skip to main content
research-article

DIP: Distributed Identification of Polluters in P2P Live Streaming

Published:17 April 2014Publication History
Skip Abstract Section

Abstract

Peer-to-peer live streaming applications are vulnerable to malicious actions of peers that deliberately modify data to decrease or prevent the fruition of the media (pollution attack). In this article we propose DIP, a fully distributed, accurate, and robust algorithm for the identification of polluters. DIP relies on checks that are computed by peers upon completing reception of all blocks composing a data chunk. A check is a special message that contains the set of peer identifiers that provided blocks of the chunk as well as a bit to signal if the chunk has been corrupted. Checks are periodically transmitted by peers to their neighbors in the overlay network; peers receiving checks use them to maintain a factor graph. This graph is bipartite and an incremental belief propagation algorithm is run on it to compute the probability of a peer being a polluter. Using a prototype deployed over PlanetLab we show by extensive experimentation that DIP allows honest peers to identify polluters with very high accuracy and completeness, even when polluters collude to deceive them. Furthermore, we show that DIP is efficient, requiring low computational, communication, and storage overhead at each peer.

References

  1. Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno. 2009. On the fly gaussian elimination for lt codes. IEEE Comm. Lett. 13, 2, 953--955.Google ScholarGoogle ScholarCross RefCross Ref
  2. Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno. 2009. On the fly gaussian elimination for lt codes. In Proceedings of the Workshop on Peer-to-Peer Streaming and IP-TV (P2P-TV'07). 323--328.Google ScholarGoogle ScholarCross RefCross Ref
  3. Alex Borges, Jussara Almeida, and Sergio Campos. 2008. Fighting pollution in P2P live streaming systems. In Proceedings of the IEEE International Conference on Multimedia and Expo. 481--484.Google ScholarGoogle ScholarCross RefCross Ref
  4. Jochen Dinger and Hannes Hartenstein. 2006. Defending the sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration. In Proceedings of the 1st IEEE International Conference on Availability, Reliability and Security (ARES'06). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rossano Gaeta and Marco Grangetto. 2013. Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique. IEEE Trans. Parallel Distrib. Syst. 24, 10, 1994--2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Christos Gkantsidis and Pablo Rodriguez. 2006. Cooperative security for network coding file distribution. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06).Google ScholarGoogle ScholarCross RefCross Ref
  7. Ruchir Gupta and Yatindra Nath Singh. 2013. Avoiding whitewashing in unstructured peer-to-peer resource sharing network. http://arxiv.org/abs/1307.5057Google ScholarGoogle Scholar
  8. Tracey Ho, Ben Leong, Ralf Koetter, Muriel Medard, Michelle Effros, and David R. Karger. 2008. Byzantine modification detection in multicast networks with random network coding. IEEE Trans. Inf. Theory 54, 6, 2798--2803. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gale Huang. 2007. PPLive: A practical P2P live system with huge amount of users. In Proceedings of the ACM SIGCOMM Workshop on Peer-to-Peer Streaming and IPTV Workshop.Google ScholarGoogle Scholar
  10. Sidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Medard, and Michelle Effros. 2008. Resilient network coding in the presence of byzantine adversaries. IEEE Trans. Inf. Theory 54, 6, 2596--2603. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xing Jin and Sheung-Han Gary Chan. 2010. Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring. ACM Trans. Multimedia Comput. Comm. Appl. 6, 2, 9:1--9:18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Elias Kehdi and Baochun Li. 2009. Null keys: Limiting malicious attacks via null space properties of network coding. In Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM'09).Google ScholarGoogle ScholarCross RefCross Ref
  13. Ralf Koetter and Frank R. Kschischang. 2008. Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 54, 8, 3579--3591. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Maxwell N. Krohn, Michael J. Freedman, and David Mazieres. 2004. On-the-fly verification of rateless erasure codes for efficient content distribution. In Proceedings of the IEEE Symposium on Security and Privacy.Google ScholarGoogle ScholarCross RefCross Ref
  15. Brian Neil Levine, Clay Shields, and N. Boris Margolin. 2006. A survey of solutions to the sybil attack. Tech. rep., University of Massachusetts Amherst. http://forensics.umass.edu/pubs/levine.sybil.tr.2006.pdf.Google ScholarGoogle Scholar
  16. Yongkun Li and John C. S. Lui. 2010. Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems. Perform. Eval. 67, 11, 1273--1288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jian Liang, Rakesh Kumar, Yongjian Xi, and Keith W. Ross. 2005. Pollution in P2P file sharing systems. In Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM'05). 1174--1185.Google ScholarGoogle Scholar
  18. Eric Lin, Daniel Medeiros Nunes de Castro, Mea Wang, and John Aycock. 2010. SPoIM: A close look at pollution attacks in P2P live streaming. In Proceedings of the 18th International Workshop on Quality of Service (IWQoS). 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  19. Michael Luby. 2002. LT codes. In Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS'02). 271--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. David J. C. MacKay. 2003. Information Theory, Inference and Learning Algorithms. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Andrea Magnetto, Rossano Gaeta, Marco Grangetto, and Matteo Sereno. 2010. P2P streaming with lt codes: A prototype experimentation. In Proceedings of the ACM Workshop on Advanced Video Streaming Techniques for Peer-to-Peer Networks and Social Networking (AVSTP2P'10). 7--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Thomas Silverston, Olivier Fourmaux, Alessio Botta, Alberto Dainotti, Antonio Pescape, Giorgio Ventre, and Kave Salamatian. 2009. Traffic analysis of peer-to-peer IPTV communities. Comput. Netw. 53, 4, 470--484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Alex Borges Vieira, Jussara Marques de Almeida, and Sergio Vale Aguiar Campos. 2012. SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming. Int. J. Comput. Telcomm. Netw. 57, 4, 1019--1036. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Qiyan Wang, Long Vu, Klara Nahrstedt, and Himanshu Khurana. 2010. MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming. In Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM'10). 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Yair Weiss and William T. Freeman. 2001. On the optimality of solutions of the max-product belief-propagation algorithm in arbitrary graphs. IEEE Trans. Inf. Theory 47, 2, 736--744. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jonathan S. Yedidia, William T. Freeman, and Yair Weiss. 2005. Constructing free-energy approximations and generalized belief propagation algorithms. IEEE Trans. Inf. Theory 51, 7, 2282--2312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, and Yong Guan. 2008. An efficient signature-based scheme for securing network coding against pollution attacks. In Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM'08). 1409--1417.Google ScholarGoogle ScholarCross RefCross Ref
  28. Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, and Yong Guan. 2009. An efficient scheme for securing XOR network coding against pollution attacks. In Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM'09).Google ScholarGoogle ScholarCross RefCross Ref
  29. Meng Zhang, Qian Zhang, Lifeng Sun, and Shiqiang Yang. 2007. Understanding the power of pull-based streaming protocol: Can we do better? IEEE J. Selected Areas Comm. 25, 9, 1678--1694. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Xinyan Zhang, Jiangchuan Liu, Bo Li, and Tak-Shing P. Yum. 2005. CoolStreaming/DONet: A data-driven overlay network for efficient live media streaming. In Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM'05). 13--17.Google ScholarGoogle Scholar

Index Terms

  1. DIP: Distributed Identification of Polluters in P2P Live Streaming

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!