Title :
Bypassing internet service provider traffic shaping with peer-to-peer file sharing through deliberate false positives
Author_Institution :
Sch. of Comput., Eng. & Inf. Sci., Northumbria Univ., Newcastle upon Tyne, UK
Abstract :
QoS applications rely on accurate detection of protocols in order to effectively manage traffic passing across networks. Peer-to-peer developers already use encryption and network overlays to bypass ISP traffic shaping but their methods only obfuscate telltale signatures. Unidentifiable or encrypted traffic can still be classified as such and therefore can still be managed. The author addresses the feasibility of using protocol mimicry to invoke deliberate false positives in order to bypass existing traffic analysis systems by masquerading as web browsing and VoIP traffic. Statistical analysis is undertaken to determine the costs associated with such modifications. It is found that peer-to-peer protocols can easily be modified to be incorrectly identified as genuine web and voice traffic without impractical increases in bandwidth consumption. The incorrect classification of such traffic can cause havoc with regard to priority-based queuing mechanisms, whereas allowing users to use throttled applications without restrictions. It is certainly feasible for file-sharing protocols such as BitTorrent being further developed to mimic the traits of less throttled protocols to bypass traffic shaping. This poses a huge risk to future ISP and corporate traffic management.
Keywords :
Internet telephony; computer network management; cryptographic protocols; peer-to-peer computing; quality of service; queueing theory; statistical analysis; telecommunication traffic; BitTorrent; Internet service provider traffic shaping; QoS; VoIP traffic; Web browsing; bypass ISP traffic shaping; corporate traffic management; file-sharing protocols; network overlays; network traffic management; obfuscate telltale signatures; peer-to-peer file sharing; peer-to-peer protocols; priority-based queuing mechanisms; statistical analysis; traffic analysis systems; voice traffic;
Journal_Title :
Communications, IET
DOI :
10.1049/iet-com.2010.0626