Diagnosis of Content Pollution in P2P Live Streaming Networks

Roverli P. Ziwich, Emanuel A. Schimidt, Elias P. Duarte Jr. and Ingrid Jansch-Pτrto
Proc. of the 6th Latin-American Symposium on Dependable Computing (LADC'2013),
pages 48-57, Rio de Janeiro, RJ, Brazil, 02-05 Apr. 2013.  [pdf]  


Content pollution is one of the challenges for massively deploying live streaming P2P networks in the Internet. As the peers themselves are responsible to retransmit data, there is no trivial solution to this problem. This work presents a new strategy to detect content pollution that employs comparison-based diagnosis to identify modifications on the data stream. A peer compares randomly selected chunks received from its neighbors. Based on the comparison results, peers that transmitted polluted content are identified. The proposed solution was implemented using Fireflies, a scalable and intrusion-tolerant overlay network. Experimental results show that the strategy represents a feasible solution to detect content pollution and causes a low overhead in terms of network bandwidth.


[1] A. Borges, J. Almeida, and S. Campos. Fighting Pollution in P2P Live Streaming Systems. Proc. of the IEEE Intl. Conf. on Multimedia and Expo (ICME'08), pages 481–484, 2008.

[2] A. Borges, P. Gomes, J. Nacif, R. Mantini, J. M. Almeida, and S. Campos. Characterizing SopCast Client Behavior. Computer Communications, 35(8):1004–1016, May 2012.

[3] R. Chen, E. K. Lua, J. Crowcroft, W. Guo, L. Tang, and Z. Chen. Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. Proc. of the 8th IEEE Intl. Conf. on Peer-to-Peer Computing (P2P'08), pages 22–29, 2008.

[4] N. Christin, A. S. Weigend, and J. Chuang. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks. Proc. of the 6th ACM Conf. on Electronic Commerce (EC'05), pages 68–77, 2005.

[5] R. V. Coelho, J. T. Pastro, R. S. Antunes, M. P. Barcellos, I. Jansch-Porto, and L. P. Gaspary. Challenging the Feasibility of Authentication Mechanisms for P2P Live Streaming. Proc. of the 6th Latin America Networking Conf. (LANC'2011), pages 55–63, 2011.

[6] H. Deshpande, M. Bawa, and H. Garcia-Molina. Streaming Live Media over a Peer-to-Peer Network. Technical Report, Stanford InfoLab, (2001-30), 2001.

[7] P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses. Proc. of the Workshop on Peer-to-peer Streaming and IP-TV (P2P-TV'07), pages 323–328, 2007.

[8] P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. Pollution in P2P Live Video Streaming. Intl. Journal of Computer Networks and Communications (IJCNC'09), 1(2), 2009.

[9] E. P. Duarte Jr., R. P. Ziwich, and L. C. P. Albini. A Survey of Comparison-Based System-Level Diagnosis. ACM Computing Surveys, 43(3):22:1–22:56, 2011.

[10] C. Feng and B. Li. On Large-Scale Peer-to-Peer Streaming Systems with Network Coding. ACM Multimedia (MM'2009), 2009.

[11] V. Fodor and G. Dan. Resilience in Live Peer-to-peer Streaming. IEEE Communications Magazine, 45(6), 2007.

[12] G. Gheorghe, R. L. Cigno, and A. Montresor. Security and Privacy Issues in P2P Streaming Systems: A Survey. Peer-to-Peer Networking and Applications, 4(2):75–91, 2010.

[13] M. Haridasan and R. van Renesse. SecureStream: An Intrusion-Tolerant Protocol for Live-Streaming Dissemination. Computer Communications, 31(3):185–192, Feb. 2008.

[14] H. Johansen, A. Allavena, and R. van Renesse. Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays. Proc. of the 1st ACM EuroSys., C-25, 2006.

[15] J.-S. Li, C.-J. Hsieh, and Y.-K.Wang. Distributed Key Management Scheme for Peer-to-Peer Live Streaming Services. Intl. Journal of Communication Systems, 2012.

[16] J. Liang, R. Kumar, and K.W. Ross. The FastTrack Overlay: A Measurement Study. Computer Networks, 2006.

[17] J. Liang, N. Naoumov, and K. W. Ross. Efficient Blacklisting and Pollution-Level Eestimation in P2P File-Sharing Systems. Proc of the Asian Internet Engineering Conf., pages 173–175, 2005.

[18] E. Lin, D.M. N. de Castro,M.Wang, and J. Aycock. SPoIM: A close Look at Pollution Attacks in P2P Live Streaming. Proc. of the 18th Intl. Workshop on Quality of Service (IWQoS'10), pages 1–9, 2010.

[19] T. Loocher, R. Meier, S. Schmid, and R. Wattenhofer. Push-to-Pull Peer-to-Peer Live Streaming. Proc. of the 21st Intl. Symp. on Distributed Computing (DISC'07), pages 388–402, 2007.

[20] M. Lu, P. P. C. Lee, and J. C. S. Lui. Identity Attack and Anonymity Protection for P2P-VoD Systems. Proc. of the ACM/IEEE Intl. Workshop on Quality of Service (IWQoS'2011), 2011.

[21] J.Maeng and M. Malek. A Comparison Connection Assignment for Self-Diagnosis of Multiprocessor Systems. Proc. of the 11th IEEE Fault-Tolerant Computing Symp., pages 173–175, 1981.

[22] G. Montassier, T. Cholez, G. Doyen, R. Khatoun, I. Chrisment, and O. Festor. Content Pollution Quantification in Large P2P Networks: A Measurement Study on KAD. Proc. of the IEEE Intl. Conf. on Peer-to-Peer Computing (P2P'2011), pages 30–33, 2011.

[23] J. Oliveira, A. Borges, and S. Campos. Content Pollution on P2P Live Streaming Systems. Proc. of the 15th Brazilian Symposium on Multimedia and the Web (WebMedia'09), 2009.

[24] V. Pai, K. Kumar, K. Tamilmani, V. Sambamurthy, A. E. Mohr, and E. E. Mohr. Chainsaw: Eliminating Trees from Overlay Multicast. Proc. of the 4th Intl. Workshop on Peer-To-Peer Systems (IPTPS'05), pages 127–140, 2005.

[25] K. Walsh and E. G. Sirer. Experience with an Object Reputation System for Peer-to-Peer Filesharing. Proc. of the 3rd USENIX Symp. on Networked Systems Design and Implementation (NSDI'06), 3, 2006.

[26] M. Wang and B. Li. Lava: A Reality Check of Network Coding in Peerto-Peer Live Streaming. Proc. of the 26th IEEE Intl. Conf. on Computer Communications (INFOCOM'2007), 2007.

[27] Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana. MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. Proc. of the 29th IEEE Intl. Conf. on Computer Communications (INFOCOM'2010), pages 1–5, 2010.

[28] C. K.Wong and S. S. Lam. Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. on Networking, 7(4):502–513, 1999.

[29] S. Yang, H. Jin, B. Li, X. Liao, H. Yao, and X. Tu. The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications. Proc. of the 37th Intl. Conf. on Parallel Processing (ICPP'08), pages 652–659, 2008.

[30] P. Zhang and B. E. Helvik. Modeling and Analysis of P2P Content Distribution under Coordinated Attack Strategies. Proc. of the IEEE Consumer Communications and Networking Conf. (CCNC'2011), pages 131–135, 2011.

[31] R. P. Ziwich, E. P. Duarte Jr., and L. C. P. Albini. Distributed Integrity Checking for System with Replicated Data. Proc. of the 11th IEEE Intl. Conf. on Parallel and Distributed Systems, pages 363–369, 2005.