P 2 P Security example essay topic

1,906 words
Thesis statement: Users of Peer to Peer networks must be aware of the security and how to deal with the attacks. Introduction Technologies are getting more advance each day, in this assignment will be sharing and discuss about the security in peer to peer networks. Security run an important role in every network applications because this is the place where people and the systems are all link up together and can access each other data and also programs. According to Madron (1992) points out that: One of the primary objectives of computer networks (and especially of local area networks) is to provide easy and convenient access to computer systems within an organizations, and it is that same ease of use that can sometimes conflict with security needs. (p. 3) This being the case most of the peer to peer networks can remote the systems to access the nodes in the peer to peer network and programs are often transferred in the systems in remote locations and also because of the usefulness of the networking it really attracts people all around to use and at the same time problems of security happens. So it is crucial for the users to ensure their security in the networking. The problems usually started from modification of messages in transit, denial of services attacks and interception of messages, "perhaps the most obvious active threat faced by a communication system is an attack that can destroy or delay most or all messages" (Madron, 1992, p. 63).

In order to secure the systems of peer to peer network there is three basics requirements of security, integrity and authentication, it seems evident that "Data integrity ensures that data have not been altered or destroyed in an unauthorized manner. Both data integrity and authentication rely heavily on encryption as a primary security mechanism" (Madron, 1992, p. 71). For this security the operating system level and application level is used. As to ensure the security for every users, the helps support security needs to be posted to the peer to peer network and also to be specified. Requirements Peer to peer (P 2 P) file sharing networks have become wildly popular. The first major file-sharing network example was NAPSTER, which designed to allow music fans to share MP 3 music files and so on.

P 2 P actually is all about sharing resources like files, storage or processing time, with every other computer in the peer network. The peer network usually consists of authorized peers in a corporate setup. When everyone is accessible to remote peers, the host becomes more open for all kinds of attacks. In addition, as clients, peers may download different forms of files or get their process executed by different remote systems, which may prove to be hostile. The best things to do to prevent all this things to happen, is to stay out from peer to peer network. But with this kind of solution will depose us of all P 2 P computing or network privileges.

P 2 P systems example like Gnutella, Wired: P 2 P pages and Groove Networks are here to stay". Gnutella free software application using peer-to-peer technology for sharing MP 3 and video files. Wired: P 2 P Pages This global file-sharing guide lists 240-plus downloads, services, and information resources - most of them free - designed for experienced P 2 Pers and novices alike. Technical specs are provided for software developers to build many of these services.

Groove Networks Develops Internet-based software for people to collaborate with one another". ( web ) If P 2 P are going to be used widely or commercially, the requirements of security of the hosts should make their transactions secure and applications endanger the security of the host. The Peer-to-Peer networks threat Peer-to-peer networks software or files are available for free in the network itself, because of this there are threats in P 2 P networks. During transferring files or loading files, viruses could be sent along with the files that are transmitted. "For example, according to much of the information in industry literature we might well be led to believe that 'worms' and 'viruses' are the primary threats with which we should be concerned" (Madron, 1992, p. 8). An example of a network being targeted by virus which is Gnutella networks and the virus is Gnuman worm. This Gnuman worm (Virus) will increase the amount of itself by serving requests from other users and to another one.

For example, if a users or peers requests for a music "Daredevil soundtrack" the worm will wrap itself in the music file and will deliver it to the users. Even Instant messengers have been found to be used as a tool for transmitting viruses. Bug in P 2 P programs can also be dangerous. For instance evident that, "in August 1999 a bug in the AOL Instant Messenger (AIM) client allowed an attacker to overflow internal buffers by sending URLs constructed in a certain manner" (web).

In this situation, it was possible to crash the client, obtain control of the AIM program, execute arbitrary code, and add random friends to a friend list through a Web page or email. Since P 2 P networks perform well in transmitting files and also because of the fast spreading. The best thing to do is to use Antivirus software. Other threats are available such as password and date theft, violating intellectual property laws, using the corporate network for personal or illegal activities, and violating corporate security policies.

The elements of secure system so Encryption is one of the major security risks on LANs and HSL Ns, which use a multi-access medium the risk of eavesdropping. Eavesdropping can be done by programming the NIU to accept. According to Durr and Gibbs (1989, p. 355) "encryption is the process of changing intelligible data into unintelligible date; decryption reverse the process. For most local area networks, data encryption is used only when the security threat is substantial". The Peer-to-Peer network is very useful, new and in the same way is dangerous. In a P 2 P application, encryption can play many roles.

One obvious use of encryption is to protect the information that flows between peers on an unsecured network such as the Internet. This, combined with secure authentication of each peer, ensures that the exchanged data is check or scanned upon during communication. If the information is digitally signed or a MAC (Message Authentication Code) is added to the information, both parties can be sure that the information was not modified, as well. Peer-to-peer security management He stated that "Network security can be defined as the protection of network resources against unauthorized disclosure, modification, utilization, restriction, or destruction" (Stallings, 1990, p 447). No systems can be made completely immune from viral attacks, although some steps can be taken like use good general security practices example maintain an appropriate backup procedure, have periodic security reviews to determine weakness, maintain and use access control facilities and make sure that users are trained in security procedures. All these steps at least can help a bit to prevent it.

In order to have a good security management, Stallings (1990) stated that "security management provides support for the management of: 1. Authorization facilities 2. Access control 3. Encryption and key management 4.

Authentication 5. Security logs (p. 434) Infrastructure In order to overcome P 2 P technology's security is a solid infrastructure to support P 2 P security, the ones that supported by users and as well as vendors. This architecture must be able to exchange and make use of information, platform independence, and conformance to official. Microsoft is best positioned to provide this architecture. According to the O'Reilly report, 'If it can deliver on its vision, Microsoft will sweep the P 2 P infrastructure space, leaving room only for niche providers and die-hard holdouts. ' (web). This 'vision' is.

NET. The three components of. NET most critical to P 2 P technology are My Services (formerly code-named 'Hailstorm'), Passport, and Windows XP. My Services is a family of services aimed at Web users.

Some services, such as Wallet, which manages receipts, payment instruments, coupons, and other transaction records, require serious security. Other services, such as Profile and Presence, will be key for building P 2 P applications and will be closely tied to security. Profile manages information such as the username, nickname, special dates, and pictures. The P 2 P aspects of. NET target the consumer, or at most the mid-size businesses, rather than the enterprise. Even there, they " ve run into security issues. (web).

For example, Microsoft's Internet-based authentication system for Web Services is Passport, which promises to deliver single sign-on capabilities. According to (web) Passport has generated privacy concerns among industry observers. It's an attractive target for hackers, because it is a key underpinning of My Services. Moreover, there's pressure to open it up to inter operate with competitive offerings, potentially creating new security holes. Microsoft has responded by promising that Passport 3.0 will support Kerberos authentication as an option. These growing pains may take a long time to work themselves out.

Technology, however, will likely not be the determining factor: Microsoft has demonstrated its ability to turn technically-challenged products into de facto standards. A natural runner-up to Microsoft in the security infrastructure arena might have been Groove. But Microsoft is integrating Groove technology into. NET. Groove 1.3 looks like, and runs most efficiently on, Windows XP.

Groove users can chat with users of the WM IM client and work collaboratively with them on Microsoft Office documents. The only other player here is Sun Microsystems, with JXTA. But according to the O'Reilly report, 'While security with JXTA is given high priority in the documentation, it's given short shrift in implementation (web) Conclusion Security is important and problems of security should be take attention from the peers and the networks system. Above clearly describe and also ways to overcome the circumstances will be approaching the attacks. Peer-to-peer networks security are not black and white and also they do not hold any right answers to the question of how much or what security is needed? How much security is enough is dependent on the cost of potential loss to the approach.

The question will be slowly be answer when the users are having trouble with the attacks. Based on Ward on (1992) Better that law that protect data, as legislation has traditionally protected other property, might be one better way to deal with computer network security, although such laws are likely to be only marginally effective. In the end, the use of technology is probably the only way we can secure information. The investment in information that individuals and organizations have made, are making, and will make in the future is enormous, however, and security systems aid us in protecting that investment". (p. 235). Aware of the security and protection.

Bibliography

1. Durr, M., & Gibbs, M. (1989).
Networking Personal Computers (3rd ed. ). United States of America: Que Corporation. 2. Madron T.W. (1992).
Network Security in the'90's: issues and solutions for managers. United States of America: WPC. 3. Stallings, W. (1990).
Local Networks (3rd ed. ). United States of America: Macmillan. 4. (2003).
Retrieved May 2, 2003, web (2003).
Retrieved April 20, 2003, web (2002).
Retrieved April 20, 2003, web Aug 02 Monitor.