Monitoring P2P Networks
Interesting paper: "Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice":
Abstract -- We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We describe simple techniques for implicating arbitrary network endpoints in illegal content sharing and demonstrate the effectiveness of these techniques experimentally, attracting real DMCA complaints for nonsense devices, e.g., IP printers and a wireless access point. We then step back and evaluate the challenges and possible future directions for pervasive monitoring in P2P file sharing networks.
Webpage on the research.
Posted on August 22, 2008 at 12:08 PM
You can write a trojan and "infect" your system, the trojan will open a port and wait for commands, and can do anything with your system. But before gaining access the "user" must identify himself by a password.
char* hash = "somerandomhash";
if (hash == hash_it(given_password))
// give access
Since nobody can pass the control, your system is secure, but nobody can prove that there is no "somebody" there who knows the password and did the bad thing.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..