Ask the Expert

What challenges arise when designing a logging mechanism for peer-to-peer networks?

What challenges arise when designing a logging mechanism for peer-to-peer networks?

    Requires Free Membership to View

The distributed and dynamic nature of P2P networks make the technology hard to detect on an enterprise network, let alone log transactions. That's largely because P2P systems are fickle with IP addresses and lack a centralized authentication server.

It's also difficult to log P2P activity at the firewall level, since connecting ports frequently change and can't be easily identified. Without distinct ports to block or log, P2P traffic can slip through a firewall undetected.

Despite that, P2P doesn't move totally in the dark, and depending on the application, it leaves some footprints that can be tracked by commercially available tools.

One tool is ProxySG from Blue Coat Systems, a leader in enterprise Web content filtering and blocking tools. Instead of blocking ever-changing ports and IP addresses, ProxySG looks for the type of malformed HTTP packets used for communicating to P2P networks. It also checks the headers of outbound packets for known P2P agents like KaZaa. ProxySG can also be used to log allowed agents on the network, so that inappropriate agents, such as P2P, can be logged and tracked.

Another product is Real-Time (RT) Guardian from FaceTime Communications. RT Guardian uses FaceTime's IMAuditor technology and sits in the DMZ to monitor P2P and IM traffic. Since P2P software is often bundled with spyware, FaceTime uses malware-screening technology to dig up P2P instances by detecting spyware that is commonly known to piggyback along with it.

Proventia, a product from IBM Internet Security Systems, logs and blocks P2P by building a profile of common ports used by file-sharing software such as KaZaa and Gnutella.

Despite being difficult to track because of its dynamic and decentralized nature, P2P usage can be logged with commercially available tools through detection of unique HTTP packets, headers and other P2P traffic quirks.

For more information:

  • Read about security risks and vulnerabilities unique to P2P enviornments.
  • Research shows a steady increase in threats that target unauthorized IM and peer-to-peer applications.
  • This was first published in June 2007

    There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: