SlideShare una empresa de Scribd logo
1 de 8
SmartRetracker™
Relieving a large IPS’s network of redundant BitTorrent traffic
What is BitTorrent
• BitTorrent is the most popular file sharing protocol in the world today.
• In 2013, BitTorrent contributed for 15 to 40 per cent of ISP’s uplink
bandwidth load, depending on the country.
• BitTorrent ignores ISP’s network topology.
• The only way to make BitTorrent more ISP-friendly is by using so called
retrackers. They tell BitTorrent software where to find local peers.
• A peer is a piece of software used to download files, a member of
BitTorrent file exchange network.
BitTorrent running without retracker
Our example subscriber’s pool of peers

“Downloading from anyone
available”. Network topology
isn’t taken into account.
Redundant use of bandwidth.

Peers from
other
networks

A subscriber
using
BitTorrent

A large, multi-regional
Internet Service Provider.
Example network branches
are shown in color.

Other
subscribers
using
BitTorrent
BitTorrent running with a local retracker*
Local peers

All other peers

“Preferred downloading from local
peers”.
Partial localization of
BitTorrent traffic.

A subscriber
using
BitTorrent

A large, multi-regional
Internet Service Provider.
Example network branches
are shown in color.

Peers from
other
networks

* This is a standard feature of BitTorrent protocol and infrastructure.
The software is free. Any ISP can install and use it. The effect is not so good, however.
BitTorrent running with SmartRetracker™
Local peers

Neighbouring peers

“Peers from the same network go
first, neighbors next, all others
only as a matter of last resort.

Optimal!

Others
A subscriber
using
BitTorrent

A large, multi-regional
Internet Service Provider.
Example network branches
are shown in color.
SmartRetracker™
• Knows the network topology of an ISP.
• Updates this knowledge daily using BGP.
• Upon request, gives out the optimal set of peers: first local, then
neighbors from the same ISP network. Only if that is not enough, some
external peers.
• Transparent to BitTorrent users, doesn’t require any action on their part
in order to operate. The effect is immediate.
• Designed and programmed to handle millions of users simultaneously.
SmartRetracker™
• One SmartRetracker™ serving the whole ISP network means one source of stats and
analytics, one object for monitoring.
• In case of SmartRetracker™ failure, the ISP network continues to operate.
Subscribers don’t notice anything at all.
• SmartRetracker™ supplies data for our TorrentCache™, enabling proactive caching
of torrents. “It’s there when they want it”
• When bundled with our TorrentDPI™, SmartRetracker™ is capable of completely
suppressing data exchange with “foreign” peers.
This reduces BitTorrent’s share in provider’s links to a minimum.
• When bundled with TorrentDPI™, it is also capable of taking down any illegitimate
torrents in order to enforce copyright.
Contact
Ilya Mikov
+7-912-0610015
ilyamikov@gmail.com
Skype: bkmzbkmz

Más contenido relacionado

Destacado

國陷臨界點
國陷臨界點國陷臨界點
國陷臨界點
hkyeung
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buy
Vlad Styran
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
Ixia
 

Destacado (20)

Filmoscope
FilmoscopeFilmoscope
Filmoscope
 
SKOROVOZ
SKOROVOZSKOROVOZ
SKOROVOZ
 
國陷臨界點
國陷臨界點國陷臨界點
國陷臨界點
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buy
 
ZeroNights - SmartTV
ZeroNights - SmartTV ZeroNights - SmartTV
ZeroNights - SmartTV
 
Умная Теплица
Умная ТеплицаУмная Теплица
Умная Теплица
 
СКОРОВОЗ
СКОРОВОЗСКОРОВОЗ
СКОРОВОЗ
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
Berezha Security
Berezha SecurityBerezha Security
Berezha Security
 
The DNS Tunneling Blindspot
The DNS Tunneling BlindspotThe DNS Tunneling Blindspot
The DNS Tunneling Blindspot
 
Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016
 
Attacking thru HTTP Host header
Attacking thru HTTP Host headerAttacking thru HTTP Host header
Attacking thru HTTP Host header
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
Purple View
Purple ViewPurple View
Purple View
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue Teams
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Death of WAF - GoSec '15
Death of WAF - GoSec '15Death of WAF - GoSec '15
Death of WAF - GoSec '15
 
Death of Web App Firewall
Death of Web App FirewallDeath of Web App Firewall
Death of Web App Firewall
 

Similar a SmartRetracker

Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
Avula Jagadeesh
 

Similar a SmartRetracker (20)

P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Router and types
Router and types Router and types
Router and types
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
P2 p
P2 pP2 p
P2 p
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Part1
Part1Part1
Part1
 

Más de Ilya Mikov

Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
Ilya Mikov
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
Ilya Mikov
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
Ilya Mikov
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
Ilya Mikov
 
Рекламные возможности Мобильного Актива
Рекламные возможности Мобильного АктиваРекламные возможности Мобильного Актива
Рекламные возможности Мобильного Актива
Ilya Mikov
 

Más de Ilya Mikov (12)

Lordmancer II ICO deck
Lordmancer II ICO deckLordmancer II ICO deck
Lordmancer II ICO deck
 
RCML, Robot Control Meta Langugage
RCML, Robot Control Meta LangugageRCML, Robot Control Meta Langugage
RCML, Robot Control Meta Langugage
 
Ванга
ВангаВанга
Ванга
 
Как привести нужных клиентов из интернета
Как привести нужных клиентов из интернетаКак привести нужных клиентов из интернета
Как привести нужных клиентов из интернета
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеровDPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
 
Рекламные возможности Мобильного Актива
Рекламные возможности Мобильного АктиваРекламные возможности Мобильного Актива
Рекламные возможности Мобильного Актива
 
Фильмоскоп
ФильмоскопФильмоскоп
Фильмоскоп
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

SmartRetracker

  • 1. SmartRetracker™ Relieving a large IPS’s network of redundant BitTorrent traffic
  • 2. What is BitTorrent • BitTorrent is the most popular file sharing protocol in the world today. • In 2013, BitTorrent contributed for 15 to 40 per cent of ISP’s uplink bandwidth load, depending on the country. • BitTorrent ignores ISP’s network topology. • The only way to make BitTorrent more ISP-friendly is by using so called retrackers. They tell BitTorrent software where to find local peers. • A peer is a piece of software used to download files, a member of BitTorrent file exchange network.
  • 3. BitTorrent running without retracker Our example subscriber’s pool of peers “Downloading from anyone available”. Network topology isn’t taken into account. Redundant use of bandwidth. Peers from other networks A subscriber using BitTorrent A large, multi-regional Internet Service Provider. Example network branches are shown in color. Other subscribers using BitTorrent
  • 4. BitTorrent running with a local retracker* Local peers All other peers “Preferred downloading from local peers”. Partial localization of BitTorrent traffic. A subscriber using BitTorrent A large, multi-regional Internet Service Provider. Example network branches are shown in color. Peers from other networks * This is a standard feature of BitTorrent protocol and infrastructure. The software is free. Any ISP can install and use it. The effect is not so good, however.
  • 5. BitTorrent running with SmartRetracker™ Local peers Neighbouring peers “Peers from the same network go first, neighbors next, all others only as a matter of last resort. Optimal! Others A subscriber using BitTorrent A large, multi-regional Internet Service Provider. Example network branches are shown in color.
  • 6. SmartRetracker™ • Knows the network topology of an ISP. • Updates this knowledge daily using BGP. • Upon request, gives out the optimal set of peers: first local, then neighbors from the same ISP network. Only if that is not enough, some external peers. • Transparent to BitTorrent users, doesn’t require any action on their part in order to operate. The effect is immediate. • Designed and programmed to handle millions of users simultaneously.
  • 7. SmartRetracker™ • One SmartRetracker™ serving the whole ISP network means one source of stats and analytics, one object for monitoring. • In case of SmartRetracker™ failure, the ISP network continues to operate. Subscribers don’t notice anything at all. • SmartRetracker™ supplies data for our TorrentCache™, enabling proactive caching of torrents. “It’s there when they want it” • When bundled with our TorrentDPI™, SmartRetracker™ is capable of completely suppressing data exchange with “foreign” peers. This reduces BitTorrent’s share in provider’s links to a minimum. • When bundled with TorrentDPI™, it is also capable of taking down any illegitimate torrents in order to enforce copyright.