Peer-To-Peer Security problems

  • Thread starter Adhgh
  • Start date
  • Tags
    Security
In summary: Thanks even though you didnt give what i want, i will give an example for this issue:you are (X), and you have(Y) shared files and (N) not shared files. N are private. oneday in the upload section you see (U) another P2P user uploading a file from N.my question is why this happens?, and why companies are unable to solve this problem?Thanks for the example. In this scenario, the other user has violated the privacy of the other users by uploading a file they didn't share.
  • #1
Adhgh
8
0
P2P:

hey guys, i need your help, I'm tring to find out about the security problems that faced P2P companies, and why they were unable to deal with them, and by this i tend to mention the unauthorized access to other ones' files, where this is a major security question.

thanx
Adham
 
Computer science news on Phys.org
  • #2
I don't understand your question. The only real issue is that most p2p programs broadcast your IP Address, which can be used for hacking or tracking.
 
  • #3
Don't many (most?) p2p programs require quite a bit of system priviledges in order to operate ? Like "server" level rights in firewalls, enabling them to effectively bypass it and causing a sort of a security concern. Although didn't quite get the question altogether ...
 
  • #4
P2P messaging programs are more secure than the client-server ones. They can run on a local network without needing to access distant servers on the internet (as in msn, yahoo, irc, etc). So the P2P programs are going to be used more if security is a concern.
Security issues with P2P still remain, such as 'sniffing'. This is easy to overcome with encryption of messages. What remains difficult to deal with is the problem of social engineering that is the root of a number of attacks. For example as you mentioned a problem is with file sharing. If you download a malware file it can act as a virus, or worse as a trojan horse that communicates with the source computer.
Yet I don't see any security problem that is inherent in the P2P model.
 
Last edited:
  • #5
Thanks even though you didnt give what i want, i will give an example for this issue:
you are (X), and you have(Y) shared files and (N) not shared files. N are private. oneday in the upload section you see (U) another P2P user uploading a file from N.

my question is why this happens?, and why companies are unable to solve this problem?

thanks
Adham
 
  • #6
PerennialII, p2p programs can use port 80 and you don't have to run the server with privleges, so that really isn't an issue.

I have to agree with ramollari. P2P isn't inheretly any less secure than say your average IM client. If you set your shared folder to you complete drive/sensitive data that is just plain dumb on the user's part.
 
  • #7
dduardo said:
PerennialII, p2p programs can use port 80 and you don't have to run the server with privleges, so that really isn't an issue.

I have to agree with ramollari. P2P isn't inheretly any less secure than say your average IM client. If you set your shared folder to you complete drive/sensitive data that is just plain dumb on the user's part.

Yep, appears that avoiding the same crackpot pitfalls as usual can make it pretty smooth sailing (didn't know that specific port limitations have been all but erased). Remember seeing somewhere that e.g. antivirus apps have been added with "p2p shields" in order to limit the inflow of malware etc.
 
  • #8
Adhgh said:
Thanks even though you didnt give what i want, i will give an example for this issue:
you are (X), and you have(Y) shared files and (N) not shared files. N are private. oneday in the upload section you see (U) another P2P user uploading a file from N.

my question is why this happens?, and why companies are unable to solve this problem?

thanks
Adham
Do you mean "downloading a file from N", because "uploading a file from N" makes no sense?
Every application instance in a P2P environment is also a miniature server. So any client in P2P can be endowed with all capabilities (including security) of a file server.
Maybe, since a P2P client has a myriad of other features, the developers could overlook the security aspects and access privileges of file transfer.
 
  • #9
Adhgh said:
Thanks even though you didnt give what i want, i will give an example for this issue:
you are (X), and you have(Y) shared files and (N) not shared files. N are private. oneday in the upload section you see (U) another P2P user uploading a file from N.

my question is why this happens?, and why companies are unable to solve this problem?

thanks
Adham

Well, if that's a real life example, that would count as a violation of certain viewing rights in my book, so I grant you your worries over possible more hidden glitches in the software. What you cannot see you cannot hack, or at least not so easily. I also think they should be patching such a thing ASAP, if not rethink the whole setup.

Also the malware is getting smarter in bypassing shares and firewalls once inside. There's even talk of more malicious ghost-like software, and not by idiots, but by Microsoft itself. They even developed a detection program for it, called Strider Ghostbuster, no joke. So I don't think this issue is totally OTT.

http://www.eweek.com/article2/0,1759,1766413,00.asp
 
Last edited:
  • #10
ramollari said:
Do you mean "downloading a file from N", because "uploading a file from N" makes no sense?
Every application instance in a P2P environment is also a miniature server. So any client in P2P can be endowed with all capabilities (including security) of a file server.
Maybe, since a P2P client has a myriad of other features, the developers could overlook the security aspects and access privileges of file transfer.

i mean another user uploads from your PC and downloads on his PC, for instance in kazaa there is two ways of traffic for every user( upload, download).
anyway, it turned out there is no such a problem exactly, but its that P2P are not secure for many reasons i have no idea about?

Thanks
 
  • #11
Your rambling.

Other users cannot upload files to your computer. You must explicitly download the files off of the p2p networks.
 

Related to Peer-To-Peer Security problems

1. What is peer-to-peer (P2P) security?

Peer-to-peer (P2P) security refers to the measures and protocols used to protect the security and privacy of data being shared between two or more computers over a peer-to-peer network. This type of network allows devices to communicate directly with each other without the need for a central server, making it vulnerable to security threats.

2. What are some common security problems with P2P networks?

Some common security problems with P2P networks include unauthorized access to sensitive data, malware and virus distribution, and the possibility of exposing personal information to other users on the network. P2P networks are also susceptible to man-in-the-middle attacks, where an attacker intercepts and alters data being exchanged between two devices.

3. How can P2P security problems be prevented?

P2P security problems can be prevented by implementing strong authentication measures, such as passwords and encryption, to restrict access to the network. Regular software updates and using reputable P2P software can also help prevent security vulnerabilities. Additionally, users should exercise caution when sharing files and only download from trusted sources.

4. What role does encryption play in P2P security?

Encryption is crucial for P2P security as it ensures that data being shared between devices is protected and unreadable to unauthorized users. It uses complex algorithms to scramble data, making it difficult for hackers to access or decipher sensitive information. Without encryption, data on P2P networks is vulnerable to interception and manipulation.

5. Are there any legal concerns with P2P networks?

Yes, there are legal concerns with P2P networks as they are often used for illegal file sharing, such as copyrighted material and pirated software. This can result in legal consequences for both the user sharing the files and the recipients downloading them. It is important to use P2P networks responsibly and only share or download legally obtained files.

Similar threads

  • Computing and Technology
Replies
11
Views
1K
Replies
7
Views
2K
  • Computing and Technology
Replies
4
Views
1K
  • Computing and Technology
Replies
4
Views
3K
  • Computing and Technology
Replies
12
Views
2K
  • Computing and Technology
Replies
1
Views
2K
  • Computing and Technology
Replies
25
Views
3K
  • Computing and Technology
Replies
3
Views
2K
  • Introductory Physics Homework Help
3
Replies
88
Views
4K
Replies
10
Views
2K
Back
Top