A peer-to-peer (P2P) network is a distributed application architecture which provides many attractive features, such as availability, self-organization, load-balancing, and anonymity. However, P2P network has create...A peer-to-peer (P2P) network is a distributed application architecture which provides many attractive features, such as availability, self-organization, load-balancing, and anonymity. However, P2P network has created significant problems to network operators by generating large volumes of inter autonomous system (inter-AS) traffic. Focusing on the BitTorrent swarming protocol, this paper proposes an approach which aims to reduce P2P generated inter-AS traffic. In particular, the approach can reduce inter-AS traffic by 50% to 70%. Moreover, it can improve the downloading speed by 60% for the popular torrents. The evaluation shows that controlled regional-based contents replication can effectively achieve this goal. Furthermore, the approach is incrementally deployable. Network regions in which the system gets deployed can solve their P2P generated inter-AS traffic problems autonomously, i.e., without any Internet service providers-collaboration and any requirement, the system can be deployed in the entire Internet.展开更多
IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (S...IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are standardized by the Internet Engineering Task Force (iETF), SAV at the inter-Autonomous System (AS) level still remains an important issue. To prevent routing hijacking, the IETF is constructing a Resource Public Key Infrastructure (RPKI) as a united trust anchor to secure interdomain routing, in this study, we creatively use the RPKI to support inter-AS SAV and propose an RPKI-based Inter-AS Source Protection (RISP) mechanism. According to the trust basis provided by the RPKI, RISP offers ASes a more credible source-oriented protection for the IP addresses they own and remains independent of the RPKI. Based on the experiments with real Internet topology, RISP not only provides better incentives, but also improves efficacy and economizes bandwidth with a modest resource consumption.展开更多
基金supported by the National Natural Science Foundation of China under Grant No. 61001084
文摘A peer-to-peer (P2P) network is a distributed application architecture which provides many attractive features, such as availability, self-organization, load-balancing, and anonymity. However, P2P network has created significant problems to network operators by generating large volumes of inter autonomous system (inter-AS) traffic. Focusing on the BitTorrent swarming protocol, this paper proposes an approach which aims to reduce P2P generated inter-AS traffic. In particular, the approach can reduce inter-AS traffic by 50% to 70%. Moreover, it can improve the downloading speed by 60% for the popular torrents. The evaluation shows that controlled regional-based contents replication can effectively achieve this goal. Furthermore, the approach is incrementally deployable. Network regions in which the system gets deployed can solve their P2P generated inter-AS traffic problems autonomously, i.e., without any Internet service providers-collaboration and any requirement, the system can be deployed in the entire Internet.
基金supported by the National Natural Science Foundation of China Nos.61772307 and 61402257the National Key Basic Research and Development(973) Program of China Nos.2009CB320500 and 2009CB320501Tsinghua University Self-determined Project under grant No.2014z21051
文摘IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are standardized by the Internet Engineering Task Force (iETF), SAV at the inter-Autonomous System (AS) level still remains an important issue. To prevent routing hijacking, the IETF is constructing a Resource Public Key Infrastructure (RPKI) as a united trust anchor to secure interdomain routing, in this study, we creatively use the RPKI to support inter-AS SAV and propose an RPKI-based Inter-AS Source Protection (RISP) mechanism. According to the trust basis provided by the RPKI, RISP offers ASes a more credible source-oriented protection for the IP addresses they own and remains independent of the RPKI. Based on the experiments with real Internet topology, RISP not only provides better incentives, but also improves efficacy and economizes bandwidth with a modest resource consumption.