Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2011

01.09.2011

Attack resilient P2P dissemination of RSS feed

verfasst von: Xin Liu, Anwitaman Datta

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

RSS (really simple syndication) based feeds have become the defacto mechanism of web based publish subscribe. Peer-to-Peer delivery of such feeds can not only alleviate the load at the content server, but also reduce the dissemination latency. However, due to openness of P2P system, malicious peers can join the network as easily as normal peers do. Such malicious peers may pretend to relay but actually not, and thus deny service, or even disseminate counterfeit updates, rendering a Peer-to-Peer mechanism not only useless, but even harmful (e.g. by false updates). We propose overlay independent randomized strategies to mitigate these ill-effects of malicious peers at a marginal overhead, thus enjoying the benefits of Peer-to-Peer dissemination, along with the assurance of content integrity in RSS like web-based publish-subscribe applications without altering currently deployed server infrastructure. We conduct analysis of performance of our proposal by modeling behavior of the system and validating the same with simulation. Results show that our proposal is effective, robust and scalable.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Despite the obvious drawbacks of the current system, and numerous criticisms and discussions, there has been no change for years.
 
2
A PKI may be desirable to prevent Sybil identity [8] based denial of service attacks. Particularly, a malicious peer, once exposed, may chose to discard its current identity and assume a new one. However, peers who have found good peers upstream do not change their peering relationship. Thus malicious peers do/can not affect good peers which have only good peers upstream. Sybil attacks in general are fatal to all P2P systems, but thwarting Sybil attacks is a problem in its own right and is out of the scope of this paper.
 
3
We refer to a peer’s immediate upstream peer as its parent and its immediate downstream peers as its children.
 
4
Updates may also be missed simply because of communication problems, or because the intermediate peer failed temporarily. The chained message helps dealing with such inadvertent missed updates.
 
5
A downstream peer may have multiple upstream non-relaying peers due to uniform distribution of non-relaying peers.
 
6
There are two caveats in this argument. First of all, the probes should be indeed at random peers. This is a task of the “Oracle”, and hence an orthogonal issue, nevertheless it is of practical concern, and is a non-trivial problem in itself [11]. Secondly, in this current work we assume malicious peers act independently. However, they may collude together, so that the same fake content is distributed even in downstream peers of otherwise independent Rootpeers.
 
Literatur
1.
Zurück zum Zitat Annapureddy S, Gkantsidis C, Rodriguez PR (2006) Providing video-on-demand using Peer-to-Peer networks. In: Internet protocol television (IPTV) workshop in conjunction with WWW, Edinburgh, Scotland, United Kingdom Annapureddy S, Gkantsidis C, Rodriguez PR (2006) Providing video-on-demand using Peer-to-Peer networks. In: Internet protocol television (IPTV) workshop in conjunction with WWW, Edinburgh, Scotland, United Kingdom
2.
Zurück zum Zitat Cohen B (2003) Incentives build robustness in bittorrent. In: 1st workshop on economics of Peer-to-Peer systems (P2PECON), Berkeley, California, USA Cohen B (2003) Incentives build robustness in bittorrent. In: 1st workshop on economics of Peer-to-Peer systems (P2PECON), Berkeley, California, USA
3.
Zurück zum Zitat Daswani N, Garcia-Molina H, Yang B (2002) Open problems in data-sharing Peer-to-Peer systems. In: Proceedings of the 9th international conference on database theory (ICDT), Siena, Italy Daswani N, Garcia-Molina H, Yang B (2002) Open problems in data-sharing Peer-to-Peer systems. In: Proceedings of the 9th international conference on database theory (ICDT), Siena, Italy
4.
Zurück zum Zitat Datta A, Hauswirth M, Aberer K (2003) Updates in highly unreliable, replicated Peer-to-Peer systems. In: Proceedings of the 23rd international conference on distributed computing systems (ICDCS), Providence, Rhode Island, USA Datta A, Hauswirth M, Aberer K (2003) Updates in highly unreliable, replicated Peer-to-Peer systems. In: Proceedings of the 23rd international conference on distributed computing systems (ICDCS), Providence, Rhode Island, USA
5.
Zurück zum Zitat Menezes A, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton. ISBN 0-8493-8523-7CrossRef Menezes A, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton. ISBN 0-8493-8523-7CrossRef
6.
Zurück zum Zitat Datta A, Stoica I, Franklin M (2007) LagOver: latency gradated overlays. In: Proceedings of the 27th international conference on distributed computing systems (ICDCS), Toronto, Canada Datta A, Stoica I, Franklin M (2007) LagOver: latency gradated overlays. In: Proceedings of the 27th international conference on distributed computing systems (ICDCS), Toronto, Canada
7.
Zurück zum Zitat Dhungel P, Hei X, Ross K, Saxena N (2007) The pollution attack in P2P live video streaming: measurement results and defenses. In: Peer-to-Peer streaming and IP-TV workshop (P2P-TV), Kyoto, Japan Dhungel P, Hei X, Ross K, Saxena N (2007) The pollution attack in P2P live video streaming: measurement results and defenses. In: Peer-to-Peer streaming and IP-TV workshop (P2P-TV), Kyoto, Japan
8.
Zurück zum Zitat Douceur JR (2002) The sybil attack. In: International workshop on Peer-to-Peer systems (IPTPS), MIT Faculty Club, Cambridge, MA, USA Douceur JR (2002) The sybil attack. In: International workshop on Peer-to-Peer systems (IPTPS), MIT Faculty Club, Cambridge, MA, USA
9.
Zurück zum Zitat Gkantsidis C, Rodriguez P (2005) Network coding for large scale content distribution. In: IEEE infocom, Miami, USA Gkantsidis C, Rodriguez P (2005) Network coding for large scale content distribution. In: IEEE infocom, Miami, USA
10.
Zurück zum Zitat Habib A, Xu D, Atallah M, Bhargava B, Chuang J (2005) Verifying data integrity in Peer-to-Peer media streaming. In: Twelfth annual multimedia computing and networking (MMCN), San Jose, California, USA Habib A, Xu D, Atallah M, Bhargava B, Chuang J (2005) Verifying data integrity in Peer-to-Peer media streaming. In: Twelfth annual multimedia computing and networking (MMCN), San Jose, California, USA
11.
Zurück zum Zitat Jelasity M, Guerraoui R, Kermarrec A-M, van Steen M (2004) The peer sampling service: experimental evaluation of unstructured gossip-based implementations. In: ACM/IFIP/USENIX 5th international middleware conference, Toronto, Canada Jelasity M, Guerraoui R, Kermarrec A-M, van Steen M (2004) The peer sampling service: experimental evaluation of unstructured gossip-based implementations. In: ACM/IFIP/USENIX 5th international middleware conference, Toronto, Canada
12.
Zurück zum Zitat Liao X, Jin H, Liu Y, Ni LM, Deng D (2006) AnySee: Peer-to-Peer live streaming. In: IEEE infocom, Barcelona, Spain Liao X, Jin H, Liu Y, Ni LM, Deng D (2006) AnySee: Peer-to-Peer live streaming. In: IEEE infocom, Barcelona, Spain
13.
Zurück zum Zitat Ramasubramanian V, Peterson R, Sirer EG (2006) Corona: a high performance publish-subscribe system for the World Wide Web. In: Proceedings of networked system design and implementation (NSDI), San Jose, California, USA Ramasubramanian V, Peterson R, Sirer EG (2006) Corona: a high performance publish-subscribe system for the World Wide Web. In: Proceedings of networked system design and implementation (NSDI), San Jose, California, USA
14.
Zurück zum Zitat Ren K, Lou W, Zeng K, Moran PJ (2007) On broadcast authentication in wireless sensor networks. IEEE Trans Wirel Commun 6(11):4136–4144CrossRef Ren K, Lou W, Zeng K, Moran PJ (2007) On broadcast authentication in wireless sensor networks. IEEE Trans Wirel Commun 6(11):4136–4144CrossRef
15.
Zurück zum Zitat Sandler D, Mislove A, Post A, Druschel P (2005), FeedTree: sharing web micronews with Peer-to-Peer event notification. In: International workshop on Peer-to-Peer systems (IPTPS), Ithaca, New York, USA Sandler D, Mislove A, Post A, Druschel P (2005), FeedTree: sharing web micronews with Peer-to-Peer event notification. In: International workshop on Peer-to-Peer systems (IPTPS), Ithaca, New York, USA
16.
Zurück zum Zitat Patel JA, Rivière È, Gupta I, Kermarrec A-M (2009) Rappel: exploiting interest and network locality to improve fairness in publish-subscribe systems. Comput Networks 53(13):2304–2320MATHCrossRef Patel JA, Rivière È, Gupta I, Kermarrec A-M (2009) Rappel: exploiting interest and network locality to improve fairness in publish-subscribe systems. Comput Networks 53(13):2304–2320MATHCrossRef
17.
Zurück zum Zitat Walsh K, Sirer EG (2005) Fighting Peer-to-Peer SPAM and decoys with object reputation. In: 3rd workshop on economics of Peer-to-Peer systems (P2PECON), Philadelphia, Pennsylvania, USA Walsh K, Sirer EG (2005) Fighting Peer-to-Peer SPAM and decoys with object reputation. In: 3rd workshop on economics of Peer-to-Peer systems (P2PECON), Philadelphia, Pennsylvania, USA
18.
Zurück zum Zitat Datta A, Liu X (2009) Reliable P2P feed delivery. In: Proceedings of the 9th IEEE/ACM international symposium on cluster computing and the grid (CCGRID), Shanghai, China Datta A, Liu X (2009) Reliable P2P feed delivery. In: Proceedings of the 9th IEEE/ACM international symposium on cluster computing and the grid (CCGRID), Shanghai, China
19.
Zurück zum Zitat Mühl G, Fiege L, Buchmann A, Alej LF, Buchmann Ro (2002) Filter similarities in content-based publish/subscribe systems. In: International conference on architecture of computing systems (ARCS), Karlsruhe, Germany Mühl G, Fiege L, Buchmann A, Alej LF, Buchmann Ro (2002) Filter similarities in content-based publish/subscribe systems. In: International conference on architecture of computing systems (ARCS), Karlsruhe, Germany
20.
Zurück zum Zitat Carzaniga A, Rosenblum DS, Wolf AL (2001) Design and evaluation of a wide-area event notification service. ACM Trans Comput Syst (TOCS) 19(3):332–383CrossRef Carzaniga A, Rosenblum DS, Wolf AL (2001) Design and evaluation of a wide-area event notification service. ACM Trans Comput Syst (TOCS) 19(3):332–383CrossRef
21.
Zurück zum Zitat Tarkoma S, Kangasharju J (2005) Mobility and completeness in publish/subscribe topologies. In: IASTED international conference on networks and communication systems, Krabi, Thailand Tarkoma S, Kangasharju J (2005) Mobility and completeness in publish/subscribe topologies. In: IASTED international conference on networks and communication systems, Krabi, Thailand
Metadaten
Titel
Attack resilient P2P dissemination of RSS feed
verfasst von
Xin Liu
Anwitaman Datta
Publikationsdatum
01.09.2011
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2011
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-010-0085-z

Weitere Artikel der Ausgabe 3/2011

Peer-to-Peer Networking and Applications 3/2011 Zur Ausgabe