Bypassing internet service provider traffic shaping with peer-to-peer file sharing through deliberate false positives

نویسنده

  • C. B. Hays
چکیده

QoS applications rely on accurate detection of protocols in order to effectively manage traffic passing across networks. Peer-to-peer developers already use encryption and network overlays to bypass ISP traffic shaping but their methods only obfuscate telltale signatures. Unidentifiable or encrypted traffic can still be classified as such and therefore can still be managed. The author addresses the feasibility of using protocol mimicry to invoke deliberate false positives in order to bypass existing traffic analysis systems by masquerading as web browsing and VoIP traffic. Statistical analysis is undertaken to determine the costs associated with such modifications. It is found that peer-to-peer protocols can easily be modified to be incorrectly identified as genuine web and voice traffic without impractical increases in bandwidth consumption. The incorrect classification of such traffic can cause havoc with regard to priority-based queuing mechanisms, whereas allowing users to use throttled applications without restrictions. It is certainly feasible for file-sharing protocols such as BitTorrent being further developed to mimic the traits of less throttled protocols to bypass traffic shaping. This poses a huge risk to future ISP and corporate traffic management.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures

The BitTorrent (BT) protocol was already in 2005 a widley used peer-to-peer (P2P) file sharing protocol and produced a high amount of traffic. Some internet service providers (ISPs) began to slow down the BT protocol to provide users more bandwidth for other protocols. The BT community introduced a new protocol, called Message Stream Encryption (MSE) to bypass the limitations of the ISPs. This ...

متن کامل

The eDonkey File-Sharing Network

The eDonkey 2000 file-sharing network is one of the most successful peerto-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are connected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer ...

متن کامل

Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors

A user who wants to use a service forbidden by their site’s usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited traffic on TCP ports commonly used by permitted services, such as port 80. Users who hide their traffic in this way pose a special challenge, since filtering by port number risks interfering with legitimate services using th...

متن کامل

A Measurement-Based Traffic Profile of the eDonkey Filesharing Service

Peer-to-peer file sharing applications have evolved to one of the major traffic sources in the Internet. In particular, the eDonkey file sharing system and its derivatives are causing high amounts of traffic volume in today’s networks. The eDonkey system is typically used for exchanging very large files like audio/video CDs or even DVD images. In this report we provide a measurement based traff...

متن کامل

On Improving Network Locality in BitTorrent-Like Systems

The emerging Peer-to-Peer (P2P) model has become a very popular paradigm for developing Internet-scale systems. The BitTorrent is an example of P2P system for sharing resources, including files and documents. Owing to the peer does not have the capability of locality aware, it cannot differentiate its neighbors belong to which Internet Service Provider (ISP), file sharing results in a large num...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IET Communications

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2011