skip to main content
research-article

Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring

Published:23 March 2010Publication History
Skip Abstract Section

Abstract

Current peer-to-peer (P2P) streaming systems often assume that nodes cooperate to upload and download data. However, in the open environment of the Internet, this is not necessarily true and there exist malicious nodes in the system. In this article, we study malicious actions of nodes that can be detected through peer-based monitoring. We require each node to monitor the data received and to periodically send monitoring messages about its neighbors to some trustworthy nodes. To efficiently store and search messages among multiple trustworthy nodes, we organize trustworthy nodes into a threaded binary tree. Trustworthy nodes also dynamically redistribute monitoring messages among themselves to achieve load balancing. Our simulation results show that this scheme can efficiently detect malicious nodes with high accuracy, and that the dynamic redistribution method can achieve good load balancing among trustworthy nodes.

References

  1. Aberer, K. and Despotovic, Z. 2001. Managing trust in a peer-2-peer information system. In Proceedings of the ACM Conference on Information and Knowledge Management (CIKM). 310--317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adar, E. and Huberman, B. A. 2000. Free riding on Gnutella. Tech. rep., HP. http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf.Google ScholarGoogle Scholar
  3. Banerjee, S., Bhattacharjee, B., and Kommareddy, C. 2002. Scalable application layer multicast. In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM). 205--217. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chen, R. and Yeager, B. 2001. Poblano: A distributed trust model for peer-to-peer networks. Tech. rep. SUN Microsystems.Google ScholarGoogle Scholar
  5. Chu, Y. H., Rao, S., Seshan, S., and Zhang, H. 2002. A case for end system multicast. IEEE J. Sel. Areas Commun. 20, 8, 1456--1471. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. 2001. Introduction to Algorithms. MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cornelli, F., Damiani, E., Vimercati, S., Paraboschi, S., and Samarati, P. 2002. Choosing reputable servents in a P2P network. In Proceedings of the Conference on the World Wide Web (WWW). 376--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P., and Violante, F. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS). 207--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Deering, S. E. 1988. Multicast routing in internetworks and extended LANs. ACM SIGCOMM CCR '18, 4, 55--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Do, T., Hua, K. A., and Tantaoui, M. 2004. P2VoD: Providing fault tolerant video-on-demand streaming in peer-to-peer environment. In Proceedings of the IEEE International Communications Conference (ICC). 1467--1472.Google ScholarGoogle Scholar
  11. Dragovic, B., Kotsovinos, E., Hand, S., and Pietzuch, P. 2003. XenoTrust: Event-based distributed trust management. In Proceedings of the International Conference on Database and Expert Systems (DEXA). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Guo, Y., Suh, K., Kurose, J., and Towsley, D. 2003. P2Cast: Peer-to-peer patching scheme for VoD service. In Proceedings of the Conference on the World Wide Web (WWW). 301--309. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Habib, A. and Chuang, J. 2006. Service differentiated peer selection: An incentive mechanism for peer-to-peer media streaming. IEEE Trans. Multimedia 8, 3, 610--621. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hei, X., Liang, C., Liang, J., Liu, Y., and Ross, K. W. 2007. A measurement study of a large-scale P2P IPTV system. IEEE Trans. Multimedia 9, 8, 1672--1687. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hernandez, E. A., Chidester, M. C., and George, A. D. 2001. Adaptive sampling for network management. J. Netw. Syst. Manage. 9, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jannotti, J., Gifford, D. K., Johnson, K. L., Kaashoek, M. F., and O'Toole, J. W. 2000. Overcast: Reliable multicasting with an overlay network. In Proceedings of the USINEX Symposium on Operating Systems Design and Implementation (OSDI). 197--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jin, X., Chan, S.-H. G., Yiu, W.-P. K., Xiong, Y., and Zhang, Q. 2006a. Detecting malicious hosts in the presence of lying hosts in peer-to-peer streaming. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME). 1537--1540.Google ScholarGoogle Scholar
  18. Jin, X., Xia, Q., and Chan, S.-H. G. 2006b. Building a monitoring overlay for peer-to-peer streaming. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM).Google ScholarGoogle Scholar
  19. Jun, S., Ahamad, M., and Xu, J. 2005. Robust information dissemination in uncooperative environments. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). 293--302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the Conference on the World Wide Web (WWW). 640--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. KaZaa. http://www.kazaa.com.Google ScholarGoogle Scholar
  22. Knuth, D. E. 1998. The Art of Programming, Volume 3: Sorting and Searching 2nd Ed. Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lai, K., Feldman, M., Chuang, J., and Stoica, I. 2003. Incentives for cooperation in peer-to-peer networks. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems (P2PECON).Google ScholarGoogle Scholar
  24. Liu, J. and Zhou, M. 2006. Tree-assisted gossiping for overlay video distribution. Kluwer Multimedia Tools Appl. 29, 3, 211--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Marti, S. and Garcia-Molina, H. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50, 40, 472--484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Mekouar, L., Iraqi, Y., and Boutaba, R. 2006. Peer-to-peer's most wanted: malicious peers. Comput. Netw. 50, 4, 545--562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Nielson, S., Crosby, S., and Wallach, D. 2005. A taxonomy of rational attacks. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Rodrigues, R. and Liskov, B. 2005. High availability in DHTs: Erasure coding vs. replication. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Rowstron, A. and Druschel, P. 2001. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP). 188--201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Sherwood, R., Lee, S., and Bhattacharjee, B. 2006. Cooperative peer groups in NICE. Comput. Netw. 50, 4, 523--544. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Singh, A., Castro, M., Druschel, P., and Rowstron, A. 2004. Defending against Eclipse attacks on overlay networks. In Proceedings of the ACM Special Interest Group on Operating Systems European Workshops (SIGOPS EW). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Singh, A. and Liu, L. 2003. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. In Proceedings of the IEEE Conference on Peer to Peer Computing (P2P). 142--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. SSL. Introduction to SSL, http://docs.sun.com/source/816-6156-10/contents.htm.Google ScholarGoogle Scholar
  34. Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM). 149--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Tan, G. and Jarvis, S. A. 2006. A payment-based incentive and service differentiation mechanism for peer-to-peer streaming broadcast. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS). 41--50.Google ScholarGoogle Scholar
  36. Tang, Y., Luo, J.-G., Zhang, Q., Zhang, M., and Yang, S.-Q. 2007. Deploying P2P networks for large-scale live video-streaming service. IEEE Comm. Mag. 45, 6, 100--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Tran, D. A., Hua, K. A., and Do, T. T. 2004. A peer-to-peer architecture for media streaming. IEEE J. Sel. Areas Commun. 22, 1, 121--133. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Xiong, L. and Liu, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Know. Data Engin. 16, 7, 843--857. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Zhang, B., Jamin, S., and Zhang, L. 2002. Host multicast: A framework for delivering multicast to end users. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 1366--1375.Google ScholarGoogle Scholar
  40. Zhang, X., Liu, J., Li, B., and Yum, T.-S. P. 2005. CoolStreaming/DONet: A data-driven overlay network for peer-to-peer live media streaming. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 2102--2111.Google ScholarGoogle Scholar

Index Terms

  1. Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Multimedia Computing, Communications, and Applications
            ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 6, Issue 2
            March 2010
            119 pages
            ISSN:1551-6857
            EISSN:1551-6865
            DOI:10.1145/1671962
            Issue’s Table of Contents

            Copyright © 2010 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 23 March 2010
            • Revised: 1 January 2009
            • Accepted: 1 January 2009
            • Received: 1 September 2008
            Published in tomm Volume 6, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!