Abstract
Current peer-to-peer (P2P) streaming systems often assume that nodes cooperate to upload and download data. However, in the open environment of the Internet, this is not necessarily true and there exist malicious nodes in the system. In this article, we study malicious actions of nodes that can be detected through peer-based monitoring. We require each node to monitor the data received and to periodically send monitoring messages about its neighbors to some trustworthy nodes. To efficiently store and search messages among multiple trustworthy nodes, we organize trustworthy nodes into a threaded binary tree. Trustworthy nodes also dynamically redistribute monitoring messages among themselves to achieve load balancing. Our simulation results show that this scheme can efficiently detect malicious nodes with high accuracy, and that the dynamic redistribution method can achieve good load balancing among trustworthy nodes.
- Aberer, K. and Despotovic, Z. 2001. Managing trust in a peer-2-peer information system. In Proceedings of the ACM Conference on Information and Knowledge Management (CIKM). 310--317. Google Scholar
Digital Library
- Adar, E. and Huberman, B. A. 2000. Free riding on Gnutella. Tech. rep., HP. http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf.Google Scholar
- Banerjee, S., Bhattacharjee, B., and Kommareddy, C. 2002. Scalable application layer multicast. In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM). 205--217. Google Scholar
Digital Library
- Chen, R. and Yeager, B. 2001. Poblano: A distributed trust model for peer-to-peer networks. Tech. rep. SUN Microsystems.Google Scholar
- Chu, Y. H., Rao, S., Seshan, S., and Zhang, H. 2002. A case for end system multicast. IEEE J. Sel. Areas Commun. 20, 8, 1456--1471. Google Scholar
Digital Library
- Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. 2001. Introduction to Algorithms. MIT Press. Google Scholar
Digital Library
- Cornelli, F., Damiani, E., Vimercati, S., Paraboschi, S., and Samarati, P. 2002. Choosing reputable servents in a P2P network. In Proceedings of the Conference on the World Wide Web (WWW). 376--386. Google Scholar
Digital Library
- Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P., and Violante, F. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS). 207--216. Google Scholar
Digital Library
- Deering, S. E. 1988. Multicast routing in internetworks and extended LANs. ACM SIGCOMM CCR '18, 4, 55--64. Google Scholar
Digital Library
- Do, T., Hua, K. A., and Tantaoui, M. 2004. P2VoD: Providing fault tolerant video-on-demand streaming in peer-to-peer environment. In Proceedings of the IEEE International Communications Conference (ICC). 1467--1472.Google Scholar
- Dragovic, B., Kotsovinos, E., Hand, S., and Pietzuch, P. 2003. XenoTrust: Event-based distributed trust management. In Proceedings of the International Conference on Database and Expert Systems (DEXA). Google Scholar
Digital Library
- Guo, Y., Suh, K., Kurose, J., and Towsley, D. 2003. P2Cast: Peer-to-peer patching scheme for VoD service. In Proceedings of the Conference on the World Wide Web (WWW). 301--309. Google Scholar
Digital Library
- Habib, A. and Chuang, J. 2006. Service differentiated peer selection: An incentive mechanism for peer-to-peer media streaming. IEEE Trans. Multimedia 8, 3, 610--621. Google Scholar
Digital Library
- Hei, X., Liang, C., Liang, J., Liu, Y., and Ross, K. W. 2007. A measurement study of a large-scale P2P IPTV system. IEEE Trans. Multimedia 9, 8, 1672--1687. Google Scholar
Digital Library
- Hernandez, E. A., Chidester, M. C., and George, A. D. 2001. Adaptive sampling for network management. J. Netw. Syst. Manage. 9, 4. Google Scholar
Digital Library
- Jannotti, J., Gifford, D. K., Johnson, K. L., Kaashoek, M. F., and O'Toole, J. W. 2000. Overcast: Reliable multicasting with an overlay network. In Proceedings of the USINEX Symposium on Operating Systems Design and Implementation (OSDI). 197--212. Google Scholar
Digital Library
- Jin, X., Chan, S.-H. G., Yiu, W.-P. K., Xiong, Y., and Zhang, Q. 2006a. Detecting malicious hosts in the presence of lying hosts in peer-to-peer streaming. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME). 1537--1540.Google Scholar
- Jin, X., Xia, Q., and Chan, S.-H. G. 2006b. Building a monitoring overlay for peer-to-peer streaming. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM).Google Scholar
- Jun, S., Ahamad, M., and Xu, J. 2005. Robust information dissemination in uncooperative environments. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). 293--302. Google Scholar
Digital Library
- Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the Conference on the World Wide Web (WWW). 640--651. Google Scholar
Digital Library
- KaZaa. http://www.kazaa.com.Google Scholar
- Knuth, D. E. 1998. The Art of Programming, Volume 3: Sorting and Searching 2nd Ed. Addison-Wesley. Google Scholar
Digital Library
- Lai, K., Feldman, M., Chuang, J., and Stoica, I. 2003. Incentives for cooperation in peer-to-peer networks. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems (P2PECON).Google Scholar
- Liu, J. and Zhou, M. 2006. Tree-assisted gossiping for overlay video distribution. Kluwer Multimedia Tools Appl. 29, 3, 211--232. Google Scholar
Digital Library
- Marti, S. and Garcia-Molina, H. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50, 40, 472--484. Google Scholar
Digital Library
- Mekouar, L., Iraqi, Y., and Boutaba, R. 2006. Peer-to-peer's most wanted: malicious peers. Comput. Netw. 50, 4, 545--562. Google Scholar
Digital Library
- Nielson, S., Crosby, S., and Wallach, D. 2005. A taxonomy of rational attacks. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS). Google Scholar
Digital Library
- Rodrigues, R. and Liskov, B. 2005. High availability in DHTs: Erasure coding vs. replication. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS). Google Scholar
Digital Library
- Rowstron, A. and Druschel, P. 2001. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP). 188--201. Google Scholar
Digital Library
- Sherwood, R., Lee, S., and Bhattacharjee, B. 2006. Cooperative peer groups in NICE. Comput. Netw. 50, 4, 523--544. Google Scholar
Digital Library
- Singh, A., Castro, M., Druschel, P., and Rowstron, A. 2004. Defending against Eclipse attacks on overlay networks. In Proceedings of the ACM Special Interest Group on Operating Systems European Workshops (SIGOPS EW). Google Scholar
Digital Library
- Singh, A. and Liu, L. 2003. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. In Proceedings of the IEEE Conference on Peer to Peer Computing (P2P). 142--149. Google Scholar
Digital Library
- SSL. Introduction to SSL, http://docs.sun.com/source/816-6156-10/contents.htm.Google Scholar
- Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM). 149--160. Google Scholar
Digital Library
- Tan, G. and Jarvis, S. A. 2006. A payment-based incentive and service differentiation mechanism for peer-to-peer streaming broadcast. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS). 41--50.Google Scholar
- Tang, Y., Luo, J.-G., Zhang, Q., Zhang, M., and Yang, S.-Q. 2007. Deploying P2P networks for large-scale live video-streaming service. IEEE Comm. Mag. 45, 6, 100--106. Google Scholar
Digital Library
- Tran, D. A., Hua, K. A., and Do, T. T. 2004. A peer-to-peer architecture for media streaming. IEEE J. Sel. Areas Commun. 22, 1, 121--133. Google Scholar
Digital Library
- Xiong, L. and Liu, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Know. Data Engin. 16, 7, 843--857. Google Scholar
Digital Library
- Zhang, B., Jamin, S., and Zhang, L. 2002. Host multicast: A framework for delivering multicast to end users. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 1366--1375.Google Scholar
- Zhang, X., Liu, J., Li, B., and Yum, T.-S. P. 2005. CoolStreaming/DONet: A data-driven overlay network for peer-to-peer live media streaming. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 2102--2111.Google Scholar
Index Terms
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring
Recommendations
Minimizing node churn in peer-to-peer streaming
Several peer-to-peer (P2P) streaming systems have proved by now their ability to deliver live video streams to hundreds of users. However the inherent instability of the distribution environment poses several obstacles for these systems to manage to ...
A framework for architecting peer-to-peer receiver-driven overlays
NOSSDAV '04: Proceedings of the 14th international workshop on Network and operating systems support for digital audio and videoThis paper presents a simple and scalable framework for architecting peer-to-peer overlays called Peer-to-peer Receiver-driven Overlay (or PRO). PRO is designed for non-interactive streaming applications and its primary design goal is to maximize ...
A Peer-to-Peer Streaming Overlay Construction for Low Diffusion Delay
ICNDC '10: Proceedings of the 2010 First International Conference on Networking and Distributed ComputingMesh-based overlay has emerged as a promising scalable solution for distributing live video stream, but it relies on random selections of neighbors, without optimizing the overlay by exploiting peer location and bandwidth, which leads to high delay ...






Comments