Should IT Worry About P2P's Traffic Domination? Yes

Carl Weinschenk

IT managers who want a case of indigestion need go no further than peeking at the figures from ipoque on peer-to-peeer (P2P) traffic. The firm says the approach accounts for 50 percent to 90 percent of the traffic on the Internet, according to a report in Ars Technica.

 

ipoque says that the main offender is BitTorrent, which was responsible for 50 percent to 75 percent of P2P traffic. The firm surpassed eDonkey, which accounted for 5 percent to 50 percent of traffic.

 

The news wasn't all bad, the story says. Ellacoya, a deep packet inspection (DPI) firm, in June said that P2P comprised only 37 percent of North American traffic. Forty-six percent of traffic, that study said, was in the hyper text transport protocol (HTTP) format.

 

P2P is associated with two major indigestion-producers. One is the fact that it chews up bandwidth at an alarming rate. The other is the security concerns that it raises. Indeed, on August 16 Skype -- the leading P2P VoIP provider -- suffered an outage that lasted a day or so and was as crippling to its image as to its network. It was interesting that folks are so nervous about P2P that the original assumption -- which proved to be inaccurate -- was that the outage was caused by a huge distributed denial of service (DDoS) attack. (A Microsoft update, a flaw in Skype's SuperNodes and some bad luck were the culprits.)

 

Though capacity issues may get the lion's share of the coverage, it may be that security is the bigger problem for P2P. During a U.S. House Committee on Oversight and Government Reform hearing in July, Computerworld reported on comments by a professor of operations management at Dartmouth College in New Hampshire. He said that the problem of the loss of sensitive data over P2P networks is worse than many people think. Retired Army General Wes Clark -- who is on the board of Tiversa, a P2P monitoring service -- claimed to have accessed more than 200 sensitive documents in hours over a file sharing network.


 

E-Commerce Times covered what apparently was the same hearing. The topic of its story was the grilling given to LimeWire chairman Mark Gorton. The fourth paragraph of the story does a good job of listing the type of sensitive data found on the P2P service. What drives the point home most effectively, however, is the next paragraph, which is frightening in its matter-of-fact nature:

What may have caught committee members most off-guard was learning that tax return information from both British and U.S. citizens was easily located by simply entering the term "tax return" in the LimeWire search window.

This posting at Siliatech's Blog Channel, which seems to have been written by a network administrator, says that P2P networks are very common internal structures among small businesses, while larger organizations opt for domain structures. The writer feels that small companies' reliance on P2P is unfortunate because it means that there is little oversight. Conversely, a domain system charges one administrator with responsibility for for what goes on.

 

The bottom line is obvious: Companies of all sizes should bypass P2P in their networks, and do whatever they can to squelch their employees' use of it.



Add Comment      Leave a comment on this blog post
Sep 7, 2007 9:40 AM sada sada  says:
Dear This is the simplest, most enlightening book I've ever read. I would go as far as stating this book beats any bible out in the world. Not that I'm religious, but I'd stack it up there. I've looked through many self-help books. By the time I finish 100-200 pages of crap, I've lost myself in what specific help I was looking for. I'm a new husband with a uncompassionate non-empathetic wife and the cutest 2 year old. I've been married 3 years. I love her and my child because love has reserved a place in my heart for better or worse. I'm seeing a psychiatrist for my troubled marriage. They don't seem to cure what's really ailing me, which is the heartache of love. In one weeks time your wisdom has turn the tides of my failing marriage. I have empowered myself as a confident male and followed your 14 pages of pure sweet knowledge. My wife is now calling and wanting to sweet talk and she's listening to my new-found rules I've laid down for myself. In a way, your book is all about helping me and through that is a byproduct of a happy wife. Its working so well..... I just might keep it a secret for awhile, but it will work for the ladies to. Please feel free to use me as a reference for doubting husbands in the USA. No buddy can truly believe the wisdom in your book unless he/she reads it and all in one night which is awesome. A personal note to all the husbands suffering in America and elsewhere: This book is a universally true that works to win your love back. Kind Regards,sada Reply
Sep 13, 2007 3:57 AM Jacob Horev Jacob Horev  says:
We have the solution for most known breaches of data base. Our software (see our web site) is nearly 100% hacker prove software. Our software is compatiple with TCP/IP protocole and compatible with all exisiting operating system. In the same time, our software is based on a new protocol we have developed that enables us to secure data without the need to open ports in the firewall. Yes, we can transfer and receive data without opening ports in the firewall and therefore the chance of hacker to breach our software is nearly zero. Reply

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.