Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL...

11
Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKS DR. KURT MALY FALL 2014 KHAJA MASROOR AHMED 00999044

Transcript of Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL...

Page 1: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

DarknetAnonymous peer to peer file sharing

CS555 INTRODUCTION TO COMPUTER NETWORKS DR. KURT MALY FALL 2014

KHAJA MASROOR AHMED 00999044

Page 2: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Contents• What is Darknet?

• Why use Darknet?

• How it works?

• Examples of Darknet Applications

• Conclusion

• Bibliography

Page 3: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

What is Darknet?• Darknet is a collection of networks and technologies used to share

digital content.

• It is not a separate physical network but an application and protocol layer on existing networks.

• It is a private network where connections are made only between trusted peers.

• Unlike distributed peer-to-peer networks the sharing is anonymous as the IP addresses are not publicly shared.

• Sharing content over darknet is also known as Friend-Friend(F2F) sharing.

Page 4: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Why use Darknet?

• Anonymity on internet while retaining communication with large users is difficult.

• ISP allocated IP address can be used to locate the user, and to track network activity.

Page 5: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Why use Darknet?• On the contrary, Darknet

provides the following features: Anonymity – Any content shared

cannot be associated to a specific person.

Privacy – IP address is not publically shared over the network.

Trust – Content is shared between known peers.

Page 6: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

How it works?• Peering:

Darknet like internet are built on idea of peering. The node is manually added to the list of nodes the application is allowed to

connect and exchange information with.

• Anonymity: A logical network is built upon the internets TCP/IP infrastructure. Packets being sent into the network don’t use their machines IP addresses.

• Encryption: The packet data is encrypted by the application multiple times along with the

destination IP address.

Page 7: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

How it works?• Routing:

After joining the network, the packet is to be routed to the destination.

Different types of routing protocols can be used such as TOR(The Onion Router), BGP, etc.

There is no direct communication between source and destination peer’s.

Different routing algorithms can be used to forward the node to the destination.

Page 8: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Examples of Darknet Applications• Bitblinder

• Freenet

• I2P

• Mnet

• anoNet

• Crowds

• P2PRIV

Page 9: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Conclusion• Darknet is as dark as the intentions of the users.

• It provides a secure anonymous network for sharing files within the F2F network a.k.a friends.

• It uses non-standard protocols and ports for communication.

Page 10: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Bibliography• Marc Seeger, The current state of anonymous file-sharing

• Amita A. Dwivedy, Secure File Sharing in Darknet

• Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman , The Darknet and the Future of Content

• www.en.Wikipedia.org/wiki/Darknet_(file_sharing)

• http://security.stackexchange.com/questions/29366/what-are-darknets-and-how-can-they-be-used-to-provide-security-and-anonymity-in

• https://en.wikipedia.org/wiki/Anonymous_P2P

Page 11: Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED00999044.

Questions?