Survey of secure anonymous peer to peer Instant Messaging protocols

Author(s):  
Rakan Alkhulaiwi ◽  
Abdulhakim Sabur ◽  
Khalid Aldughayem ◽  
Osama Almanna
Author(s):  
Fabian Stäber ◽  
Gerald Kunzmann ◽  
Jörg P. Müller

Decentralized peer-to-peer systems fit well as the underlying infrastructure for IP-telephony, as they provide the scalability for a large number of participants, and are able to handle the limited storage and bandwidth capabilities on the clients. We studied a commercial peer-to-peer-based decentralized communication platform supporting video communication, voice communication, instant messaging, et cetera. One of the requirements of the communication platform is the implementation of a user directory, allowing users to search for other participants. In this chapter, we present the Extended Prefix Hash Tree algorithm that enables the implementation of a user directory on top of the peer-to-peer communication platform in a fully decentralized way. We evaluate the performance of the algorithm with a real-world phone book. The results can be transferred to other scenarios where support for range queries is needed in combination with the decentralization, self-organization, and resilience of an underlying peer-to-peer infrastructure.


Author(s):  
KuoHsun Hsu ◽  
WenTin Lee ◽  
MinYu Sie ◽  
GuanLin Ciou ◽  
ShaoYuan Lu

2008 ◽  
Vol 17 (01) ◽  
pp. 1-51 ◽  
Author(s):  
ZHONGQIANG CHEN ◽  
ALEX DELIS ◽  
PETER WEI

Sessions generated by Instant Messaging and Peer-to-Peer systems (IM/P2Ps) not only consume considerable bandwidth and computing resources but also dramatically change the characteristics of data flows affecting both the operation and performance of networks. Most IM/P2Ps have known security loopholes and vulnerabilities making them an ideal platform for the dissemination of viruses, worms, and other malware. The lack of access control and weak authentication on shared resources further exacerbates the situation. Should IM/P2Ps be deployed in production environments, performance of conventional applications may significantly deteriorate and enterprise data may be contaminated. It is therefore imperative to identify, monitor and finally manage IM/P2P traffic. Unfortunately, this task cannot be easily attained as IM/P2Ps resort to advanced techniques to hide their traces including multiple channels to deliver services, port hopping, message encapsulation and encryption. In this paper, we propose an extensible framework that not only helps to identify and classify IM/P2P-generated sessions in real time but also assists in the manipulation of such traffic. Consisting of four modules namely, session manager, traffic assembler, IM/P2P dissector, and traffic arbitrator, our proposed framework uses multiple techniques to improve its traffic classification accuracy and performance. Through fine-tuned splay and interval trees that help organize IM/P2P sessions and packets in data streams, we accomplish stateful inspection, traffic re-assembly, data stream correlation, and application layer analysis that combined will boost the framework's identification precision. More importantly, we introduce IM/P2Ps "plug-and-play" protocol analyzers that inspect data streams according to their syntax and semantics; these analyzers render our framework easily extensible. Identified IM/P2P sessions can be shaped, blocked, or disconnected, and corresponding traffic can be stored for forensic analysis and threat evaluation. Experiments with our prototype show high IM/P2Ps detection accuracy rates under diverse settings and excellent overall performance in both controlled and real-world environments.


Author(s):  
Sharon Lauricella ◽  
Robin Kay

This article examined how higher education students used text and instant messaging for academic purposes with their peers and faculty. Specifically, comfort level, frequency of use, usefulness, reasons for messaging and differences between peer-to-peer and peer-to-instructor interactions were examined. Students noted that they were very comfortable with using both text and instant messaging. Text messaging was used weekly with instructors and daily with peers. Instant messaging was used rarely with instructors but weekly with peers. Students rated text messaging as very useful and instant messaging as moderately useful for academic purposes. Key reasons cited for using both text and instant messaging included saving time, resolving administrative issues, convenience and ease of use. Text messaging appears to be the preferred mode of communication for students with respect to communicating with both peers and instructors. It is concluded that both text and instant messaging are useful and viable tools for augmenting student's communication among peers and faculty in higher education.Keywords: text messaging; instant messaging; student–faculty interaction; peer-to-peer interaction(Published: 3 September 2013)Citation: Research in Learning Technology 2013, 21: 19061 - http://dx.doi.org/10.3402/rlt.v21i0.19061


2009 ◽  
Vol 1 (4) ◽  
pp. 57-69
Author(s):  
Fabian Stäber ◽  
Gerald Kunzmann ◽  
Jörg P. Müller

Besides file sharing, IP telephony has become the most widely used peer-to-peer-based application. Software and hardware phones with built-in peer-to-peer stacks are used to enable IP telephony in closed networks on large company sites as well as in the Internet. As part of the PeerThings project1, Siemens developed a decentralized communication platform supporting video communication, voice communication, instant messaging, and so on. While decentralized communication has already been implemented in related work, providing a scalable peer-to-peer-based distributed directory for searching user entries is still an unsolved challenge. In this article we present the Extended Prefix Hash Tree algorithm that can be used to implement an indexing infrastructure supporting range queries on top of DHTs.


PADUA ◽  
2016 ◽  
Vol 11 (1) ◽  
pp. 65-71 ◽  
Author(s):  
Jörg Haslbeck

Zusammenfassung. In der Gesundheitsversorgung von Menschen, die mit chronischen Krankheiten leben, wird soziale Unterstützung durch «peers» immer bedeutsamer, d. h. durch Personen, die aufgrund ähnlicher Krankheits- und Alltagserfahrungen in einer vergleichbaren Lebenssituation sind. Welche Potenziale, Chancen sowie Grenzen hat «peer-to-peer healthcare» im Kontext von Selbstmanagementförderung? Der Beitrag diskutiert dies anhand von Erfahrungen mit dem Stanford Kursprogramm «Gesund und aktiv leben».


Sign in / Sign up

Export Citation Format

Share Document