pages 48-57, Rio de Janeiro, RJ, Brazil, 02-05 Apr. 2013. [pdf]
Content pollution is one of the challenges for massively deploying live streaming P2P networks in the Internet. As the peers themselves are responsible to retransmit data, there is no trivial solution to this problem. This work presents a new strategy to detect content pollution that employs comparison-based diagnosis to identify modifications on the data stream. A peer compares randomly selected chunks received from its neighbors. Based on the comparison results, peers that transmitted polluted content are identified. The proposed solution was implemented using Fireflies, a scalable and intrusion-tolerant overlay network. Experimental results show that the strategy represents a feasible solution to detect content pollution and causes a low overhead in terms of network bandwidth.
[1] A. Borges, J. Almeida, and S. Campos. Fighting Pollution in P2P Live Streaming Systems. Proc. of the IEEE Intl. Conf. on Multimedia and Expo (ICME'08), pages 481484, 2008.
[2] A. Borges, P. Gomes, J. Nacif, R. Mantini, J. M. Almeida, and S. Campos. Characterizing SopCast Client Behavior. Computer Communications, 35(8):10041016, May 2012.
[3] R. Chen, E. K. Lua, J. Crowcroft, W. Guo, L. Tang, and Z. Chen. Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks. Proc. of the 8th IEEE Intl. Conf. on Peer-to-Peer Computing (P2P'08), pages 2229, 2008.
[4] N. Christin, A. S. Weigend, and J. Chuang. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks. Proc. of the 6th ACM Conf. on Electronic Commerce (EC'05), pages 6877, 2005.
[5] R. V. Coelho, J. T. Pastro, R. S. Antunes, M. P. Barcellos, I. Jansch-Porto, and L. P. Gaspary. Challenging the Feasibility of Authentication Mechanisms for P2P Live Streaming. Proc. of the 6th Latin America Networking Conf. (LANC'2011), pages 5563, 2011.
[6] H. Deshpande, M. Bawa, and H. Garcia-Molina. Streaming Live Media over a Peer-to-Peer Network. Technical Report, Stanford InfoLab, (2001-30), 2001.
[7] P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses. Proc. of the Workshop on Peer-to-peer Streaming and IP-TV (P2P-TV'07), pages 323328, 2007.
[8] P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. Pollution in P2P Live Video Streaming. Intl. Journal of Computer Networks and Communications (IJCNC'09), 1(2), 2009.
[9] E. P. Duarte Jr., R. P. Ziwich, and L. C. P. Albini. A Survey of Comparison-Based System-Level Diagnosis. ACM Computing Surveys, 43(3):22:122:56, 2011.
[10] C. Feng and B. Li. On Large-Scale Peer-to-Peer Streaming Systems with Network Coding. ACM Multimedia (MM'2009), 2009.
[11] V. Fodor and G. Dan. Resilience in Live Peer-to-peer Streaming. IEEE Communications Magazine, 45(6), 2007.
[12] G. Gheorghe, R. L. Cigno, and A. Montresor. Security and Privacy Issues in P2P Streaming Systems: A Survey. Peer-to-Peer Networking and Applications, 4(2):7591, 2010.
[13] M. Haridasan and R. van Renesse. SecureStream: An Intrusion-Tolerant Protocol for Live-Streaming Dissemination. Computer Communications, 31(3):185192, Feb. 2008.
[14] H. Johansen, A. Allavena, and R. van Renesse. Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays. Proc. of the 1st ACM EuroSys., C-25, 2006.
[15] J.-S. Li, C.-J. Hsieh, and Y.-K.Wang. Distributed Key Management Scheme for Peer-to-Peer Live Streaming Services. Intl. Journal of Communication Systems, 2012.
[16] J. Liang, R. Kumar, and K.W. Ross. The FastTrack Overlay: A Measurement Study. Computer Networks, 2006.
[17] J. Liang, N. Naoumov, and K. W. Ross. Efficient Blacklisting and Pollution-Level Eestimation in P2P File-Sharing Systems. Proc of the Asian Internet Engineering Conf., pages 173175, 2005.
[18] E. Lin, D.M. N. de Castro,M.Wang, and J. Aycock. SPoIM: A close Look at Pollution Attacks in P2P Live Streaming. Proc. of the 18th Intl. Workshop on Quality of Service (IWQoS'10), pages 19, 2010.
[19] T. Loocher, R. Meier, S. Schmid, and R. Wattenhofer. Push-to-Pull Peer-to-Peer Live Streaming. Proc. of the 21st Intl. Symp. on Distributed Computing (DISC'07), pages 388402, 2007.
[20] M. Lu, P. P. C. Lee, and J. C. S. Lui. Identity Attack and Anonymity Protection for P2P-VoD Systems. Proc. of the ACM/IEEE Intl. Workshop on Quality of Service (IWQoS'2011), 2011.
[21] J.Maeng and M. Malek. A Comparison Connection Assignment for Self-Diagnosis of Multiprocessor Systems. Proc. of the 11th IEEE Fault-Tolerant Computing Symp., pages 173175, 1981.
[22] G. Montassier, T. Cholez, G. Doyen, R. Khatoun, I. Chrisment, and O. Festor. Content Pollution Quantification in Large P2P Networks: A Measurement Study on KAD. Proc. of the IEEE Intl. Conf. on Peer-to-Peer Computing (P2P'2011), pages 3033, 2011.
[23] J. Oliveira, A. Borges, and S. Campos. Content Pollution on P2P Live Streaming Systems. Proc. of the 15th Brazilian Symposium on Multimedia and the Web (WebMedia'09), 2009.
[24] V. Pai, K. Kumar, K. Tamilmani, V. Sambamurthy, A. E. Mohr, and E. E. Mohr. Chainsaw: Eliminating Trees from Overlay Multicast. Proc. of the 4th Intl. Workshop on Peer-To-Peer Systems (IPTPS'05), pages 127140, 2005.
[25] K. Walsh and E. G. Sirer. Experience with an Object Reputation System for Peer-to-Peer Filesharing. Proc. of the 3rd USENIX Symp. on Networked Systems Design and Implementation (NSDI'06), 3, 2006.
[26] M. Wang and B. Li. Lava: A Reality Check of Network Coding in Peerto-Peer Live Streaming. Proc. of the 26th IEEE Intl. Conf. on Computer Communications (INFOCOM'2007), 2007.
[27] Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana. MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. Proc. of the 29th IEEE Intl. Conf. on Computer Communications (INFOCOM'2010), pages 15, 2010.
[28] C. K.Wong and S. S. Lam. Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. on Networking, 7(4):502513, 1999.
[29] S. Yang, H. Jin, B. Li, X. Liao, H. Yao, and X. Tu. The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications. Proc. of the 37th Intl. Conf. on Parallel Processing (ICPP'08), pages 652659, 2008.
[30] P. Zhang and B. E. Helvik. Modeling and Analysis of P2P Content Distribution under Coordinated Attack Strategies. Proc. of the IEEE Consumer Communications and Networking Conf. (CCNC'2011), pages 131135, 2011.
[31] R. P. Ziwich, E. P. Duarte Jr., and L. C. P. Albini. Distributed Integrity Checking for System with Replicated Data. Proc. of the 11th IEEE Intl. Conf. on Parallel and Distributed Systems, pages 363369, 2005.