SlideShare a Scribd company logo
1 of 85
Download to read offline
Covert Communication in a Dark
         P2P Network
    A major new version of Freenet
         Ian Clarke and Oskar Sandberg

              The Freenet Project




                                         Ian Clarke & Oskar Sandberg - 2005 – p.1/24
Introduction

  •   We have long been interested in decentralised
      “Peer to Peer” networks. Especially Freenet.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.2/24
Introduction

  •   We have long been interested in decentralised
      “Peer to Peer” networks. Especially Freenet.
  •   But when individual users come under attack,
      decentralisation is not enough.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.2/24
Introduction

  •   We have long been interested in decentralised
      “Peer to Peer” networks. Especially Freenet.
  •   But when individual users come under attack,
      decentralisation is not enough.
  •   Future networks may need to limit connections to
      trusted friends.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.2/24
Introduction

  •   We have long been interested in decentralised
      “Peer to Peer” networks. Especially Freenet.
  •   But when individual users come under attack,
      decentralisation is not enough.
  •   Future networks may need to limit connections to
      trusted friends.
  •   The next version of Freenet will be based on this
      philosophy, a so called dark network.




                                        Ian Clarke & Oskar Sandberg - 2005 – p.2/24
Overview of “Peer to Peer” net-
works

  •   Information is spread across many inter-
      connected computers




                                        Ian Clarke & Oskar Sandberg - 2005 – p.3/24
Overview of “Peer to Peer” net-
works

  •   Information is spread across many inter-
      connected computers
  •   Users want to find information




                                        Ian Clarke & Oskar Sandberg - 2005 – p.3/24
Overview of “Peer to Peer” net-
works

  •   Information is spread across many inter-
      connected computers
  •   Users want to find information
  •   Some are centralised (eg. Napster), some are
      semi- centralised (eg. Kazaa), others are
      distributed (eg. Freenet)




                                       Ian Clarke & Oskar Sandberg - 2005 – p.3/24
Light P2P Networks

  •   Examples: Gnutella, Freenet, Distributed Hash
      Tables




                                       Ian Clarke & Oskar Sandberg - 2005 – p.4/24
Light P2P Networks

  •   Examples: Gnutella, Freenet, Distributed Hash
      Tables
  •   Advantage: Globally scalable with the right
      routing algorithm




                                       Ian Clarke & Oskar Sandberg - 2005 – p.4/24
Light P2P Networks

  •   Examples: Gnutella, Freenet, Distributed Hash
      Tables
  •   Advantage: Globally scalable with the right
      routing algorithm
  •   Disadvantage: Vulnerable to “harvesting”, ie.
      people you don’t know can easily discover
      whether you are part of the network




                                       Ian Clarke & Oskar Sandberg - 2005 – p.4/24
Dark or “Friend to Friend” P2P
Networks

  •   Peers only communicate directly with “trusted”
      peers




                                       Ian Clarke & Oskar Sandberg - 2005 – p.5/24
Dark or “Friend to Friend” P2P
Networks

  •   Peers only communicate directly with “trusted”
      peers
  •   Examples: Waste




                                       Ian Clarke & Oskar Sandberg - 2005 – p.5/24
Dark or “Friend to Friend” P2P
Networks

  •   Peers only communicate directly with “trusted”
      peers
  •   Examples: Waste
  •   Advantage: Only your trusted friends know you
      are part of the network




                                       Ian Clarke & Oskar Sandberg - 2005 – p.5/24
Dark or “Friend to Friend” P2P
Networks

  •   Peers only communicate directly with “trusted”
      peers
  •   Examples: Waste
  •   Advantage: Only your trusted friends know you
      are part of the network
  •   Disadvantage: Networks are disconnected and
      small, they typically don’t scale well




                                       Ian Clarke & Oskar Sandberg - 2005 – p.5/24
The Small World Phenomenon




  •   In "Small world" networks short paths exist
      between any two peers




                                        Ian Clarke & Oskar Sandberg - 2005 – p.6/24
The Small World Phenomenon




  •   In "Small world" networks short paths exist
      between any two peers
  •   People tend to form this type of network (as
      shown by Milgram experiment)

                                        Ian Clarke & Oskar Sandberg - 2005 – p.6/24
The Small World Phenomenon




  •   In "Small world" networks short paths exist
      between any two peers
  •   People tend to form this type of network (as
      shown by Milgram experiment)
  •   Short paths may exist but they may not be easy to
      find                               Ian Clarke & Oskar Sandberg - 2005 – p.6/24
Navigable Small World Net-
works

 •   Concept of similarity or “closeness” between
     peers




                                      Ian Clarke & Oskar Sandberg - 2005 – p.7/24
Navigable Small World Net-
works

 •   Concept of similarity or “closeness” between
     peers
 •   Similar peers are more likely to be connected
     than dissimilar peers




                                       Ian Clarke & Oskar Sandberg - 2005 – p.7/24
Navigable Small World Net-
works

 •   Concept of similarity or “closeness” between
     peers
 •   Similar peers are more likely to be connected
     than dissimilar peers
 •   You can get from any one peer to any other
     simply by routing to the closest peer at each step




                                        Ian Clarke & Oskar Sandberg - 2005 – p.7/24
Navigable Small World Net-
works

 •   Concept of similarity or “closeness” between
     peers
 •   Similar peers are more likely to be connected
     than dissimilar peers
 •   You can get from any one peer to any other
     simply by routing to the closest peer at each step
 •   This is called “Greedy Routing”




                                        Ian Clarke & Oskar Sandberg - 2005 – p.7/24
Navigable Small World Net-
works

 •   Concept of similarity or “closeness” between
     peers
 •   Similar peers are more likely to be connected
     than dissimilar peers
 •   You can get from any one peer to any other
     simply by routing to the closest peer at each step
 •   This is called “Greedy Routing”
 •   Freenet and “Distributed Hash Tables” rely on
     this principal to find data in a scalable
     decentralised manner

                                        Ian Clarke & Oskar Sandberg - 2005 – p.7/24
Application

How can we apply small world theory to routing in a
Dark peer to peer network?




                                     Ian Clarke & Oskar Sandberg - 2005 – p.8/24
Application

How can we apply small world theory to routing in a
Dark peer to peer network?

  •   Just like on the Internet, we need a way to route
      through the network.




                                         Ian Clarke & Oskar Sandberg - 2005 – p.8/24
Application

How can we apply small world theory to routing in a
Dark peer to peer network?

  •   Just like on the Internet, we need a way to route
      through the network.
  •   If people can route in a social network, then it
      should be possible for computers.




                                         Ian Clarke & Oskar Sandberg - 2005 – p.8/24
Application

How can we apply small world theory to routing in a
Dark peer to peer network?

  •   Just like on the Internet, we need a way to route
      through the network.
  •   If people can route in a social network, then it
      should be possible for computers.
  •   Jon Kleinberg explained in 2000 how small world
      networks can be navigable.



                                       Ian Clarke & Oskar Sandberg - 2005 – p.8/24
Kleinberg’s Result

  •   The possibility of routing efficiently depends on
      the proportion of connections that have different
      lengths with respect to the “position” of the
      nodes.




                                         Ian Clarke & Oskar Sandberg - 2005 – p.9/24
Kleinberg’s Result

  •   The possibility of routing efficiently depends on
      the proportion of connections that have different
      lengths with respect to the “position” of the
      nodes.
  •   The proportion of connections with a certain
      length should be inverse to the length.




                                         Ian Clarke & Oskar Sandberg - 2005 – p.9/24
Kleinberg’s Result

  •   The possibility of routing efficiently depends on
      the proportion of connections that have different
      lengths with respect to the “position” of the
      nodes.
  •   The proportion of connections with a certain
      length should be inverse to the length.
  •   In this case a simple greedy routing algorithm
      performs in O(log n) steps.
                         2




                                         Ian Clarke & Oskar Sandberg - 2005 – p.9/24
Kleinberg’s Result

  •   The possibility of routing efficiently depends on
      the proportion of connections that have different
      lengths with respect to the “position” of the
      nodes.
  •   The proportion of connections with a certain
      length should be inverse to the length.
  •   In this case a simple greedy routing algorithm
      performs in O(log n) steps.
                         2

  •   But in a social network, how do we see if one
      person is closer to the destination than another?

                                         Ian Clarke & Oskar Sandberg - 2005 – p.9/24
Application, cont.

     Is Alice closer to Harry than Bob?




                               Ian Clarke & Oskar Sandberg - 2005 – p.10/24
Application, cont.

        Is Alice closer to Harry than Bob?

  •   In real life, people presumably use a large number
      of factors to decide this. Where do they live?
      What are their jobs? What are their interests?




                                        Ian Clarke & Oskar Sandberg - 2005 – p.10/24
Application, cont.

        Is Alice closer to Harry than Bob?

  •   In real life, people presumably use a large number
      of factors to decide this. Where do they live?
      What are their jobs? What are their interests?
  •   One cannot, in practice, expect a computer to
      route based on such things.




                                        Ian Clarke & Oskar Sandberg - 2005 – p.10/24
Application, cont.

        Is Alice closer to Harry than Bob?

  •   In real life, people presumably use a large number
      of factors to decide this. Where do they live?
      What are their jobs? What are their interests?
  •   One cannot, in practice, expect a computer to
      route based on such things.
  •   Instead, we let the network tell us!



                                        Ian Clarke & Oskar Sandberg - 2005 – p.10/24
Application, cont.

  •   Kleinberg’s model suggests: there should be few
      long connections, and many short ones.




                                      Ian Clarke & Oskar Sandberg - 2005 – p.11/24
Application, cont.

  •   Kleinberg’s model suggests: there should be few
      long connections, and many short ones.
  •   We can assign numerical identities placing nodes
      in a grid, and do it in such a way that this is
      fulfilled.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.11/24
Application, cont.

  •   Kleinberg’s model suggests: there should be few
      long connections, and many short ones.
  •   We can assign numerical identities placing nodes
      in a grid, and do it in such a way that this is
      fulfilled.
  •   In other words, we “reverse engineer” the nodes
      positions based on the connections in the
      network.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.11/24
Application, cont.

  •   Kleinberg’s model suggests: there should be few
      long connections, and many short ones.
  •   We can assign numerical identities placing nodes
      in a grid, and do it in such a way that this is
      fulfilled.
  •   In other words, we “reverse engineer” the nodes
      positions based on the connections in the
      network.
  •   Then greedy route with respect to these
      numerical identities.


                                       Ian Clarke & Oskar Sandberg - 2005 – p.11/24
The Method

 •   When nodes join the network, they choose a
     position randomly.




                                     Ian Clarke & Oskar Sandberg - 2005 – p.12/24
The Method

 •   When nodes join the network, they choose a
     position randomly.
 •   They then switch positions with other nodes, so
     as to minimize the product of the edge distances.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.12/24
Simulations

We have simulated networks in three different modes:




                                     Ian Clarke & Oskar Sandberg - 2005 – p.13/24
Simulations

We have simulated networks in three different modes:
  •   Random walk search: “random”.




                                      Ian Clarke & Oskar Sandberg - 2005 – p.13/24
Simulations

We have simulated networks in three different modes:
  •   Random walk search: “random”.
  •   Greedy routing in Kleinberg’s model with
      identities as when it was constructed: “good”.




                                        Ian Clarke & Oskar Sandberg - 2005 – p.13/24
Simulations

We have simulated networks in three different modes:
  •   Random walk search: “random”.
  •   Greedy routing in Kleinberg’s model with
      identities as when it was constructed: “good”.
  •   Greedy routing in Kleinberg’s model with
      identities assigned according to our algorithm
      (2000 iterations per node): “restored”.




                                        Ian Clarke & Oskar Sandberg - 2005 – p.13/24
Simulations, cont.

The proportion of queries that succeeded within
(log2 n)2 steps, where n is the network size:




                                     Ian Clarke & Oskar Sandberg - 2005 – p.14/24
Simulations, cont.

The proportion of queries that succeeded within
(log2 n)2 steps, where n is the network size:

                1
                                            random
               0.9                            good
                                           restored
               0.8
               0.7
               0.6
        Succ




               0.5
               0.4
               0.3
               0.2
               0.1
                0
                     1000     10000             100000
                            Network Size
                                                  Ian Clarke & Oskar Sandberg - 2005 – p.14/24
Simulations, cont.

The average length of the successful routes:




                                      Ian Clarke & Oskar Sandberg - 2005 – p.15/24
Simulations, cont.

The average length of the successful routes:

                180
                                             random
                160                            good
                                            restored
                140

                120

                100
        Steps




                 80

                 60

                 40

                 20

                  0
                      1000     10000             100000
                             Network Size


                                                   Ian Clarke & Oskar Sandberg - 2005 – p.15/24
Results

  •   Simulated networks are only so interesting, what
      about the real world?




                                       Ian Clarke & Oskar Sandberg - 2005 – p.16/24
Results

  •   Simulated networks are only so interesting, what
      about the real world?
  •   We borrowed some data from orkut.com. 2196
      people were spidered, starting with Ian.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.16/24
Results, cont.

  •   The set was spidered so as to be comparatively
      dense (average 36.7 connections per person).




                                       Ian Clarke & Oskar Sandberg - 2005 – p.17/24
Results, cont.

  •   The set was spidered so as to be comparatively
      dense (average 36.7 connections per person).
  •   It contains mostly American techies and
      programmers. Some are probably in this room.
      (No Brazilians...)




                                       Ian Clarke & Oskar Sandberg - 2005 – p.17/24
Results, cont.

  •   The set was spidered so as to be comparatively
      dense (average 36.7 connections per person).
  •   It contains mostly American techies and
      programmers. Some are probably in this room.
      (No Brazilians...)
                           1200
                                                           Frequency

                           1000


  •   The degree distri-    800



      bution is approxi-    600



      mately Power-Law:     400


                            200


                              0
                                  0   50   100    150      200      250      300
                                                 Degree

                                                   Ian Clarke & Oskar Sandberg - 2005 – p.17/24
Results, cont.

Searching the Orkut dataset, for a maximum of
log2 (n)2 steps.


                     Success Rate Mean Steps
    Random Search
    Our Algorithm




                                    Ian Clarke & Oskar Sandberg - 2005 – p.18/24
Results, cont.

Searching the Orkut dataset, for a maximum of
log2 (n)2 steps.


                  Success Rate Mean Steps
    Random Search    0.72       43.85
    Our Algorithm




                                    Ian Clarke & Oskar Sandberg - 2005 – p.18/24
Results, cont.

Searching the Orkut dataset, for a maximum of
log2 (n)2 steps.


                  Success Rate Mean Steps
    Random Search    0.72       43.85
    Our Algorithm    0.97       7.714




                                    Ian Clarke & Oskar Sandberg - 2005 – p.18/24
Results

Clipping degree at 40 connections. (24.2 connections
per person.)


                      Success Rate Mean Steps
    Random Search
    Our Algorithm




                                     Ian Clarke & Oskar Sandberg - 2005 – p.19/24
Results

Clipping degree at 40 connections. (24.2 connections
per person.)


                  Success Rate Mean Steps
    Random Search    0.51       50.93
    Our Algorithm




                                     Ian Clarke & Oskar Sandberg - 2005 – p.19/24
Results

Clipping degree at 40 connections. (24.2 connections
per person.)


                  Success Rate Mean Steps
    Random Search    0.51       50.93
    Our Algorithm    0.98       10.90




                                     Ian Clarke & Oskar Sandberg - 2005 – p.19/24
Results

Clipping degree at 40 connections. (24.2 connections
per person.)


                  Success Rate Mean Steps
    Random Search    0.51       50.93
    Our Algorithm    0.98       10.90

Our algorithm takes advantage of there being people
who have many connections, but it does not depend
on them.

                                     Ian Clarke & Oskar Sandberg - 2005 – p.19/24
Practical Concerns

  •   So the theory works, but how does one
      implement such a network in practice?




                                      Ian Clarke & Oskar Sandberg - 2005 – p.20/24
Practical Concerns

  •   So the theory works, but how does one
      implement such a network in practice?
  •   Key concerns:




                                      Ian Clarke & Oskar Sandberg - 2005 – p.20/24
Practical Concerns

  •   So the theory works, but how does one
      implement such a network in practice?
  •   Key concerns:
       • Preventing malicious behaviour




                                      Ian Clarke & Oskar Sandberg - 2005 – p.20/24
Practical Concerns

  •   So the theory works, but how does one
      implement such a network in practice?
  •   Key concerns:
       • Preventing malicious behaviour

       • Ensuring ease of use




                                      Ian Clarke & Oskar Sandberg - 2005 – p.20/24
Practical Concerns

  •   So the theory works, but how does one
      implement such a network in practice?
  •   Key concerns:
       • Preventing malicious behaviour

       • Ensuring ease of use

       • Storing data




                                      Ian Clarke & Oskar Sandberg - 2005 – p.20/24
Preventing Malicious Behaviour

Threats:
  •   Selection of identity to attract certain data




                                          Ian Clarke & Oskar Sandberg - 2005 – p.21/24
Preventing Malicious Behaviour

Threats:
  •   Selection of identity to attract certain data
  •   Manipulation of other node’s identities




                                          Ian Clarke & Oskar Sandberg - 2005 – p.21/24
Ensuring ease of use

  •   Peers will need to be “always on”




                                          Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Ensuring ease of use

  •   Peers will need to be “always on”
  •   Peer introduction




                                          Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Ensuring ease of use

  •   Peers will need to be “always on”
  •   Peer introduction
       • Email




                                          Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Ensuring ease of use

  •   Peers will need to be “always on”
  •   Peer introduction
       • Email
       • Phone




                                          Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Ensuring ease of use

  •   Peers will need to be “always on”
  •   Peer introduction
       • Email
       • Phone
       • Trusted third party




                                          Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Ensuring ease of use

  •   Peers will need to be “always on”
  •   Peer introduction
       • Email
       • Phone
       • Trusted third party

  •   What about NATs and firewalls




                                          Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Ensuring ease of use

  •   Peers will need to be “always on”
  •   Peer introduction
       • Email
       • Phone
       • Trusted third party

  •   What about NATs and firewalls
       • Could use UDP hole- punching (as used by
         Dijjer, Skype)



                                     Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Ensuring ease of use

  •   Peers will need to be “always on”
  •   Peer introduction
       • Email
       • Phone
       • Trusted third party

  •   What about NATs and firewalls
       • Could use UDP hole- punching (as used by
         Dijjer, Skype)
       • Would require third- party for negotiation



                                      Ian Clarke & Oskar Sandberg - 2005 – p.22/24
Conclusion

We believe very strongly that building a navigable,
scalable Darknet is possible. And we intend to do it!




                                       Ian Clarke & Oskar Sandberg - 2005 – p.23/24
Conclusion

We believe very strongly that building a navigable,
scalable Darknet is possible. And we intend to do it!
  •   There is still much work to do on the theory.




                                        Ian Clarke & Oskar Sandberg - 2005 – p.23/24
Conclusion

We believe very strongly that building a navigable,
scalable Darknet is possible. And we intend to do it!
  •   There is still much work to do on the theory.
       • Can other models work better?




                                        Ian Clarke & Oskar Sandberg - 2005 – p.23/24
Conclusion

We believe very strongly that building a navigable,
scalable Darknet is possible. And we intend to do it!
  •   There is still much work to do on the theory.
       • Can other models work better?
       • Can we find better selection functions for
         switching?




                                        Ian Clarke & Oskar Sandberg - 2005 – p.23/24
Conclusion

We believe very strongly that building a navigable,
scalable Darknet is possible. And we intend to do it!
  •   There is still much work to do on the theory.
       • Can other models work better?
       • Can we find better selection functions for
         switching?
       • It needs to be tested on more data.




                                        Ian Clarke & Oskar Sandberg - 2005 – p.23/24
Conclusion, cont.

  •   We have learned the hard way that practice is
      more difficult than theory.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.24/24
Conclusion, cont.

  •   We have learned the hard way that practice is
      more difficult than theory.
       • Security issues are very important.




                                       Ian Clarke & Oskar Sandberg - 2005 – p.24/24
Conclusion, cont.

  •   We have learned the hard way that practice is
      more difficult than theory.
       • Security issues are very important.
       • How the network is deployed will affect how
         well it works.




                                      Ian Clarke & Oskar Sandberg - 2005 – p.24/24
Conclusion, cont.

  •   We have learned the hard way that practice is
      more difficult than theory.
       • Security issues are very important.
       • How the network is deployed will affect how
         well it works.

People who are interested can join the discussion at
http://freenetproject.org/.



                                      Ian Clarke & Oskar Sandberg - 2005 – p.24/24

More Related Content

Viewers also liked

Opinion mining and summarization
Opinion mining and summarizationOpinion mining and summarization
Opinion mining and summarizationGeorge Ang
 
Wrapper induction construct wrappers automatically to extract information f...
Wrapper induction   construct wrappers automatically to extract information f...Wrapper induction   construct wrappers automatically to extract information f...
Wrapper induction construct wrappers automatically to extract information f...George Ang
 
Do not crawl in the dust 
different ur ls similar text
Do not crawl in the dust 
different ur ls similar textDo not crawl in the dust 
different ur ls similar text
Do not crawl in the dust 
different ur ls similar textGeorge Ang
 
Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015
Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015
Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015TechMeetups
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Digital Communication ppt
Digital Communication pptDigital Communication ppt
Digital Communication pptBZU lahore
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Viewers also liked (9)

Opinion mining and summarization
Opinion mining and summarizationOpinion mining and summarization
Opinion mining and summarization
 
Wrapper induction construct wrappers automatically to extract information f...
Wrapper induction   construct wrappers automatically to extract information f...Wrapper induction   construct wrappers automatically to extract information f...
Wrapper induction construct wrappers automatically to extract information f...
 
Do not crawl in the dust 
different ur ls similar text
Do not crawl in the dust 
different ur ls similar textDo not crawl in the dust 
different ur ls similar text
Do not crawl in the dust 
different ur ls similar text
 
Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015
Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015
Freenet digital hiring at TechStartupJobs Fair Berlin Autumn 2015
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Digital Communication ppt
Digital Communication pptDigital Communication ppt
Digital Communication ppt
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

More from George Ang

腾讯大讲堂02 休闲游戏发展的文化趋势
腾讯大讲堂02 休闲游戏发展的文化趋势腾讯大讲堂02 休闲游戏发展的文化趋势
腾讯大讲堂02 休闲游戏发展的文化趋势George Ang
 
腾讯大讲堂03 qq邮箱成长历程
腾讯大讲堂03 qq邮箱成长历程腾讯大讲堂03 qq邮箱成长历程
腾讯大讲堂03 qq邮箱成长历程George Ang
 
腾讯大讲堂04 im qq
腾讯大讲堂04 im qq腾讯大讲堂04 im qq
腾讯大讲堂04 im qqGeorge Ang
 
腾讯大讲堂05 面向对象应对之道
腾讯大讲堂05 面向对象应对之道腾讯大讲堂05 面向对象应对之道
腾讯大讲堂05 面向对象应对之道George Ang
 
腾讯大讲堂06 qq邮箱性能优化
腾讯大讲堂06 qq邮箱性能优化腾讯大讲堂06 qq邮箱性能优化
腾讯大讲堂06 qq邮箱性能优化George Ang
 
腾讯大讲堂07 qq空间
腾讯大讲堂07 qq空间腾讯大讲堂07 qq空间
腾讯大讲堂07 qq空间George Ang
 
腾讯大讲堂08 可扩展web架构探讨
腾讯大讲堂08 可扩展web架构探讨腾讯大讲堂08 可扩展web架构探讨
腾讯大讲堂08 可扩展web架构探讨George Ang
 
腾讯大讲堂09 如何建设高性能网站
腾讯大讲堂09 如何建设高性能网站腾讯大讲堂09 如何建设高性能网站
腾讯大讲堂09 如何建设高性能网站George Ang
 
腾讯大讲堂01 移动qq产品发展历程
腾讯大讲堂01 移动qq产品发展历程腾讯大讲堂01 移动qq产品发展历程
腾讯大讲堂01 移动qq产品发展历程George Ang
 
腾讯大讲堂10 customer engagement
腾讯大讲堂10 customer engagement腾讯大讲堂10 customer engagement
腾讯大讲堂10 customer engagementGeorge Ang
 
腾讯大讲堂11 拍拍ce工作经验分享
腾讯大讲堂11 拍拍ce工作经验分享腾讯大讲堂11 拍拍ce工作经验分享
腾讯大讲堂11 拍拍ce工作经验分享George Ang
 
腾讯大讲堂14 qq直播(qq live) 介绍
腾讯大讲堂14 qq直播(qq live) 介绍腾讯大讲堂14 qq直播(qq live) 介绍
腾讯大讲堂14 qq直播(qq live) 介绍George Ang
 
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍George Ang
 
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍George Ang
 
腾讯大讲堂16 产品经理工作心得分享
腾讯大讲堂16 产品经理工作心得分享腾讯大讲堂16 产品经理工作心得分享
腾讯大讲堂16 产品经理工作心得分享George Ang
 
腾讯大讲堂17 性能优化不是仅局限于后台(qzone)
腾讯大讲堂17 性能优化不是仅局限于后台(qzone)腾讯大讲堂17 性能优化不是仅局限于后台(qzone)
腾讯大讲堂17 性能优化不是仅局限于后台(qzone)George Ang
 
腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享
腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享
腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享George Ang
 
腾讯大讲堂19 系统优化的方向
腾讯大讲堂19 系统优化的方向腾讯大讲堂19 系统优化的方向
腾讯大讲堂19 系统优化的方向George Ang
 
腾讯大讲堂13 soso访问速度优化
腾讯大讲堂13 soso访问速度优化腾讯大讲堂13 soso访问速度优化
腾讯大讲堂13 soso访问速度优化George Ang
 
腾讯大讲堂21 搜索引擎优化(seo)简介
腾讯大讲堂21 搜索引擎优化(seo)简介腾讯大讲堂21 搜索引擎优化(seo)简介
腾讯大讲堂21 搜索引擎优化(seo)简介George Ang
 

More from George Ang (20)

腾讯大讲堂02 休闲游戏发展的文化趋势
腾讯大讲堂02 休闲游戏发展的文化趋势腾讯大讲堂02 休闲游戏发展的文化趋势
腾讯大讲堂02 休闲游戏发展的文化趋势
 
腾讯大讲堂03 qq邮箱成长历程
腾讯大讲堂03 qq邮箱成长历程腾讯大讲堂03 qq邮箱成长历程
腾讯大讲堂03 qq邮箱成长历程
 
腾讯大讲堂04 im qq
腾讯大讲堂04 im qq腾讯大讲堂04 im qq
腾讯大讲堂04 im qq
 
腾讯大讲堂05 面向对象应对之道
腾讯大讲堂05 面向对象应对之道腾讯大讲堂05 面向对象应对之道
腾讯大讲堂05 面向对象应对之道
 
腾讯大讲堂06 qq邮箱性能优化
腾讯大讲堂06 qq邮箱性能优化腾讯大讲堂06 qq邮箱性能优化
腾讯大讲堂06 qq邮箱性能优化
 
腾讯大讲堂07 qq空间
腾讯大讲堂07 qq空间腾讯大讲堂07 qq空间
腾讯大讲堂07 qq空间
 
腾讯大讲堂08 可扩展web架构探讨
腾讯大讲堂08 可扩展web架构探讨腾讯大讲堂08 可扩展web架构探讨
腾讯大讲堂08 可扩展web架构探讨
 
腾讯大讲堂09 如何建设高性能网站
腾讯大讲堂09 如何建设高性能网站腾讯大讲堂09 如何建设高性能网站
腾讯大讲堂09 如何建设高性能网站
 
腾讯大讲堂01 移动qq产品发展历程
腾讯大讲堂01 移动qq产品发展历程腾讯大讲堂01 移动qq产品发展历程
腾讯大讲堂01 移动qq产品发展历程
 
腾讯大讲堂10 customer engagement
腾讯大讲堂10 customer engagement腾讯大讲堂10 customer engagement
腾讯大讲堂10 customer engagement
 
腾讯大讲堂11 拍拍ce工作经验分享
腾讯大讲堂11 拍拍ce工作经验分享腾讯大讲堂11 拍拍ce工作经验分享
腾讯大讲堂11 拍拍ce工作经验分享
 
腾讯大讲堂14 qq直播(qq live) 介绍
腾讯大讲堂14 qq直播(qq live) 介绍腾讯大讲堂14 qq直播(qq live) 介绍
腾讯大讲堂14 qq直播(qq live) 介绍
 
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
 
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
腾讯大讲堂15 市场研究及数据分析理念及方法概要介绍
 
腾讯大讲堂16 产品经理工作心得分享
腾讯大讲堂16 产品经理工作心得分享腾讯大讲堂16 产品经理工作心得分享
腾讯大讲堂16 产品经理工作心得分享
 
腾讯大讲堂17 性能优化不是仅局限于后台(qzone)
腾讯大讲堂17 性能优化不是仅局限于后台(qzone)腾讯大讲堂17 性能优化不是仅局限于后台(qzone)
腾讯大讲堂17 性能优化不是仅局限于后台(qzone)
 
腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享
腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享
腾讯大讲堂18 让我们戴上有色眼镜--qzone前台架构的优化分享
 
腾讯大讲堂19 系统优化的方向
腾讯大讲堂19 系统优化的方向腾讯大讲堂19 系统优化的方向
腾讯大讲堂19 系统优化的方向
 
腾讯大讲堂13 soso访问速度优化
腾讯大讲堂13 soso访问速度优化腾讯大讲堂13 soso访问速度优化
腾讯大讲堂13 soso访问速度优化
 
腾讯大讲堂21 搜索引擎优化(seo)简介
腾讯大讲堂21 搜索引擎优化(seo)简介腾讯大讲堂21 搜索引擎优化(seo)简介
腾讯大讲堂21 搜索引擎优化(seo)简介
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

2009 Covert Communication In A Dark P2 P Net Work A Major New Version Of Freenet

  • 1. Covert Communication in a Dark P2P Network A major new version of Freenet Ian Clarke and Oskar Sandberg The Freenet Project Ian Clarke & Oskar Sandberg - 2005 – p.1/24
  • 2. Introduction • We have long been interested in decentralised “Peer to Peer” networks. Especially Freenet. Ian Clarke & Oskar Sandberg - 2005 – p.2/24
  • 3. Introduction • We have long been interested in decentralised “Peer to Peer” networks. Especially Freenet. • But when individual users come under attack, decentralisation is not enough. Ian Clarke & Oskar Sandberg - 2005 – p.2/24
  • 4. Introduction • We have long been interested in decentralised “Peer to Peer” networks. Especially Freenet. • But when individual users come under attack, decentralisation is not enough. • Future networks may need to limit connections to trusted friends. Ian Clarke & Oskar Sandberg - 2005 – p.2/24
  • 5. Introduction • We have long been interested in decentralised “Peer to Peer” networks. Especially Freenet. • But when individual users come under attack, decentralisation is not enough. • Future networks may need to limit connections to trusted friends. • The next version of Freenet will be based on this philosophy, a so called dark network. Ian Clarke & Oskar Sandberg - 2005 – p.2/24
  • 6. Overview of “Peer to Peer” net- works • Information is spread across many inter- connected computers Ian Clarke & Oskar Sandberg - 2005 – p.3/24
  • 7. Overview of “Peer to Peer” net- works • Information is spread across many inter- connected computers • Users want to find information Ian Clarke & Oskar Sandberg - 2005 – p.3/24
  • 8. Overview of “Peer to Peer” net- works • Information is spread across many inter- connected computers • Users want to find information • Some are centralised (eg. Napster), some are semi- centralised (eg. Kazaa), others are distributed (eg. Freenet) Ian Clarke & Oskar Sandberg - 2005 – p.3/24
  • 9. Light P2P Networks • Examples: Gnutella, Freenet, Distributed Hash Tables Ian Clarke & Oskar Sandberg - 2005 – p.4/24
  • 10. Light P2P Networks • Examples: Gnutella, Freenet, Distributed Hash Tables • Advantage: Globally scalable with the right routing algorithm Ian Clarke & Oskar Sandberg - 2005 – p.4/24
  • 11. Light P2P Networks • Examples: Gnutella, Freenet, Distributed Hash Tables • Advantage: Globally scalable with the right routing algorithm • Disadvantage: Vulnerable to “harvesting”, ie. people you don’t know can easily discover whether you are part of the network Ian Clarke & Oskar Sandberg - 2005 – p.4/24
  • 12. Dark or “Friend to Friend” P2P Networks • Peers only communicate directly with “trusted” peers Ian Clarke & Oskar Sandberg - 2005 – p.5/24
  • 13. Dark or “Friend to Friend” P2P Networks • Peers only communicate directly with “trusted” peers • Examples: Waste Ian Clarke & Oskar Sandberg - 2005 – p.5/24
  • 14. Dark or “Friend to Friend” P2P Networks • Peers only communicate directly with “trusted” peers • Examples: Waste • Advantage: Only your trusted friends know you are part of the network Ian Clarke & Oskar Sandberg - 2005 – p.5/24
  • 15. Dark or “Friend to Friend” P2P Networks • Peers only communicate directly with “trusted” peers • Examples: Waste • Advantage: Only your trusted friends know you are part of the network • Disadvantage: Networks are disconnected and small, they typically don’t scale well Ian Clarke & Oskar Sandberg - 2005 – p.5/24
  • 16. The Small World Phenomenon • In "Small world" networks short paths exist between any two peers Ian Clarke & Oskar Sandberg - 2005 – p.6/24
  • 17. The Small World Phenomenon • In "Small world" networks short paths exist between any two peers • People tend to form this type of network (as shown by Milgram experiment) Ian Clarke & Oskar Sandberg - 2005 – p.6/24
  • 18. The Small World Phenomenon • In "Small world" networks short paths exist between any two peers • People tend to form this type of network (as shown by Milgram experiment) • Short paths may exist but they may not be easy to find Ian Clarke & Oskar Sandberg - 2005 – p.6/24
  • 19. Navigable Small World Net- works • Concept of similarity or “closeness” between peers Ian Clarke & Oskar Sandberg - 2005 – p.7/24
  • 20. Navigable Small World Net- works • Concept of similarity or “closeness” between peers • Similar peers are more likely to be connected than dissimilar peers Ian Clarke & Oskar Sandberg - 2005 – p.7/24
  • 21. Navigable Small World Net- works • Concept of similarity or “closeness” between peers • Similar peers are more likely to be connected than dissimilar peers • You can get from any one peer to any other simply by routing to the closest peer at each step Ian Clarke & Oskar Sandberg - 2005 – p.7/24
  • 22. Navigable Small World Net- works • Concept of similarity or “closeness” between peers • Similar peers are more likely to be connected than dissimilar peers • You can get from any one peer to any other simply by routing to the closest peer at each step • This is called “Greedy Routing” Ian Clarke & Oskar Sandberg - 2005 – p.7/24
  • 23. Navigable Small World Net- works • Concept of similarity or “closeness” between peers • Similar peers are more likely to be connected than dissimilar peers • You can get from any one peer to any other simply by routing to the closest peer at each step • This is called “Greedy Routing” • Freenet and “Distributed Hash Tables” rely on this principal to find data in a scalable decentralised manner Ian Clarke & Oskar Sandberg - 2005 – p.7/24
  • 24. Application How can we apply small world theory to routing in a Dark peer to peer network? Ian Clarke & Oskar Sandberg - 2005 – p.8/24
  • 25. Application How can we apply small world theory to routing in a Dark peer to peer network? • Just like on the Internet, we need a way to route through the network. Ian Clarke & Oskar Sandberg - 2005 – p.8/24
  • 26. Application How can we apply small world theory to routing in a Dark peer to peer network? • Just like on the Internet, we need a way to route through the network. • If people can route in a social network, then it should be possible for computers. Ian Clarke & Oskar Sandberg - 2005 – p.8/24
  • 27. Application How can we apply small world theory to routing in a Dark peer to peer network? • Just like on the Internet, we need a way to route through the network. • If people can route in a social network, then it should be possible for computers. • Jon Kleinberg explained in 2000 how small world networks can be navigable. Ian Clarke & Oskar Sandberg - 2005 – p.8/24
  • 28. Kleinberg’s Result • The possibility of routing efficiently depends on the proportion of connections that have different lengths with respect to the “position” of the nodes. Ian Clarke & Oskar Sandberg - 2005 – p.9/24
  • 29. Kleinberg’s Result • The possibility of routing efficiently depends on the proportion of connections that have different lengths with respect to the “position” of the nodes. • The proportion of connections with a certain length should be inverse to the length. Ian Clarke & Oskar Sandberg - 2005 – p.9/24
  • 30. Kleinberg’s Result • The possibility of routing efficiently depends on the proportion of connections that have different lengths with respect to the “position” of the nodes. • The proportion of connections with a certain length should be inverse to the length. • In this case a simple greedy routing algorithm performs in O(log n) steps. 2 Ian Clarke & Oskar Sandberg - 2005 – p.9/24
  • 31. Kleinberg’s Result • The possibility of routing efficiently depends on the proportion of connections that have different lengths with respect to the “position” of the nodes. • The proportion of connections with a certain length should be inverse to the length. • In this case a simple greedy routing algorithm performs in O(log n) steps. 2 • But in a social network, how do we see if one person is closer to the destination than another? Ian Clarke & Oskar Sandberg - 2005 – p.9/24
  • 32. Application, cont. Is Alice closer to Harry than Bob? Ian Clarke & Oskar Sandberg - 2005 – p.10/24
  • 33. Application, cont. Is Alice closer to Harry than Bob? • In real life, people presumably use a large number of factors to decide this. Where do they live? What are their jobs? What are their interests? Ian Clarke & Oskar Sandberg - 2005 – p.10/24
  • 34. Application, cont. Is Alice closer to Harry than Bob? • In real life, people presumably use a large number of factors to decide this. Where do they live? What are their jobs? What are their interests? • One cannot, in practice, expect a computer to route based on such things. Ian Clarke & Oskar Sandberg - 2005 – p.10/24
  • 35. Application, cont. Is Alice closer to Harry than Bob? • In real life, people presumably use a large number of factors to decide this. Where do they live? What are their jobs? What are their interests? • One cannot, in practice, expect a computer to route based on such things. • Instead, we let the network tell us! Ian Clarke & Oskar Sandberg - 2005 – p.10/24
  • 36. Application, cont. • Kleinberg’s model suggests: there should be few long connections, and many short ones. Ian Clarke & Oskar Sandberg - 2005 – p.11/24
  • 37. Application, cont. • Kleinberg’s model suggests: there should be few long connections, and many short ones. • We can assign numerical identities placing nodes in a grid, and do it in such a way that this is fulfilled. Ian Clarke & Oskar Sandberg - 2005 – p.11/24
  • 38. Application, cont. • Kleinberg’s model suggests: there should be few long connections, and many short ones. • We can assign numerical identities placing nodes in a grid, and do it in such a way that this is fulfilled. • In other words, we “reverse engineer” the nodes positions based on the connections in the network. Ian Clarke & Oskar Sandberg - 2005 – p.11/24
  • 39. Application, cont. • Kleinberg’s model suggests: there should be few long connections, and many short ones. • We can assign numerical identities placing nodes in a grid, and do it in such a way that this is fulfilled. • In other words, we “reverse engineer” the nodes positions based on the connections in the network. • Then greedy route with respect to these numerical identities. Ian Clarke & Oskar Sandberg - 2005 – p.11/24
  • 40. The Method • When nodes join the network, they choose a position randomly. Ian Clarke & Oskar Sandberg - 2005 – p.12/24
  • 41. The Method • When nodes join the network, they choose a position randomly. • They then switch positions with other nodes, so as to minimize the product of the edge distances. Ian Clarke & Oskar Sandberg - 2005 – p.12/24
  • 42. Simulations We have simulated networks in three different modes: Ian Clarke & Oskar Sandberg - 2005 – p.13/24
  • 43. Simulations We have simulated networks in three different modes: • Random walk search: “random”. Ian Clarke & Oskar Sandberg - 2005 – p.13/24
  • 44. Simulations We have simulated networks in three different modes: • Random walk search: “random”. • Greedy routing in Kleinberg’s model with identities as when it was constructed: “good”. Ian Clarke & Oskar Sandberg - 2005 – p.13/24
  • 45. Simulations We have simulated networks in three different modes: • Random walk search: “random”. • Greedy routing in Kleinberg’s model with identities as when it was constructed: “good”. • Greedy routing in Kleinberg’s model with identities assigned according to our algorithm (2000 iterations per node): “restored”. Ian Clarke & Oskar Sandberg - 2005 – p.13/24
  • 46. Simulations, cont. The proportion of queries that succeeded within (log2 n)2 steps, where n is the network size: Ian Clarke & Oskar Sandberg - 2005 – p.14/24
  • 47. Simulations, cont. The proportion of queries that succeeded within (log2 n)2 steps, where n is the network size: 1 random 0.9 good restored 0.8 0.7 0.6 Succ 0.5 0.4 0.3 0.2 0.1 0 1000 10000 100000 Network Size Ian Clarke & Oskar Sandberg - 2005 – p.14/24
  • 48. Simulations, cont. The average length of the successful routes: Ian Clarke & Oskar Sandberg - 2005 – p.15/24
  • 49. Simulations, cont. The average length of the successful routes: 180 random 160 good restored 140 120 100 Steps 80 60 40 20 0 1000 10000 100000 Network Size Ian Clarke & Oskar Sandberg - 2005 – p.15/24
  • 50. Results • Simulated networks are only so interesting, what about the real world? Ian Clarke & Oskar Sandberg - 2005 – p.16/24
  • 51. Results • Simulated networks are only so interesting, what about the real world? • We borrowed some data from orkut.com. 2196 people were spidered, starting with Ian. Ian Clarke & Oskar Sandberg - 2005 – p.16/24
  • 52. Results, cont. • The set was spidered so as to be comparatively dense (average 36.7 connections per person). Ian Clarke & Oskar Sandberg - 2005 – p.17/24
  • 53. Results, cont. • The set was spidered so as to be comparatively dense (average 36.7 connections per person). • It contains mostly American techies and programmers. Some are probably in this room. (No Brazilians...) Ian Clarke & Oskar Sandberg - 2005 – p.17/24
  • 54. Results, cont. • The set was spidered so as to be comparatively dense (average 36.7 connections per person). • It contains mostly American techies and programmers. Some are probably in this room. (No Brazilians...) 1200 Frequency 1000 • The degree distri- 800 bution is approxi- 600 mately Power-Law: 400 200 0 0 50 100 150 200 250 300 Degree Ian Clarke & Oskar Sandberg - 2005 – p.17/24
  • 55. Results, cont. Searching the Orkut dataset, for a maximum of log2 (n)2 steps. Success Rate Mean Steps Random Search Our Algorithm Ian Clarke & Oskar Sandberg - 2005 – p.18/24
  • 56. Results, cont. Searching the Orkut dataset, for a maximum of log2 (n)2 steps. Success Rate Mean Steps Random Search 0.72 43.85 Our Algorithm Ian Clarke & Oskar Sandberg - 2005 – p.18/24
  • 57. Results, cont. Searching the Orkut dataset, for a maximum of log2 (n)2 steps. Success Rate Mean Steps Random Search 0.72 43.85 Our Algorithm 0.97 7.714 Ian Clarke & Oskar Sandberg - 2005 – p.18/24
  • 58. Results Clipping degree at 40 connections. (24.2 connections per person.) Success Rate Mean Steps Random Search Our Algorithm Ian Clarke & Oskar Sandberg - 2005 – p.19/24
  • 59. Results Clipping degree at 40 connections. (24.2 connections per person.) Success Rate Mean Steps Random Search 0.51 50.93 Our Algorithm Ian Clarke & Oskar Sandberg - 2005 – p.19/24
  • 60. Results Clipping degree at 40 connections. (24.2 connections per person.) Success Rate Mean Steps Random Search 0.51 50.93 Our Algorithm 0.98 10.90 Ian Clarke & Oskar Sandberg - 2005 – p.19/24
  • 61. Results Clipping degree at 40 connections. (24.2 connections per person.) Success Rate Mean Steps Random Search 0.51 50.93 Our Algorithm 0.98 10.90 Our algorithm takes advantage of there being people who have many connections, but it does not depend on them. Ian Clarke & Oskar Sandberg - 2005 – p.19/24
  • 62. Practical Concerns • So the theory works, but how does one implement such a network in practice? Ian Clarke & Oskar Sandberg - 2005 – p.20/24
  • 63. Practical Concerns • So the theory works, but how does one implement such a network in practice? • Key concerns: Ian Clarke & Oskar Sandberg - 2005 – p.20/24
  • 64. Practical Concerns • So the theory works, but how does one implement such a network in practice? • Key concerns: • Preventing malicious behaviour Ian Clarke & Oskar Sandberg - 2005 – p.20/24
  • 65. Practical Concerns • So the theory works, but how does one implement such a network in practice? • Key concerns: • Preventing malicious behaviour • Ensuring ease of use Ian Clarke & Oskar Sandberg - 2005 – p.20/24
  • 66. Practical Concerns • So the theory works, but how does one implement such a network in practice? • Key concerns: • Preventing malicious behaviour • Ensuring ease of use • Storing data Ian Clarke & Oskar Sandberg - 2005 – p.20/24
  • 67. Preventing Malicious Behaviour Threats: • Selection of identity to attract certain data Ian Clarke & Oskar Sandberg - 2005 – p.21/24
  • 68. Preventing Malicious Behaviour Threats: • Selection of identity to attract certain data • Manipulation of other node’s identities Ian Clarke & Oskar Sandberg - 2005 – p.21/24
  • 69. Ensuring ease of use • Peers will need to be “always on” Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 70. Ensuring ease of use • Peers will need to be “always on” • Peer introduction Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 71. Ensuring ease of use • Peers will need to be “always on” • Peer introduction • Email Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 72. Ensuring ease of use • Peers will need to be “always on” • Peer introduction • Email • Phone Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 73. Ensuring ease of use • Peers will need to be “always on” • Peer introduction • Email • Phone • Trusted third party Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 74. Ensuring ease of use • Peers will need to be “always on” • Peer introduction • Email • Phone • Trusted third party • What about NATs and firewalls Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 75. Ensuring ease of use • Peers will need to be “always on” • Peer introduction • Email • Phone • Trusted third party • What about NATs and firewalls • Could use UDP hole- punching (as used by Dijjer, Skype) Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 76. Ensuring ease of use • Peers will need to be “always on” • Peer introduction • Email • Phone • Trusted third party • What about NATs and firewalls • Could use UDP hole- punching (as used by Dijjer, Skype) • Would require third- party for negotiation Ian Clarke & Oskar Sandberg - 2005 – p.22/24
  • 77. Conclusion We believe very strongly that building a navigable, scalable Darknet is possible. And we intend to do it! Ian Clarke & Oskar Sandberg - 2005 – p.23/24
  • 78. Conclusion We believe very strongly that building a navigable, scalable Darknet is possible. And we intend to do it! • There is still much work to do on the theory. Ian Clarke & Oskar Sandberg - 2005 – p.23/24
  • 79. Conclusion We believe very strongly that building a navigable, scalable Darknet is possible. And we intend to do it! • There is still much work to do on the theory. • Can other models work better? Ian Clarke & Oskar Sandberg - 2005 – p.23/24
  • 80. Conclusion We believe very strongly that building a navigable, scalable Darknet is possible. And we intend to do it! • There is still much work to do on the theory. • Can other models work better? • Can we find better selection functions for switching? Ian Clarke & Oskar Sandberg - 2005 – p.23/24
  • 81. Conclusion We believe very strongly that building a navigable, scalable Darknet is possible. And we intend to do it! • There is still much work to do on the theory. • Can other models work better? • Can we find better selection functions for switching? • It needs to be tested on more data. Ian Clarke & Oskar Sandberg - 2005 – p.23/24
  • 82. Conclusion, cont. • We have learned the hard way that practice is more difficult than theory. Ian Clarke & Oskar Sandberg - 2005 – p.24/24
  • 83. Conclusion, cont. • We have learned the hard way that practice is more difficult than theory. • Security issues are very important. Ian Clarke & Oskar Sandberg - 2005 – p.24/24
  • 84. Conclusion, cont. • We have learned the hard way that practice is more difficult than theory. • Security issues are very important. • How the network is deployed will affect how well it works. Ian Clarke & Oskar Sandberg - 2005 – p.24/24
  • 85. Conclusion, cont. • We have learned the hard way that practice is more difficult than theory. • Security issues are very important. • How the network is deployed will affect how well it works. People who are interested can join the discussion at http://freenetproject.org/. Ian Clarke & Oskar Sandberg - 2005 – p.24/24