Abstract
Peer-to-peer live streaming applications are vulnerable to malicious actions of peers that deliberately modify data to decrease or prevent the fruition of the media (pollution attack). In this article we propose DIP, a fully distributed, accurate, and robust algorithm for the identification of polluters. DIP relies on checks that are computed by peers upon completing reception of all blocks composing a data chunk. A check is a special message that contains the set of peer identifiers that provided blocks of the chunk as well as a bit to signal if the chunk has been corrupted. Checks are periodically transmitted by peers to their neighbors in the overlay network; peers receiving checks use them to maintain a factor graph. This graph is bipartite and an incremental belief propagation algorithm is run on it to compute the probability of a peer being a polluter. Using a prototype deployed over PlanetLab we show by extensive experimentation that DIP allows honest peers to identify polluters with very high accuracy and completeness, even when polluters collude to deceive them. Furthermore, we show that DIP is efficient, requiring low computational, communication, and storage overhead at each peer.
- Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno. 2009. On the fly gaussian elimination for lt codes. IEEE Comm. Lett. 13, 2, 953--955.Google Scholar
Cross Ref
- Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno. 2009. On the fly gaussian elimination for lt codes. In Proceedings of the Workshop on Peer-to-Peer Streaming and IP-TV (P2P-TV'07). 323--328.Google Scholar
Cross Ref
- Alex Borges, Jussara Almeida, and Sergio Campos. 2008. Fighting pollution in P2P live streaming systems. In Proceedings of the IEEE International Conference on Multimedia and Expo. 481--484.Google Scholar
Cross Ref
- Jochen Dinger and Hannes Hartenstein. 2006. Defending the sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration. In Proceedings of the 1st IEEE International Conference on Availability, Reliability and Security (ARES'06). Google Scholar
Digital Library
- Rossano Gaeta and Marco Grangetto. 2013. Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique. IEEE Trans. Parallel Distrib. Syst. 24, 10, 1994--2003. Google Scholar
Digital Library
- Christos Gkantsidis and Pablo Rodriguez. 2006. Cooperative security for network coding file distribution. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06).Google Scholar
Cross Ref
- Ruchir Gupta and Yatindra Nath Singh. 2013. Avoiding whitewashing in unstructured peer-to-peer resource sharing network. http://arxiv.org/abs/1307.5057Google Scholar
- Tracey Ho, Ben Leong, Ralf Koetter, Muriel Medard, Michelle Effros, and David R. Karger. 2008. Byzantine modification detection in multicast networks with random network coding. IEEE Trans. Inf. Theory 54, 6, 2798--2803. Google Scholar
Digital Library
- Gale Huang. 2007. PPLive: A practical P2P live system with huge amount of users. In Proceedings of the ACM SIGCOMM Workshop on Peer-to-Peer Streaming and IPTV Workshop.Google Scholar
- Sidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Medard, and Michelle Effros. 2008. Resilient network coding in the presence of byzantine adversaries. IEEE Trans. Inf. Theory 54, 6, 2596--2603. Google Scholar
Digital Library
- Xing Jin and Sheung-Han Gary Chan. 2010. Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring. ACM Trans. Multimedia Comput. Comm. Appl. 6, 2, 9:1--9:18. Google Scholar
Digital Library
- Elias Kehdi and Baochun Li. 2009. Null keys: Limiting malicious attacks via null space properties of network coding. In Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM'09).Google Scholar
Cross Ref
- Ralf Koetter and Frank R. Kschischang. 2008. Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 54, 8, 3579--3591. Google Scholar
Digital Library
- Maxwell N. Krohn, Michael J. Freedman, and David Mazieres. 2004. On-the-fly verification of rateless erasure codes for efficient content distribution. In Proceedings of the IEEE Symposium on Security and Privacy.Google Scholar
Cross Ref
- Brian Neil Levine, Clay Shields, and N. Boris Margolin. 2006. A survey of solutions to the sybil attack. Tech. rep., University of Massachusetts Amherst. http://forensics.umass.edu/pubs/levine.sybil.tr.2006.pdf.Google Scholar
- Yongkun Li and John C. S. Lui. 2010. Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems. Perform. Eval. 67, 11, 1273--1288. Google Scholar
Digital Library
- Jian Liang, Rakesh Kumar, Yongjian Xi, and Keith W. Ross. 2005. Pollution in P2P file sharing systems. In Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM'05). 1174--1185.Google Scholar
- Eric Lin, Daniel Medeiros Nunes de Castro, Mea Wang, and John Aycock. 2010. SPoIM: A close look at pollution attacks in P2P live streaming. In Proceedings of the 18th International Workshop on Quality of Service (IWQoS). 1--9.Google Scholar
Cross Ref
- Michael Luby. 2002. LT codes. In Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS'02). 271--280. Google Scholar
Digital Library
- David J. C. MacKay. 2003. Information Theory, Inference and Learning Algorithms. Cambridge University Press. Google Scholar
Digital Library
- Andrea Magnetto, Rossano Gaeta, Marco Grangetto, and Matteo Sereno. 2010. P2P streaming with lt codes: A prototype experimentation. In Proceedings of the ACM Workshop on Advanced Video Streaming Techniques for Peer-to-Peer Networks and Social Networking (AVSTP2P'10). 7--12. Google Scholar
Digital Library
- Thomas Silverston, Olivier Fourmaux, Alessio Botta, Alberto Dainotti, Antonio Pescape, Giorgio Ventre, and Kave Salamatian. 2009. Traffic analysis of peer-to-peer IPTV communities. Comput. Netw. 53, 4, 470--484. Google Scholar
Digital Library
- Alex Borges Vieira, Jussara Marques de Almeida, and Sergio Vale Aguiar Campos. 2012. SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming. Int. J. Comput. Telcomm. Netw. 57, 4, 1019--1036. Google Scholar
Digital Library
- Qiyan Wang, Long Vu, Klara Nahrstedt, and Himanshu Khurana. 2010. MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming. In Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM'10). 1--5. Google Scholar
Digital Library
- Yair Weiss and William T. Freeman. 2001. On the optimality of solutions of the max-product belief-propagation algorithm in arbitrary graphs. IEEE Trans. Inf. Theory 47, 2, 736--744. Google Scholar
Digital Library
- Jonathan S. Yedidia, William T. Freeman, and Yair Weiss. 2005. Constructing free-energy approximations and generalized belief propagation algorithms. IEEE Trans. Inf. Theory 51, 7, 2282--2312. Google Scholar
Digital Library
- Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, and Yong Guan. 2008. An efficient signature-based scheme for securing network coding against pollution attacks. In Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM'08). 1409--1417.Google Scholar
Cross Ref
- Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, and Yong Guan. 2009. An efficient scheme for securing XOR network coding against pollution attacks. In Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM'09).Google Scholar
Cross Ref
- Meng Zhang, Qian Zhang, Lifeng Sun, and Shiqiang Yang. 2007. Understanding the power of pull-based streaming protocol: Can we do better? IEEE J. Selected Areas Comm. 25, 9, 1678--1694. Google Scholar
Digital Library
- Xinyan Zhang, Jiangchuan Liu, Bo Li, and Tak-Shing P. Yum. 2005. CoolStreaming/DONet: A data-driven overlay network for efficient live media streaming. In Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM'05). 13--17.Google Scholar
Index Terms
DIP: Distributed Identification of Polluters in P2P Live Streaming
Recommendations
Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique
Peer-to-peer streaming has witnessed a great success thanks to the possibility of aggregating resources from all participants. Nevertheless, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus ...
A Case Study of Traffic Locality in Internet P2P Live Streaming Systems
ICDCS '09: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing SystemsWith the ever-increasing P2P Internet traffic, recently much attention has been paid to the topology mismatch between the P2P overlay and the underlying network due to the large amount of cross-ISP traffic. Mainly focusing on BitTorrent-like file ...
Adaptive approach to restraining content pollution in peer-to-peer networks
Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected content in an attempt to disrupt the system and waste network resources. When ...






Comments