BitTorrent Traffic Obfuscation : a Chase towards Semantic Traffic Identification

dc.contributor.authorZink, Thomas
dc.contributor.authorWaldvogel, Marcel
dc.date.accessioned2012-09-04T07:32:22Zdeu
dc.date.available2012-09-04T07:32:22Zdeu
dc.date.issued2012deu
dc.description.abstractWith the beginning of the 21st century emerging peer-to-peer networks ushered in a new era of large scale media exchange. Faced with ever increasing volumes of traffic, legal threats by copyright holders, and QoS demands of customers, network service providers are urged to apply traffic classification and shaping techniques. These systems usually are highly integrated to satisfy the harsh restrictions present in network infrastructure. They require constant maintenance and updates. Additionally, they have legal issues and violate both the net neutrality and end-to-end principles.

On the other hand, clients see their freedom and privacy attacked. As a result, users, application programmers, and even commercial service providers laboriously strive to hide their interests and circumvent classification techniques. In this user vs. ISP war, the user side has a clear edge. While changing the network infrastructure is by nature very complex, and only slowly reacts to new conditions, updating and distributing software between users is easy and practically instantaneous.

In this paper we discuss how state-of-the-art traffic classification systems can be circumvented with little effort. We present a new obfuscation extension to the BitTorrent protocol that allows signature free handshaking. The extension requires no changes to the infrastructure and is fully backwards compatible. With only little change to client software, contemporary classification techniques are rendered ineffective. We argue, that future traffic classification must not rely on restricted local syntax information but instead must exploit global communication patterns and protocol semantics in order to be able to keep pace with rapid application and protocol changes.
eng
dc.description.versionpublished
dc.identifier.citation12th IEEE International Conference on Peer-to-Peer Computing, P2P'12, 2012, Tarragona, Spain, September 3 - September 5deu
dc.identifier.ppn370626567deu
dc.identifier.urihttp://kops.uni-konstanz.de/handle/123456789/20262
dc.language.isoengdeu
dc.legacy.dateIssued2012-09-04deu
dc.rightsterms-of-usedeu
dc.rights.urihttps://rightsstatements.org/page/InC/1.0/deu
dc.subjectP2Pdeu
dc.subjectTraffic Classificationdeu
dc.subject.ddc004deu
dc.subject.gndBitTorrentdeu
dc.titleBitTorrent Traffic Obfuscation : a Chase towards Semantic Traffic Identificationeng
dc.typeINPROCEEDINGSdeu
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Zink2012BitTo-20262,
  year={2012},
  title={BitTorrent Traffic Obfuscation : a Chase towards Semantic Traffic Identification},
  isbn={978-1-4673-2860-9},
  publisher={IEEE},
  address={Piscataway, NJ},
  booktitle={Peer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on},
  pages={126--137},
  author={Zink, Thomas and Waldvogel, Marcel}
}
kops.citation.iso690ZINK, Thomas, Marcel WALDVOGEL, 2012. BitTorrent Traffic Obfuscation : a Chase towards Semantic Traffic Identification. In: Peer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on. Piscataway, NJ: IEEE, 2012, pp. 126-137. ISBN 978-1-4673-2860-9deu
kops.citation.iso690ZINK, Thomas, Marcel WALDVOGEL, 2012. BitTorrent Traffic Obfuscation : a Chase towards Semantic Traffic Identification. In: Peer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on. Piscataway, NJ: IEEE, 2012, pp. 126-137. ISBN 978-1-4673-2860-9eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/20262">
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dcterms:abstract xml:lang="eng">With the beginning of the 21st century emerging peer-to-peer networks ushered in a new era of large scale media exchange. Faced with ever increasing volumes of traffic, legal threats by copyright holders, and QoS demands of customers, network service providers are urged to apply traffic classification and shaping techniques. These systems usually are highly integrated to satisfy the harsh restrictions present in network infrastructure. They require constant maintenance and updates. Additionally, they have legal issues and violate both the net neutrality and end-to-end principles.&lt;br /&gt;&lt;br /&gt;On the other hand, clients see their freedom and privacy attacked. As a result, users, application programmers, and even commercial service providers laboriously strive to hide their interests and circumvent classification techniques. In this user vs. ISP war, the user side has a clear edge. While changing the network infrastructure is by nature very complex, and only slowly reacts to new conditions, updating and distributing software between users is easy and practically instantaneous.&lt;br /&gt;&lt;br /&gt;In this paper we discuss how state-of-the-art traffic classification systems can be circumvented with little effort. We present a new obfuscation extension to the BitTorrent protocol that allows signature free handshaking. The extension requires no changes to the infrastructure and is fully backwards compatible. With only little change to client software, contemporary classification techniques are rendered ineffective. We argue, that future traffic classification must not rely on restricted local syntax information but instead must exploit global communication patterns and protocol semantics in order to be able to keep pace with rapid application and protocol changes.</dcterms:abstract>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/20262"/>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/20262/1/zink2012bittorrent.pdf"/>
    <dc:creator>Waldvogel, Marcel</dc:creator>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:issued>2012</dcterms:issued>
    <dcterms:title>BitTorrent Traffic Obfuscation : a Chase towards Semantic Traffic Identification</dcterms:title>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-09-04T07:32:22Z</dcterms:available>
    <dc:rights>terms-of-use</dc:rights>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dc:contributor>Zink, Thomas</dc:contributor>
    <dc:creator>Zink, Thomas</dc:creator>
    <dc:contributor>Waldvogel, Marcel</dc:contributor>
    <dcterms:bibliographicCitation>12th IEEE International Conference on Peer-to-Peer Computing, P2P'12, 2012, Tarragona, Spain, September 3 - September 5</dcterms:bibliographicCitation>
    <dc:language>eng</dc:language>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-09-04T07:32:22Z</dc:date>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/20262/1/zink2012bittorrent.pdf"/>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
  </rdf:Description>
</rdf:RDF>
kops.description.openAccessopenaccessgreen
kops.flag.knbibliographytrue
kops.identifier.nbnurn:nbn:de:bsz:352-202625deu
kops.relation.uniknProjectTitleTraffic/Interest Hiding
kops.sourcefield<i>Peer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on</i>. Piscataway, NJ: IEEE, 2012, pp. 126-137. ISBN 978-1-4673-2860-9deu
kops.sourcefield.plainPeer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on. Piscataway, NJ: IEEE, 2012, pp. 126-137. ISBN 978-1-4673-2860-9deu
kops.sourcefield.plainPeer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on. Piscataway, NJ: IEEE, 2012, pp. 126-137. ISBN 978-1-4673-2860-9eng
kops.submitter.emailthomas.zink@uni-konstanz.dedeu
relation.isAuthorOfPublicationa652f8c4-7959-4e5f-8971-6b94240905f1
relation.isAuthorOfPublication84e1ce62-b720-46ef-b156-ce00a632dd4f
relation.isAuthorOfPublication.latestForDiscoverya652f8c4-7959-4e5f-8971-6b94240905f1
source.bibliographicInfo.fromPage126
source.bibliographicInfo.toPage137
source.identifier.isbn978-1-4673-2860-9
source.publisherIEEE
source.publisher.locationPiscataway, NJ
source.titlePeer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference on

Dateien

Originalbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
zink2012bittorrent.pdf
Größe:
2.1 MB
Format:
Adobe Portable Document Format
zink2012bittorrent.pdf
zink2012bittorrent.pdfGröße: 2.1 MBDownloads: 1307

Lizenzbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
license.txt
Größe:
1.92 KB
Format:
Plain Text
Beschreibung:
license.txt
license.txtGröße: 1.92 KBDownloads: 0