Measurement and diagnosis of address misconfigured P2P traffic

作者: Zhichun Li , Anup Goyal , Yan Chen , Aleksandar Kuzmanovic

DOI: 10.1109/MNET.2011.5772057

关键词:

摘要: Through measurement study, we discover an interesting phenomenon, P2P address misconfiguration, in which a large number of peers send file downloading requests to "random" target on the Internet. measuring three datasets spanning four years and across five different /8 networks, find address-misconfigured traffic average contributes 38.9 percent Internet background radiation, increasing by more than 100 every year. To detect diagnose such unwanted traffic, design P2PScope, tool. After analyzing about 2 Tbytes data tracking millions peers, found that all systems, misconfiguration is caused resource mapping contamination: sources returned for given ID through indexing are not valid. Different systems have reasons contamination. For eMule, root cause mainly network byte-order problem eMule Source Exchange protocol. BitTorrent one reason anti-P2P companies actively inject bogus into system. Another KTorrent implementation has problem.

参考文章(10)
Evan Cooke, Michael Bailey, Farnam Jahanian, Richard Mortier, None, The dark oracle: perspective-aware unused and unreachable address discovery networked systems design and implementation. pp. 8- 8 ,(2006)
C. Labovitz, A. Ahuja, F. Jahanian, Experimental study of Internet stability and backbone failures ieee international symposium on fault tolerant computing. pp. 278- 285 ,(1999) , 10.1109/FTCS.1999.781062
Zhenyu Guo, Feibo Chen, Xuezheng Liu, Xi Wang, Ming Wu, Zheng Zhang, Xiaochen Lian, Jian Tang, M. Frans Kaashoek, D 3 S: debugging deployed distributed systems networked systems design and implementation. pp. 423- 437 ,(2008)
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Ratul Mahajan, David Wetherall, Tom Anderson, Understanding BGP misconfiguration Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '02. ,vol. 32, pp. 3- 16 ,(2002) , 10.1145/633025.633027
Paramvir Bahl, Ranveer Chandra, Albert Greenberg, Srikanth Kandula, David A. Maltz, Ming Zhang, Towards highly reliable enterprise network services via inference of multi-level dependencies acm special interest group on data communication. ,vol. 37, pp. 13- 24 ,(2007) , 10.1145/1282380.1282383
Ruben D. Torres, Mohammad Y. Hajjat, Sanjay G. Rao, Marco Mellia, Maurizio M. Munafo, Inferring undesirable behavior from P2P traffic analysis Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems - SIGMETRICS '09. ,vol. 37, pp. 25- 36 ,(2009) , 10.1145/1555349.1555353
J. Liang, N. Naoumov, K. W. Ross, The Index Poisoning Attack in P2P File Sharing Systems ieee international conference computer and communications. pp. 1- 12 ,(2006) , 10.1109/INFOCOM.2006.232
Vinod Yegneswaran, Vern Paxson, Paul Barford, Using Honeynets for Internet Situational Awareness ,(2005)
Dennis Geels, Gautam Altekar, Petros Maniatis, Timothy Roscoe, Ion Stoica, None, Friday: global comprehension for distributed replay networked systems design and implementation. pp. 21- 21 ,(2007)