DOC - Columbus State University

advertisement
Misconfigured Addresses Created by P2P Clients:
One of the Largest Growing Causes of Internet Background Radiation
James Yoder
Columbus State University
Columbus, GA, USA
Abstract—“In 2004, in a tier-1 ISP [Internet Service Provider],
P2P [Peer 2 Peer] file sharing accounted for more than 60% of
traffic in the USA and more than 80% of the traffic in Asia.” [5]
“According to a survey conducted by ipoque (a German provider
of deep packet inspection solutions for Internet traffic
management and analysis), P2P dominates the Internet with 5090% traffic arising from P2P applications. Statistics from
Chinese sources reveal that P2P traffic currently accounts for
70% of China’s total network traffic.” [8]
With these high statistics, one has to wonder, “Is all of this P2P
traffic getting to its intended destination?” If you do a search for
Internet Background Radiation (IBR), you won’t find much
information even though it is a well-known problem in the
networking field.[2] “[IBR] can be analyzed using a so-called
network telescope. Traffic destined to an other-wise unused
network is dissected and analyzed for anomalies as well as worm
propagation, DDOS attacks and whatnot.” [8]
I.
INTRODUCTION
“Background
radiation
reflects
fundamentally
nonproductive traffic, either malicious (flooding backscatter,
scans for vulnerabilities, worms) or benign (misconfigurations).
While the general presence of background radiation is well
known to the network operator community, its nature has yet to
be broadly characterized.” [2]
In 2007, [1] was authored, shining a light on misconfigured
addresses caused by P2P software. It stated that 38.9% of all
IBR could be attributed to P2P misconfigured addresses and
was growing by at least 100% over each of the four years prior
to the paper’s publishing.
They were the only researchers known to be conducting the
study at the time, and no one seems to have written a paper on
the topic since. They had to discontinue collecting data in the
manner they were because the RIAA (Recording Industry
Association of America) accused them of distributing copywritten material. Assuming they were correct and the growth
rate didn’t change after the paper was authored, then this is
definitely a serious and relevant issue.
It is possible that the paper made an impact on the industry
that alleviated the problem. It could have made naïve
programmers aware of the problem his/her program may
contribute if certain measures are not taken. It could have also
made the malicious coders aware that people realized what they
were doing and were actively pursuing a solution causing them
to find other means to accomplish their task.
On the other hand, if the paper had no direct impact on the
problem and the growth rate continued at what they proposed,
then around 63.2 gigabits per second (gbps) of internet traffic is
background noise that can be attributed solely to misconfigured
IP addresses from P2P software.
We can calculate the total IBR at the time of the paper.
IBR caused by misconfigured IP addresses from P2P software
(7.9 gbps) and the percentage of the total IBR (38.9%) are
indicated in the source paper:[1]

7.9 gbps / 38.9% = 20.3 gbps

We can now say that the total background noise at the time
of the paper was around 20.3 gigabits per second. This means
that the current amount of traffic going to misconfigured
addresses would be more than three times the total IBR when
the paper was authored. It is implied that the total amount of
IBR is generally static (in terms of the number of connections
per year). [1] It is understood that the overall amount of IBR
would have to grow as the amount of P2P misconfigured
addresses grows.
Once the authors of [1] identified which versions of each
program that were causing the most misconfigured addresses,
they diagnosed what was causing the problem and reported it to
the developers.
Section 2 identifies related work. Section 3 outlines my
proposed solution to the problem. Section 4 concludes this
paper.
II.
RELATED WORK
I was able to find papers on IBR and studies that track it
and analyze it.[2][3] Many papers focused on whether the data
sent by P2P software was indeed the data requested which is a
completely separate issue to the topic discussed in this paper.
Reference [4] focused on traffic sent to unused or
unreachable IP addresses, but not necessarily from P2P
applications.
Reference [5] covers index poisoning in P2P networks.
“To describe this attack, recall that most P2P file sharing
systems have indexes, allowing users to discover locations (IP
addresses and port numbers) of desired content.” “The index
poisoning attack is done by inserting massive numbers of
bogus records into the index.”
Reference [6], which was authored in June 2010, was a
good update on the status of IBR and how its profile has
changed over the past few years. Their findings agree with the
status of IBR found in the source paper. “This translates into
roughly 100% growth [of IBR] over the last four years. It is
interesting to note that this rate of growth is nearly twice that of
productive Internet traffic which is currently exhibiting 50%
year over year growth rates.” One of the unused networks they
monitor saw IBR rates up to150 gbps.[6]
household’s bandwidth be throttled if one child decides to
knowingly use software that contains bugs that cause these
issues? Should someone who is using the software for legal
purposes, but unaware of the bugs be punished?
3) What would stop an ISP from falsifying reports for
personal reasons? There are many other questions along this
same thought pattern. While this solution may make it easier
for someone that works at the ISP to harass clients, the
capability is already in place.
A) Test P2P Software
4) This solution relies on ISPs to hold their clients
accountable. It will not work if ISPs do not enforce the
solution or purposefully allow offenders to continue.
Since P2P misconfigured addresses are such a large part of
IBR, it would be good for a group of testers ensure that all
popular P2P software doesn’t have any address bugs similar to
those identified in [1]. A list could be maintained of all
software that contains these bugs and made available so that
users realize that they could be contributing to network
congestion just by using that specific application.
5) Offenders could make the argument that they are paying
for the ISPs service just as everyone else does and they should
be allowed to send data wherever they desire, even if it is not
expected to actually arrive anywhere. While I’m not aware of
any law that requires all data to have a destination, I do not see
how it would be beneficial to allow this type of usage
(especially on the scale we are experiencing).
B) ISP Monitoring
6) It is possible that new assigned addresses might not get
updated in the filtering part of the solution and valid packets
don’t get forwarded as they should. This would theoretically
never occur and cases would be very rare. DNS is able to
maintain an accurate listing of available domains and
hostnames. Maintaining a list of invalid addresses would be
equally difficult.
III.
SOLUTION
ISPs would benefit from not allowing clients to contribute
to the overall IBR. It would allow their network to run more
smoothly. It would also clear bandwidth for valid data
requests, thus making their clients happier and more likely to
stay with the provider.
ISPs should monitor usage of each client. Any large spikes
should be analyzed to ensure it is valid traffic. Data being sent
to addresses that don’t exist should be logged and reported.
Users that repeatedly abuse ISP resources should be
investigated further and potentially throttled or completely
removed.
REFERENCES
[1]
[2]
C) Address Filtering
Also, a list of invalid addresses could be maintained much
like the Dynamic Name System looks up hostnames. All
packets that are destined for these addresses would not be
forwarded.
Instead, the sender would be flagged for
investigation. If the client is a multiple offender, then the
account would be turned off. The user would be contacted
immediately to clear up what is causing the problem. If he/she
can remedy the situation, then the account will be unlocked.
Otherwise, it would be forwarded to the proper authorities.
IV.
CONCLUSION
[3]
[4]
[5]
[6]
The proposed solution presents a few issues:
1) There are privacy issues associated with ISPs monitoring
client usage. The ISP could just monitor the amount of traffic
and type as opposed to specifics. Any suspicious traffic could
be reported and/or forwarded to the proper authorities. The
closest thing to internet police in the United States of America
as of today would include: the Department of Defense’s Cyber
Command, the Department of Homeland Security’s
Cybersecurity division, and the Department of Justice’s
Computer Crime & Intellectual Property Section.
2) Is it fair to punish those who are unaware that they are
part of the problem?
For example, should an entire
[7]
[8]
[9]
Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic, “Measurement and
diagnosis
of
address
misconfigured
P2P
traffic,”
<http://networks.cs.northwestern.edu/publications/misconfig.pdf>
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson,
“Characteristics
of
internet
background
radiation,”
<http://conferences.sigcomm.org/imc/2004/papers/p27-pang.pdf>
P. Barford, R. Nowak, R. Willett, and V. Yegneswaran, “Toward a
model for source addresses of internet background radiation,”
<http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.79.8646&rep
=rep1&type=pdf>
E. Cooke, M. Bailey, F. Jahanian, and R. Mortier, “The dark oracle:
perspective-aware unused and unreachable address discovery,”
<http://www.usenix.org/events/nsdi06/tech/full_papers/cooke/cooke_ht
ml>
J. Liang, N. Naoumov, K. Ross, “The index poisoning attack in P2P file
sharing
systems,”
<http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.81.3640&rep
=rep1&type=pdf>
E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Houston, “Internet
background
radiation
revisited,”
<http://www.eecs.umich.edu/techreports/cse/2010/CSE-TR-564-10.pdf>
X. Huangcheng, “How to operate--solving the P2P puzzle,”
<http://www.huawei.com/publications/view.do?id=3289&cid=5680&pid
=61>
“Monitoring
internet
background
radiation”
<http://wiki.whatthehack.org/index.php/Monitoring_Internet_Backgroun
d_Radiation>
DoD
Cyber
Command
Website,
<http://www.defense.gov/home/features/2010/0410_cybersec/>
Download