Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

How To Prevent Peer-to-Peer Network Abuse: Page 6 of 6

Share and Share Alike

File-sharing traffic is much easier to identify than to block. Intrusion-detection systems, such as Snort, can identify many different protocols (see "Nose Around With Snort", for more information). Although blocking can be difficult, you can enforce corporate policies by monitoring violations. Unfortunately, as more protocols implement encryption--even simple encryption--it'll be trickier to identify the protocols. And with more protocols implementing multiple connection methods, or using completely random ports, securing your network against these applications may become next to impossible. Thankfully, as long as there are people writing applications, there are security administrators working to prevent inappropriate use of those applications.

Jeremy Baumgartner is a network security administrator for the College of Engineering at the University of Wisconsin, Madison. Write to him at [email protected].