and may be robust to attacks exploiting them for DDoS attacks unique properties of peer-to-peer systems make them on external nodes. worthy of study in their own right. We show that a potential attacker can launch attacks of hundreds of megabits a second on an external node, 1. INTRODUCTION by exploiting popularly deployed file distribution sys- Peer-to-peer systems are rapidly maturing from being tems such as eMule [13], and the extensively deployed narrowly associated with copyright violations, to a tech- video broadcast system ESM [10]. While recent work nology that offers tremendous potential to deploy new [5,22] has presented attacks exploiting the Gnutella and services over the Internet. The recently released Win- Overnet systems, we show that the problem is far more dows Vista is equipped with its own, under-the-hood critical than these works demonstrate, and is general P2P networking system [2], and several commercial ef- to a wider range of systems. We believe these attacks forts are exploring the use of peer-to-peer systems for are merely the tip of the iceberg, and unless the chal- live media streaming and video distribution [3,6,14,24, lenges are systematically addressed, there is potential 33,36]. Recent studies [9] indicate that over 60% of net- for catastrophic consequences on the Internet akin to work traffic is dominated by peer-to-peer systems, and the congestion collapse in the mid 80’s or the large-scale the emergence of these systems has drastically affected worm outbreaks in the last decade. traffic usage and capacity engineering. We present the first systematic study of issues in the With the proliferation of peer-to-peer systems, it be- design of membership management algorithms in peer- comes critical to consider how they can be deployed to-peer systems so they may be robust to such exploits. 1 In this paper, we focus on DDoS attacks triggered B M by exploiting the membership management algorithms , F Q E C of peer-to-peer systems. The membership management R P, S , F E Q R E , V algorithms in a peer-to-peer system enable a node to R P ES R join the group, and maintain information about other REQ, F A C members, even though nodes may join or leave the sys- RESP,I Index A I for F tem. To scale to large group sizes, typical nodes main- R R R EQ E EQ , F tain knowledge of only a small subset of group mem- SP , , F So bers. While a large number of peer-to-peer systems ur ce s Index V have emerged in recent years, two of the most com- I for F mon approaches for membership management involve the use of distributed hash tables (DHTs) [20, 25, 26, a) b) 30,38], and gossip-based algorithms. While popular file- distribution systems like BitTorrent [7] and eMule [13] Figure 1: a) Kad search mechanism. b) Redi- originally relied on centralized servers (trackers) for group rection attack management, more recent versions use decentralized mech- anisms based on DHTs. Many other systems such as ESM and CoolStreaming [10,37] employ gossip-like mech- We show that pull-based approaches, where informa- anisms to maintain group membership information. tion conveyed by a member is always in response to To demonstrate the generality of the issues discussed, a prior solicitation, are preferable to push-based ap- we consider peer-to-peer systems targeted at applica- proaches where a member may disseminate member- tions with very contrasting properties very different mem- ship information to other members in an unsolicited bership management designs. In particular, we con- fashion. We evaluate techniques for validating group sider file distribution and video broadcasting applica- membership information communicated from one node tions. Video broadcast applications are distinguished to another. These techniques include direct validation by their stringent real-time constraints requiring timely through probes, and techniques where information can and continuously streaming delivery. Both applications be used only if it is validated from multiple nodes. While are bandwidth-intensive, and large scale, corresponding the latter technique is inspired by prior analytical work to tens of thousands of users simultaneously participat- on Byzantine-tolerant gossip algorithms [17–19, 21], we ing in the application. study the costs in convergence/performance, and bene- The particular systems we consider in this work in- fits in terms of enhanced security properties in the con- clude Kad [13] for file distribution and ESM [10] for text of an actual system. Finally, we show that it is video broadcasting. Kad is a DHT based on Kadem- important to bound the number of distinct logical iden- lia [20], which is supported by the popular eMule [13] tifier (e.g. IDs in a DHT) corresponding to the same clients and other eMule-like clients such as aMule [4] physical identifier (e.g., IP address), which a participat- and xMule [35]. To the extend of our knowledge, Kad ing node is unable to validate. is the largest DHT currently used, with more than one Based on the principles above, we implement several million concurrent peers [31]. ESM is a video broadcast- refinements to the membership management algorithms ing system that employs gossip-based membership algo- in Kadand ESM. We conduct detailed evaluation stud- rithms. It is one of the first operationally deployed sys- ies of the systems with the various refinements using tems and has seen significant real-world deployment [10]. controlled experiments on Planetlab. Overall, our re- We are motivated to use these systems given their ex- sults demonstrate their effectiveness in minimizing the tensive deployment, the contrasting applications they vulnerability of the systems to DDoS attacks without represent, and the different yet representative member- significant degradation in application performance. ship algorithms they employ. The rest of the paper is organized as follows. Sec- tion 2 describes the rationale for choosing the Kadand 2.1 DHT-Based File Distribution:Kad ESM systems, and the vulnerabilities. Section 3 presents In Kad, users and files have IDs that are globally results demonstrating the feasibility of DDoS attacks on unique and randomly chosen from the same ID space these systems. Section 4 describes issues important in of 128 bits. Each node maintains a routing table with the design of resilient membership management algo- a subset of peers that are part of the system. For any rithms. Section 5 describes our methodology to evalu- given file, there are “index-nodes” which maintain a list ate the issues, and Section 6 presents results. of members who own that file. Index nodes are not dedicated nodes but regular participants, who have an 2. VULNERABILITIES IN P2P SYSTEMS ID close to a file ID. For example, in Figure 1.a), node 2 A wishes to download a file F. A must first discover Baseline 1000 Attraction the index-node I, and obtain from it a list of members Multifake 100 Combination having the file.
Recommended publications
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Gnutella Etc
    Uni Innsbruck Informatik - 1 Peer-to-Peer Systems Unstructured P2P File Sharing Systems Michael Welzl [email protected] DPS NSG Team http://dps.uibk.ac.at/nsg Institute of Computer Science University of Innsbruck, Austria Uni Innsbruck Informatik - 2 Unstructured vs. Structured P2P systems • Terms refer to information management: where are objects placed, how are they found? – Distributed “randomly“ across the network, with several replicas – Content source stays where it is – Structured P2P systems: rules bind content to (typically hash) keys, which are used as addresses (“document routing model“) • Systems like Napster, Gnutella etc. are unstructured • Three common models: – Centralized (also: “central server model“); e.g. Napster, BitTorrent –Pure; e.g. Gnutella 0.4, Freenet “flooded request model“ –Hybrid; e.g. Gnutella 0.6, Kazaa, JXTA Uni Innsbruck Informatik - 3 Development of P2P Applications 100% Freenet Direct Connect++ Shoutcast Carracho 90% Blubster Neo-M odus 80% FastTrack WinM X FastTrack Shoutcast 70% Audiogalaxy eDonkey2000 Hotline 60% Gnutella BitTorrent 50% 40% 30% datavolumes in per week % 20% edonkey BitTorrent Gnutella 10% 0% 18.02.2002 18.05.2002 18.08.2002 18.11.2002 18.02.2003 18.05.2003 18.08.2003 18.11.2003 18.02.2004 18.05.2004 18.08.2004 Data source: http://netflow.internet2.edu/weekly/ Traffic portions of the different P2P applications and protocols from the traffic measured per week in the Abilene backbone from 18.02.2002 until 18.010.2004 Uni Innsbruck Informatik - 4 Development of P2P applications
    [Show full text]
  • Shutter Limewire
    Case 1:06-cv-05936-KMW Document 235-2 Filed 06/04/2010 Page 1 of 15 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ARISTA RECORDS LLC; ATLANTIC RECORDING CORPORATION; BMG MUSIC; CAPITOL RECORDS, INC.; ELECTRA ENTERTAINMENT GROUP INC.; INTERSCOPE RECORDS; LAFACE RECORDS LLC; MOTOWN RECORD COMPANY, L.P.; PRIORITY RECORDS LLC; SONY BMG MUSIC ENTERTAINMENT; UMG RECORDINGS, 06 Civ. 05936 (KMW) INC.; and WARNER BROS. RECORDS INC., ECF CASE Plaintiffs, [PROPOSED] PERMANENT v. INJUNCTION AGAINST LIME WIRE LLC; LIME GROUP LLC; LIME WIRE LLC; LIME GROUP LLC; AND MARK GORTON MARK GORTON; GREG BILDSON; and M.J.G. LIME WIRE FAMILY LIMITED PARTNERSHIP, Defendants. By Opinion and Order entered May 11, 2010, and amended on May 25, 2010 (“Order”), this Court found defendants Lime Group LLC, Lime Wire LLC, and Mark Gorton (collectively, “Lime Wire”) liable for inducing copyright infringement on a “massive scale.” (Order at 33.) The Court now enters a Permanent Injunction in favor of the Plaintiffs, and against Lime Wire pursuant to 17 U.S.C. § 502 and Federal Rule of Civil Procedure 65, and in accordance with the following terms. I. PERMANENT INJUNCTIVE RELIEF IS WARRANTED In its Order, the Court held Lime Wire liable for inducement of copyright infringement, as well as for common law copyright infringement and unfair competition as to Plaintiffs’ protected pre-1972 works. The evidence showed as a matter of law that: Lime Wire “intentionally encouraged direct infringement” by Lime Wire users. (Order at 29.) 10710383.4 1 Case 1:06-cv-05936-KMW Document 235-2 Filed 06/04/2010 Page 2 of 15 The LimeWire client software is used “overwhelmingly for infringement,” and allows for infringement on a “massive scale.” (Id.
    [Show full text]
  • Ensemble Machine Learning for P2P Traffic Identification
    International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. #, No.# (Mon-20..) Ensemble Machine Learning for P2P Traffic Identification Md. Sarfaraj Alam Ansari1, Kunwar Pal2, Mahesh Chandra Govil1, Prajjval Govil3, Adarsh Srivastava1 1 Department of Computer Science and Engineering, National Institute of Technology Sikkim, India 2 Department of Computer Science and Engineering, Dr B R Ambedkar National Institute of Technology Jalandhar, India 3Department of Computer Science and Engineering, JK Lakshmipat University, Jaipur, Rajasthan 302 026, India E-mail address: [email protected], [email protected], [email protected], [email protected], [email protected], Received ## Mon. 20##, Revised ## Mon. 20##, Accepted ## Mon. 20##, Published ## Mon. 20## Abstract: Network traffic identification and classification in the current scenario are not only required for traffic management but in designing a future protocol for user-specific services and improve user experiences. This fundamental step of network management is perceived by the researcher long back and started developing techniques for the same. The traditional techniques for traffic identification and classification include port and payload based. The current large and complex network poses many challenges to the researchers in designing approaches for traffic classification by using dynamic ports, encryption, and masquerading techniques. The complexity is further enhanced due to increased dependence on the Internet and diverse applications to enable network administrators including ISPs to manage the network intelligently and efficiently. As traditional techniques are not effective to address the current challenges, a hybrid solution is explored. The hybrid approaches make use of statistics or behavioral-based, heuristic-based, machine learning-based along with feature selection techniques.
    [Show full text]
  • (How to Get Away from the RIAA) Using Newgroups and Hel
    The Regulation of Peer-to-Peer File Sharing Networks: Legal Convergence v. Perception Divergence Dr Katerina Sideri, Email: [email protected] and [email protected] The Regulation of Peer-to-Peer File Sharing Networks: Legal Convergence v. Perception Divergence Dr Katerina Sideri Lecturer in Law School of Law, University of Exeter Email: [email protected] and [email protected] Paper prepared for the AHRB Workshop on Network Theme 2 (Globalisation, Convergence and Divergence) Incomplete working paper, do not quote without the author’s permission. 1 The Regulation of Peer-to-Peer File Sharing Networks: Legal Convergence v. Perception Divergence Dr Katerina Sideri, Email: [email protected] and [email protected] A P2P: Regulatory Convergence Millions of people around the globe use peer-to-peer (P2P) file sharing networks. However, as these networks function like search engines, allowing looking into files stored in users’ hard discs, many engage in downloading music and movies for free, without compensating copyright holders. Digital technology makes the distribution of multiple perfect copies of copyright material so easy that the entertainment industry has been alerted and brought proceedings before courts in the US, Europe, Canada, Australia and Asia, targeting users and the makers of P2P software for copyright violations, and submitting that it has lost millions as a result of the piracy and counterfeiting taking place in such networks. However, P2P networks are not meant to be primarily designed to promote piracy.1 They play the role of a new distribution channel to promote music or other kinds of art, or even share personal photos with some million other users, thus advancing cultural expression and creativity.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, on page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for November 28, 2019. None in this release. All Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols and applications supported until ADC Plugin release on October 31, 2019. Peer-to-Peer Protocol and Application Detection Support 1 Peer-to-Peer Protocol and Application Detection Support All Supported Protocols and Applications Protocol / Client Client Version Group Classification Supported from Application Release 120Sports 120Sports 1.6
    [Show full text]
  • Identification and Analysis of Peer-To-Peer Traffic
    36 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 7, NOVEMBER/DECEMBER 2006 Identification and Analysis of Peer-to-Peer Traffic Marcell Perényi, Trang Dinh Dang, András Gefferth, Sándor Molnár Budapest University of Technology & Economics, Department of Telecommunications & Media Informatics, Budapest, Hungary Email: {perenyim, trang, gefferth, molnar}@tmit.bme.hu Abstract – Recent measurement studies report that a Connect, etc.). The traffic generated by these P2P significant portion of Internet traffic is unknown. It is very applications consumes the biggest portion of bandwidth likely that the majority of the unidentified traffic originates in campus networks, overtaking the traffic share of the from peer-to-peer (P2P) applications. However, traditional World Wide Web [6, 31]. A common feature in all of techniques to identify P2P traffic seem to fail since these these P2P applications is that they are built on the P2P applications usually disguise their existence by using arbitrary ports. In addition to the identification of actual system design where instead of using the server and client P2P traffic, the characteristics of that type of traffic are also concept of the web each peer can function both as a scarcely known. server and a client to the other nodes of the network. This The main purpose of this paper is twofold. First, we propose principle involves the adapting nature of P2P systems as a novel identification method to reveal P2P traffic from individual peers join or leave the network. Another traffic aggregation. Our method does not rely on packet common feature of these P2P systems is that they are payload so we avoid the difficulties arising from legal, mainly used for multimedia file sharing (movies, music privacy-related, financial and technical obstacles.
    [Show full text]
  • List Software Pengganti Windows Ke Linux
    Tabel Padanan Aplikasi Windows di Linux Untuk Migrasi Selasa, 18-08-2009 Kesulitan besar dalam melakukan migrasi dari Windows ke Linux adalah mencari software pengganti yang berkesesuaian. Berikut ini adalah tabel padanan aplikasi Windows di Linux yang disusun dalam beberapa kategori. Nama Program Windows Linux 1) Networking. 1) Netscape / Mozilla. 2) Galeon. 3) Konqueror. 4) Opera. [Prop] Internet Explorer, 5) Firefox. Web browser Netscape / Mozilla, Opera 6) Nautilus. [Prop], Firefox, ... 7) Epiphany. 8) Links. (with "-g" key). 9) Dillo. 10) Encompass. 1) Links. 1) Links 2) ELinks. Console web browser 2) Lynx 3) Lynx. 3) Xemacs + w3. 4) w3m. 5) Xemacs + w3. 1) Evolution. 2) Netscape / Mozilla/Thunderbird messenger. 3) Sylpheed / Claws Mail. 4) Kmail. Outlook Express, 5) Gnus. Netscape / Mozilla, 6) Balsa. Thunderbird, The Bat, 7) Bynari Insight GroupWare Suite. Email client Eudora, Becky, Datula, [Prop] Sylpheed / Claws Mail, 8) Arrow. Opera 9) Gnumail. 10) Althea. 11) Liamail. 12) Aethera. 13) MailWarrior. 14) Opera. 1) Evolution. Email client / PIM in MS 2) Bynari Insight GroupWare Suite. Outlook Outlook style [Prop] 3) Aethera. 4) Sylpheed. 5) Claws Mail 1) Sylpheed. 2) Claws Mail Email client in The Bat The Bat 3) Kmail. style 4) Gnus. 5) Balsa. 1) Pine. [NF] 2) Mutt. Mutt [de], Pine, Pegasus, Console email client 3) Gnus. Emacs 4) Elm. 5) Emacs. 1) Knode. 2) Pan. 1) Agent [Prop] 3) NewsReader. 2) Free Agent 4) Netscape / Mozilla Thunderbird. 3) Xnews 5) Opera [Prop] 4) Outlook 6) Sylpheed / Claws Mail. 5) Netscape / Mozilla Console: News reader 6) Opera [Prop] 7) Pine. [NF] 7) Sylpheed / Claws Mail 8) Mutt.
    [Show full text]
  • Measurement and Diagnosis of Address Misconfigured P2P Traffic
    Measurement and Diagnosis of Address Misconfigured P2P Traffic Zhichun Li, Anup Goyal†, Yan Chen, Aleksandar Kuzmanovic Northwestern University, Evanston, IL, USA †Yahoo! Inc., Sunnyvale, CA, USA Abstract—Misconfigured P2P traffic caused by bugs in We believe that the misconfigured P2P traffic is more preva- volunteer-developed P2P software or by attackers is prevalent. lent than what we observe, i.e., those caused by address mis- It influences both end users and ISPs. In this paper, we discover configuration. It can also be caused by port misconfiguration, and study address-misconfigured P2P traffic, a major class of such misconfiguration. P2P address misconfiguration is a phenomenon firewall or NAT incompatibility. Such problems are rooted from in which a large number of peers send P2P file downloading the large number of volunteer-developed P2P software variants, requests to a “random” target on the Internet. On measuring three which are often neither well tested nor checked for correctness. Honeynet datasets spanning four years and across five different /8 Thus, they can easily contain subtle bugs. For example, the networks, we find address-misconfigured P2P traffic on average BitTorrent alone has over 50 different variants [3]. Furthermore, contributes 38.9% of Internet background radiation, increasing by more than 100% every year. such traffic can be caused by malicious intent, such as from In this paper, we design the P 2PScope, a measurement tool, anti-P2P companies. Unlike content poisoning, such unwanted to detect and diagnose such unwanted traffic. After analyzing traffic has received little attention. about two TB data and tracking millions of peers, We find, In this paper, we call for more research in studying such in all the P2P systems, address misconfiguration is caused by unwanted traffic, and diagnose its root causes.
    [Show full text]
  • Tackling the Illegal Trade in the Digital World
    Cyber-laundering: dirty money digitally laundered- Tackling the illegal trade in the Digital world Graham Butler Special Presentation to the Academy of European Law Budapest – March 2016 Co-funded by the Justice Programme of the European Union 2014-2020 Graham Butler – Chairman Bitek Group of Companies © 2016 Tackling the illegal trade in the Digital world Supporting the Cyber-Security agenda ERA (Academy of European Law) – Lisbon / Trier / Sofia / Brussels Address: Threats to Financial Systems – VoIP, lawful intercept, money laundering CTO (Commonwealth Telecommunications Organisation) London Address: Working group on strategic development for 2016-2020 ITU High level Experts Group – Cybersecurity Agenda – Geneva (United Nations) Address: VoIP and P2P Security – Lawful Intercept ENFSC (European Network Forensic and Security Conference) - Maastricht Address: Risks of P2P in Corporate Networks CTITF (Counter Terrorism Implementation Taskforce) - Seattle Address: Terrorist use of encrypted VoIP/P2P protocols - Skype Norwegian Police Investigation Section - Oslo Address: Next Generation Networks – VoIP Security (fixed and mobile networks) IGF (Internet Governance Forum) – Sharm El Sheikh, Egypt Address: Threats to Carrier Revenues and Government Taxes – VoIP bypass EastWest Institute Working Group on Cybercrime - Brussels / London Working Groups: Global Treaty on Cybersecurity / Combating Online Child Abuse CANTO (Caribbean Association of National Telecoms Org) – Belize / Barbados Address: Reversing Declines in Telecommunications Revenue ICLN (International Criminal Law Network) - The Hague Address: Cybercrime Threats to Financial Systems CIRCAMP (Interpol / Europol) - Brussels Working Groups: Online Child Abuse – The Fight Against illegal Content Graham Butler – President and CEO Bitek © 2013 1 Tackling the illegal trade in the Digital world The evolution of interception - circuit switched networks 1. Threat to National Security 3.
    [Show full text]
  • Web 2.0 Enabled Classroom
    7/16/2010 Agenda Market Evolution and Trends Where to Begin Web Questions?2.0 Enabled Introduction to Unified Performance Management Case Studies Classroom © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 1 7/16/2010 Exinda at a Glance Founded in 2002 Melbourne based Leading provider of WAN optimization solutions Privately held with venture capital financing Market Evolution Over 3,000 customers Questions? Several thousand appliances deployed in 40+ countries & Trends Worldwide distribution © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 2 7/16/2010 Market Evolution & Trends Market Evolution & Trends Top five bandwidth heavy websites were: 1. YouTube – 10% of all bandwidth used 2. Facebook – 4.5% 3. Windows Update – 3.3% “On average, 37% of network capacity has 4. Yimg (Yahoo!'s image server) – 2.7% been occupied by traffic that is not business- 5. Google – 2.5% critical.” - Aberdeen Group, “Application Performance Management: When 250 IT managers were asked about their biggest Getting IT on the C-Level Agenda”, March 2009 security concerns, the top answer was "employees using applications on social networks" while at work. Source: Network Box, 20th April, 2010 © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 3 7/16/2010 Market Evolution & Trends Market Evolution & Trends The Council of Australian University Directors Australia Is Social Networking Capital Of The World of Information Technology (CAUDIT) have TELEGRAPH.CO.UK - Mar 3 - According to Nielsen, indicated that traffic is typically doubling Australia's web users are at the forefront of the social networking craze, posting, poking and every nine months (250 per cent a year).
    [Show full text]
  • Creativity Anoiko 2011
    Creativity Anoiko 2011 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sun, 27 Mar 2011 10:09:26 UTC Contents Articles Intelligence 1 Convergent thinking 11 Divergent thinking 12 J. P. Guilford 13 Robert Sternberg 16 Triarchic theory of intelligence 20 Creativity 23 Ellis Paul Torrance 42 Edward de Bono 46 Imagination 51 Mental image 55 Convergent and divergent production 62 Lateral thinking 63 Thinking outside the box 65 Invention 67 Timeline of historic inventions 75 Innovation 111 Patent 124 Problem solving 133 TRIZ 141 Creativity techniques 146 Brainstorming 148 Improvisation 154 Creative problem solving 158 Intuition (knowledge) 160 Metaphor 164 Ideas bank 169 Decision tree 170 Association (psychology) 174 Random juxtaposition 174 Creative destruction 175 References Article Sources and Contributors 184 Image Sources, Licenses and Contributors 189 Article Licenses License 191 Intelligence 1 Intelligence Intelligence is a term describing one or more capacities of the mind. In different contexts this can be defined in different ways, including the capacities for abstract thought, understanding, communication, reasoning, learning, planning, emotional intelligence and problem solving. Intelligence is most widely studied in humans, but is also observed in animals and plants. Artificial intelligence is the intelligence of machines or the simulation of intelligence in machines. Numerous definitions of and hypotheses about intelligence have been proposed since before the twentieth century, with no consensus reached by scholars. Within the discipline of psychology, various approaches to human intelligence have been adopted. The psychometric approach is especially familiar to the general public, as well as being the most researched and by far the most widely used in practical settings.[1] History of the term Intelligence derives from the Latin verb intelligere which derives from inter-legere meaning to "pick out" or discern.
    [Show full text]