Skip to main content
Erschienen in: Information Systems Frontiers 6/2017

28.04.2016

Adaptive approach to restraining content pollution in peer-to-peer networks

Erschienen in: Information Systems Frontiers | Ausgabe 6/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected content in an attempt to disrupt the system and waste network resources. When faced by such phenomenon, regular peers get discouraged from participating in the P2P network as they find less value in the system. In this work, we investigate the amount of resources required to restrain pollution attacks by means of content validation. We introduce multiple adaptive techniques that can minimize the spread of polluted content, while at the same time reduce the cost of content validation for peers participating in the network. Furthermore, the proposed pollution-restraint techniques are resistant to collusion from malicious peers, and they do not contribute to excessive communication overhead in the P2P network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
1 In this context, recent acquaintances of a local peer refer to remote peers with whom the local peer interacted recently (by uploading or downloading files to such peers).
 
Literatur
Zurück zum Zitat Bradai, A., Abbasi, U., Landa, R., & Ahmed, T. (2014). An efficient playout smoothing mechanism for layered streaming in P2P networks. Peer-to-Peer Networking and Applications, 7(2), 1936–6442.CrossRef Bradai, A., Abbasi, U., Landa, R., & Ahmed, T. (2014). An efficient playout smoothing mechanism for layered streaming in P2P networks. Peer-to-Peer Networking and Applications, 7(2), 1936–6442.CrossRef
Zurück zum Zitat Narang, P., & Hota, C. (2015). Game-theoretic strategies for IDS deployment in peer-to-peer networks. Information Systems Frontiers, 17(5), 1017–1028.CrossRef Narang, P., & Hota, C. (2015). Game-theoretic strategies for IDS deployment in peer-to-peer networks. Information Systems Frontiers, 17(5), 1017–1028.CrossRef
Zurück zum Zitat Hawa, M., Rahhal, J. S., & Abu-Al-Nadi, D. I. (2012). File size models for shared content over the BitTorrent peer-to-peer network. Peer-to-Peer Networking and Applications, 5(3), 279–291.CrossRef Hawa, M., Rahhal, J. S., & Abu-Al-Nadi, D. I. (2012). File size models for shared content over the BitTorrent peer-to-peer network. Peer-to-Peer Networking and Applications, 5(3), 279–291.CrossRef
Zurück zum Zitat Teng, H. -Y., Lin, C. -N., & Hwang, R. -H. (2014). A self-similar super-peer overlay construction scheme for super large-scale P2P applications. Information Systems Frontiers, 16(1), 45–58.CrossRef Teng, H. -Y., Lin, C. -N., & Hwang, R. -H. (2014). A self-similar super-peer overlay construction scheme for super large-scale P2P applications. Information Systems Frontiers, 16(1), 45–58.CrossRef
Zurück zum Zitat Wang, J., Shen, R., Ullrich, C., Luo, H., & Niu, C. (2010). Resisting free-riding behavior in BitTorrent. Future Generation Computer Systems, 26(8), 1285–1299.CrossRef Wang, J., Shen, R., Ullrich, C., Luo, H., & Niu, C. (2010). Resisting free-riding behavior in BitTorrent. Future Generation Computer Systems, 26(8), 1285–1299.CrossRef
Zurück zum Zitat Hou, L., Duan, H., & Wu, J. (2010). Distinguishing the master to defend DDos attack in peer-to-peer networks, IEEE International Conference on Computer and Information Technology, 1002–1008. Hou, L., Duan, H., & Wu, J. (2010). Distinguishing the master to defend DDos attack in peer-to-peer networks, IEEE International Conference on Computer and Information Technology, 1002–1008.
Zurück zum Zitat Hawa, M., Al-Zubi, R., Darabkh, K. A., & Al-Sukkar, G. (2013). On Combating Content Poisoning in Peer-to-Peer Networks, World Congress on Engineering, 1276–1280. Hawa, M., Al-Zubi, R., Darabkh, K. A., & Al-Sukkar, G. (2013). On Combating Content Poisoning in Peer-to-Peer Networks, World Congress on Engineering, 1276–1280.
Zurück zum Zitat Meng, X., & Cui, W. (2012). Research on the immune strategy for the polluted file propagation in structured P2P networks. Computers & Electrical Engineering, 38(2), 194–205.CrossRef Meng, X., & Cui, W. (2012). Research on the immune strategy for the polluted file propagation in structured P2P networks. Computers & Electrical Engineering, 38(2), 194–205.CrossRef
Zurück zum Zitat Yoshida, M., Ohzahata, S., Nakao, A., & Kawashima, K. (2010). Controlling file distribution in the share network through content poisoning, IEEE International Conference on Advanced Information Networking and Applications, 1004–1011. Yoshida, M., Ohzahata, S., Nakao, A., & Kawashima, K. (2010). Controlling file distribution in the share network through content poisoning, IEEE International Conference on Advanced Information Networking and Applications, 1004–1011.
Zurück zum Zitat Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. Journal of Network and Computer Applications, 35(1), 72–84.CrossRef Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. Journal of Network and Computer Applications, 35(1), 72–84.CrossRef
Zurück zum Zitat Wang, C. -H., & Chiu, C. -Y. (2011). Copyright protection in P2P networks by false pieces pollution, International Conference on Autonomic and Trusted Computing, 215–227. Wang, C. -H., & Chiu, C. -Y. (2011). Copyright protection in P2P networks by false pieces pollution, International Conference on Autonomic and Trusted Computing, 215–227.
Zurück zum Zitat Montassier, G., Cholez, T., Doyen, G., Khatoun, R., Chrisment, I., & Festor, O. (2011). Content pollution quantification in large P2P networks: A measurement study on KAD, IEEE International Conference on Peer-to-Peer Computing, 30–33. Montassier, G., Cholez, T., Doyen, G., Khatoun, R., Chrisment, I., & Festor, O. (2011). Content pollution quantification in large P2P networks: A measurement study on KAD, IEEE International Conference on Peer-to-Peer Computing, 30–33.
Zurück zum Zitat Peiqing, Z., & Helvik, B.E. (2011). Modeling and analysis of P2P content distribution under coordinated attack strategies, IEEE Consumer Communications and Networking Conference, 131—135. Peiqing, Z., & Helvik, B.E. (2011). Modeling and analysis of P2P content distribution under coordinated attack strategies, IEEE Consumer Communications and Networking Conference, 131—135.
Zurück zum Zitat Kong, J., Cai, W., & Wang, L. (2010). The Evaluation of index poisoning in BitTorrent, International Conference on Communication Software and Networks, 382–386. Kong, J., Cai, W., & Wang, L. (2010). The Evaluation of index poisoning in BitTorrent, International Conference on Communication Software and Networks, 382–386.
Zurück zum Zitat Rodriguez, P., Tan, S. M., & Gkantsidis, C. (2006). On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review, 36(1), 75–78.CrossRef Rodriguez, P., Tan, S. M., & Gkantsidis, C. (2006). On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review, 36(1), 75–78.CrossRef
Zurück zum Zitat Liao, J., Yang, D., Li, T., Wang, J., Qi, Q., & Zhu, X. (2014). A scalable approach for content based image retrieval in cloud datacenter. Information Systems Frontiers, 16(1), 129–141.CrossRef Liao, J., Yang, D., Li, T., Wang, J., Qi, Q., & Zhu, X. (2014). A scalable approach for content based image retrieval in cloud datacenter. Information Systems Frontiers, 16(1), 129–141.CrossRef
Zurück zum Zitat Kreitz, G., & Niemela, F. (2010). Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming, IEEE International Conference on Peer-to-Peer Computing, 1–10. Kreitz, G., & Niemela, F. (2010). Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming, IEEE International Conference on Peer-to-Peer Computing, 1–10.
Zurück zum Zitat Aurelius, A., Lagerstedt, C., & Kihl, M. (2011). Streaming media over the Internet: Flow based analysis in live access networks, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 1–6. Aurelius, A., Lagerstedt, C., & Kihl, M. (2011). Streaming media over the Internet: Flow based analysis in live access networks, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 1–6.
Zurück zum Zitat Toka, L., Cataldi, P., Dell’Amico, M., & Michiardi, P. (2012). Redundancy management for P2P backup, IEEE INFOCOM, 2986–2990. Toka, L., Cataldi, P., Dell’Amico, M., & Michiardi, P. (2012). Redundancy management for P2P backup, IEEE INFOCOM, 2986–2990.
Zurück zum Zitat Min, Z., Changjia, C., & Jinkang, J. (2008). Fake servers in EDonkey networks, International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 29:1–29:7. Min, Z., Changjia, C., & Jinkang, J. (2008). Fake servers in EDonkey networks, International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 29:1–29:7.
Zurück zum Zitat Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., & Rejaie, R. (2010). Is content publishing in BitTorrent altruistic or profit-driven? International Conference on Emerging Networking Experiments and Technologies, 11:1–11:12. Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., & Rejaie, R. (2010). Is content publishing in BitTorrent altruistic or profit-driven? International Conference on Emerging Networking Experiments and Technologies, 11:1–11:12.
Zurück zum Zitat Dhungel, P., Hei, X., Ross, K.W., & Saxena, N. (2007). The pollution attack in P2P live video streaming: measurement results and defenses, Workshop on Peer-to-peer Streaming and IP-TV, 323–328. Dhungel, P., Hei, X., Ross, K.W., & Saxena, N. (2007). The pollution attack in P2P live video streaming: measurement results and defenses, Workshop on Peer-to-peer Streaming and IP-TV, 323–328.
Zurück zum Zitat Wu, Y., & Deng, R. H. (2012). A pollution attack to public-key watermarking schemes, IEEE International Conference on Multimedia and Expo, 230–235. Wu, Y., & Deng, R. H. (2012). A pollution attack to public-key watermarking schemes, IEEE International Conference on Multimedia and Expo, 230–235.
Zurück zum Zitat Ormandi, R., Hegedus, I., Csernai, K., & Jelasity, M. (2010). Towards inferring ratings from user behavior in BitTorrent communities, IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, 217– 222. Ormandi, R., Hegedus, I., Csernai, K., & Jelasity, M. (2010). Towards inferring ratings from user behavior in BitTorrent communities, IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, 217– 222.
Zurück zum Zitat Shang-Fu, G., & Jian-Lei, Z. (2012). A survey of reputation and trust mechanism in peer-to-peer network, International Conference on Industrial Control and Electronics Engineering, 116– 119. Shang-Fu, G., & Jian-Lei, Z. (2012). A survey of reputation and trust mechanism in peer-to-peer network, International Conference on Industrial Control and Electronics Engineering, 116– 119.
Zurück zum Zitat Chu, X., Chen, X., Zhao, K., & Liu, J. (2010). Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems, 44(3-4), 191–203.CrossRef Chu, X., Chen, X., Zhao, K., & Liu, J. (2010). Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems, 44(3-4), 191–203.CrossRef
Zurück zum Zitat Hawa, M., As-Sayid-Ahmad, L., & Khalaf, L. D. (2013). On enhancing reputation management using peer-to-peer interaction history. Peer-to-Peer Networking and Applications, 6(1), 101– 113.CrossRef Hawa, M., As-Sayid-Ahmad, L., & Khalaf, L. D. (2013). On enhancing reputation management using peer-to-peer interaction history. Peer-to-Peer Networking and Applications, 6(1), 101– 113.CrossRef
Zurück zum Zitat Barcellos, M. P., Gaspary, L. P., da Costa Cordeiro, W. L., & Antunes, R. S. (2011). A conservative strategy to protect P2P file sharing systems from pollution attacks. Concurrency Computation: Practice and Experience, 23 (1), 117–141.CrossRef Barcellos, M. P., Gaspary, L. P., da Costa Cordeiro, W. L., & Antunes, R. S. (2011). A conservative strategy to protect P2P file sharing systems from pollution attacks. Concurrency Computation: Practice and Experience, 23 (1), 117–141.CrossRef
Zurück zum Zitat Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., & Su, Z. (2012). Behavior-based reputation management in P2P file-sharing networks. Journal of Computer and System Sciences, 78(6), 1737–1750.CrossRef Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., & Su, Z. (2012). Behavior-based reputation management in P2P file-sharing networks. Journal of Computer and System Sciences, 78(6), 1737–1750.CrossRef
Zurück zum Zitat Centeno, R., Hermoso, R., & Fasli, M. (2014). On the inaccuracy of numerical ratings: dealing with biased opinions in social networks. Information Systems Frontiers, 17(4), 809– 825.CrossRef Centeno, R., Hermoso, R., & Fasli, M. (2014). On the inaccuracy of numerical ratings: dealing with biased opinions in social networks. Information Systems Frontiers, 17(4), 809– 825.CrossRef
Zurück zum Zitat Liu, H., Ma, C., & Walshe, R. (2013). An adaptive membership protocol against Sybil attack in unstructured P2P networks, IET International Conference on Information and Communications Technologies, 29–34. Liu, H., Ma, C., & Walshe, R. (2013). An adaptive membership protocol against Sybil attack in unstructured P2P networks, IET International Conference on Information and Communications Technologies, 29–34.
Zurück zum Zitat Saini, N. K., Sihag, V. K., & Yadav, R.C. (2014). A reactive approach for detection of collusion attacks in P2P trust and reputation systems. IEEE International Advance Computing Conference, 312–317. Saini, N. K., Sihag, V. K., & Yadav, R.C. (2014). A reactive approach for detection of collusion attacks in P2P trust and reputation systems. IEEE International Advance Computing Conference, 312–317.
Zurück zum Zitat Shafiee Sarjaz, B., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications, 6(1), 86–100.CrossRef Shafiee Sarjaz, B., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications, 6(1), 86–100.CrossRef
Zurück zum Zitat Wang, Y., Yun, X., & Yifei, L (2007). Analyzing the characteristics of gnutella overlays, International Conference on Information Technology, 1095–1100. Wang, Y., Yun, X., & Yifei, L (2007). Analyzing the characteristics of gnutella overlays, International Conference on Information Technology, 1095–1100.
Metadaten
Titel
Adaptive approach to restraining content pollution in peer-to-peer networks
Publikationsdatum
28.04.2016
Erschienen in
Information Systems Frontiers / Ausgabe 6/2017
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-016-9651-0

Weitere Artikel der Ausgabe 6/2017

Information Systems Frontiers 6/2017 Zur Ausgabe