Skip to main content
Top
Published in: Information Systems Frontiers 6/2017

28-04-2016

Adaptive approach to restraining content pollution in peer-to-peer networks

Authors: Mohammed Hawa, Raed Al-Zubi, Khalid A. Darabkh, Ghazi Al-Sukkar

Published in: Information Systems Frontiers | Issue 6/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected content in an attempt to disrupt the system and waste network resources. When faced by such phenomenon, regular peers get discouraged from participating in the P2P network as they find less value in the system. In this work, we investigate the amount of resources required to restrain pollution attacks by means of content validation. We introduce multiple adaptive techniques that can minimize the spread of polluted content, while at the same time reduce the cost of content validation for peers participating in the network. Furthermore, the proposed pollution-restraint techniques are resistant to collusion from malicious peers, and they do not contribute to excessive communication overhead in the P2P network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
1 In this context, recent acquaintances of a local peer refer to remote peers with whom the local peer interacted recently (by uploading or downloading files to such peers).
 
Literature
go back to reference Bradai, A., Abbasi, U., Landa, R., & Ahmed, T. (2014). An efficient playout smoothing mechanism for layered streaming in P2P networks. Peer-to-Peer Networking and Applications, 7(2), 1936–6442.CrossRef Bradai, A., Abbasi, U., Landa, R., & Ahmed, T. (2014). An efficient playout smoothing mechanism for layered streaming in P2P networks. Peer-to-Peer Networking and Applications, 7(2), 1936–6442.CrossRef
go back to reference Narang, P., & Hota, C. (2015). Game-theoretic strategies for IDS deployment in peer-to-peer networks. Information Systems Frontiers, 17(5), 1017–1028.CrossRef Narang, P., & Hota, C. (2015). Game-theoretic strategies for IDS deployment in peer-to-peer networks. Information Systems Frontiers, 17(5), 1017–1028.CrossRef
go back to reference Hawa, M., Rahhal, J. S., & Abu-Al-Nadi, D. I. (2012). File size models for shared content over the BitTorrent peer-to-peer network. Peer-to-Peer Networking and Applications, 5(3), 279–291.CrossRef Hawa, M., Rahhal, J. S., & Abu-Al-Nadi, D. I. (2012). File size models for shared content over the BitTorrent peer-to-peer network. Peer-to-Peer Networking and Applications, 5(3), 279–291.CrossRef
go back to reference Teng, H. -Y., Lin, C. -N., & Hwang, R. -H. (2014). A self-similar super-peer overlay construction scheme for super large-scale P2P applications. Information Systems Frontiers, 16(1), 45–58.CrossRef Teng, H. -Y., Lin, C. -N., & Hwang, R. -H. (2014). A self-similar super-peer overlay construction scheme for super large-scale P2P applications. Information Systems Frontiers, 16(1), 45–58.CrossRef
go back to reference Wang, J., Shen, R., Ullrich, C., Luo, H., & Niu, C. (2010). Resisting free-riding behavior in BitTorrent. Future Generation Computer Systems, 26(8), 1285–1299.CrossRef Wang, J., Shen, R., Ullrich, C., Luo, H., & Niu, C. (2010). Resisting free-riding behavior in BitTorrent. Future Generation Computer Systems, 26(8), 1285–1299.CrossRef
go back to reference Hou, L., Duan, H., & Wu, J. (2010). Distinguishing the master to defend DDos attack in peer-to-peer networks, IEEE International Conference on Computer and Information Technology, 1002–1008. Hou, L., Duan, H., & Wu, J. (2010). Distinguishing the master to defend DDos attack in peer-to-peer networks, IEEE International Conference on Computer and Information Technology, 1002–1008.
go back to reference Hawa, M., Al-Zubi, R., Darabkh, K. A., & Al-Sukkar, G. (2013). On Combating Content Poisoning in Peer-to-Peer Networks, World Congress on Engineering, 1276–1280. Hawa, M., Al-Zubi, R., Darabkh, K. A., & Al-Sukkar, G. (2013). On Combating Content Poisoning in Peer-to-Peer Networks, World Congress on Engineering, 1276–1280.
go back to reference Meng, X., & Cui, W. (2012). Research on the immune strategy for the polluted file propagation in structured P2P networks. Computers & Electrical Engineering, 38(2), 194–205.CrossRef Meng, X., & Cui, W. (2012). Research on the immune strategy for the polluted file propagation in structured P2P networks. Computers & Electrical Engineering, 38(2), 194–205.CrossRef
go back to reference Yoshida, M., Ohzahata, S., Nakao, A., & Kawashima, K. (2010). Controlling file distribution in the share network through content poisoning, IEEE International Conference on Advanced Information Networking and Applications, 1004–1011. Yoshida, M., Ohzahata, S., Nakao, A., & Kawashima, K. (2010). Controlling file distribution in the share network through content poisoning, IEEE International Conference on Advanced Information Networking and Applications, 1004–1011.
go back to reference Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. Journal of Network and Computer Applications, 35(1), 72–84.CrossRef Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. Journal of Network and Computer Applications, 35(1), 72–84.CrossRef
go back to reference Wang, C. -H., & Chiu, C. -Y. (2011). Copyright protection in P2P networks by false pieces pollution, International Conference on Autonomic and Trusted Computing, 215–227. Wang, C. -H., & Chiu, C. -Y. (2011). Copyright protection in P2P networks by false pieces pollution, International Conference on Autonomic and Trusted Computing, 215–227.
go back to reference Montassier, G., Cholez, T., Doyen, G., Khatoun, R., Chrisment, I., & Festor, O. (2011). Content pollution quantification in large P2P networks: A measurement study on KAD, IEEE International Conference on Peer-to-Peer Computing, 30–33. Montassier, G., Cholez, T., Doyen, G., Khatoun, R., Chrisment, I., & Festor, O. (2011). Content pollution quantification in large P2P networks: A measurement study on KAD, IEEE International Conference on Peer-to-Peer Computing, 30–33.
go back to reference Peiqing, Z., & Helvik, B.E. (2011). Modeling and analysis of P2P content distribution under coordinated attack strategies, IEEE Consumer Communications and Networking Conference, 131—135. Peiqing, Z., & Helvik, B.E. (2011). Modeling and analysis of P2P content distribution under coordinated attack strategies, IEEE Consumer Communications and Networking Conference, 131—135.
go back to reference Kong, J., Cai, W., & Wang, L. (2010). The Evaluation of index poisoning in BitTorrent, International Conference on Communication Software and Networks, 382–386. Kong, J., Cai, W., & Wang, L. (2010). The Evaluation of index poisoning in BitTorrent, International Conference on Communication Software and Networks, 382–386.
go back to reference Rodriguez, P., Tan, S. M., & Gkantsidis, C. (2006). On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review, 36(1), 75–78.CrossRef Rodriguez, P., Tan, S. M., & Gkantsidis, C. (2006). On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review, 36(1), 75–78.CrossRef
go back to reference Liao, J., Yang, D., Li, T., Wang, J., Qi, Q., & Zhu, X. (2014). A scalable approach for content based image retrieval in cloud datacenter. Information Systems Frontiers, 16(1), 129–141.CrossRef Liao, J., Yang, D., Li, T., Wang, J., Qi, Q., & Zhu, X. (2014). A scalable approach for content based image retrieval in cloud datacenter. Information Systems Frontiers, 16(1), 129–141.CrossRef
go back to reference Kreitz, G., & Niemela, F. (2010). Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming, IEEE International Conference on Peer-to-Peer Computing, 1–10. Kreitz, G., & Niemela, F. (2010). Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming, IEEE International Conference on Peer-to-Peer Computing, 1–10.
go back to reference Aurelius, A., Lagerstedt, C., & Kihl, M. (2011). Streaming media over the Internet: Flow based analysis in live access networks, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 1–6. Aurelius, A., Lagerstedt, C., & Kihl, M. (2011). Streaming media over the Internet: Flow based analysis in live access networks, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 1–6.
go back to reference Toka, L., Cataldi, P., Dell’Amico, M., & Michiardi, P. (2012). Redundancy management for P2P backup, IEEE INFOCOM, 2986–2990. Toka, L., Cataldi, P., Dell’Amico, M., & Michiardi, P. (2012). Redundancy management for P2P backup, IEEE INFOCOM, 2986–2990.
go back to reference Min, Z., Changjia, C., & Jinkang, J. (2008). Fake servers in EDonkey networks, International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 29:1–29:7. Min, Z., Changjia, C., & Jinkang, J. (2008). Fake servers in EDonkey networks, International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 29:1–29:7.
go back to reference Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., & Rejaie, R. (2010). Is content publishing in BitTorrent altruistic or profit-driven? International Conference on Emerging Networking Experiments and Technologies, 11:1–11:12. Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., & Rejaie, R. (2010). Is content publishing in BitTorrent altruistic or profit-driven? International Conference on Emerging Networking Experiments and Technologies, 11:1–11:12.
go back to reference Dhungel, P., Hei, X., Ross, K.W., & Saxena, N. (2007). The pollution attack in P2P live video streaming: measurement results and defenses, Workshop on Peer-to-peer Streaming and IP-TV, 323–328. Dhungel, P., Hei, X., Ross, K.W., & Saxena, N. (2007). The pollution attack in P2P live video streaming: measurement results and defenses, Workshop on Peer-to-peer Streaming and IP-TV, 323–328.
go back to reference Wu, Y., & Deng, R. H. (2012). A pollution attack to public-key watermarking schemes, IEEE International Conference on Multimedia and Expo, 230–235. Wu, Y., & Deng, R. H. (2012). A pollution attack to public-key watermarking schemes, IEEE International Conference on Multimedia and Expo, 230–235.
go back to reference Ormandi, R., Hegedus, I., Csernai, K., & Jelasity, M. (2010). Towards inferring ratings from user behavior in BitTorrent communities, IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, 217– 222. Ormandi, R., Hegedus, I., Csernai, K., & Jelasity, M. (2010). Towards inferring ratings from user behavior in BitTorrent communities, IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, 217– 222.
go back to reference Shang-Fu, G., & Jian-Lei, Z. (2012). A survey of reputation and trust mechanism in peer-to-peer network, International Conference on Industrial Control and Electronics Engineering, 116– 119. Shang-Fu, G., & Jian-Lei, Z. (2012). A survey of reputation and trust mechanism in peer-to-peer network, International Conference on Industrial Control and Electronics Engineering, 116– 119.
go back to reference Chu, X., Chen, X., Zhao, K., & Liu, J. (2010). Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems, 44(3-4), 191–203.CrossRef Chu, X., Chen, X., Zhao, K., & Liu, J. (2010). Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems, 44(3-4), 191–203.CrossRef
go back to reference Hawa, M., As-Sayid-Ahmad, L., & Khalaf, L. D. (2013). On enhancing reputation management using peer-to-peer interaction history. Peer-to-Peer Networking and Applications, 6(1), 101– 113.CrossRef Hawa, M., As-Sayid-Ahmad, L., & Khalaf, L. D. (2013). On enhancing reputation management using peer-to-peer interaction history. Peer-to-Peer Networking and Applications, 6(1), 101– 113.CrossRef
go back to reference Barcellos, M. P., Gaspary, L. P., da Costa Cordeiro, W. L., & Antunes, R. S. (2011). A conservative strategy to protect P2P file sharing systems from pollution attacks. Concurrency Computation: Practice and Experience, 23 (1), 117–141.CrossRef Barcellos, M. P., Gaspary, L. P., da Costa Cordeiro, W. L., & Antunes, R. S. (2011). A conservative strategy to protect P2P file sharing systems from pollution attacks. Concurrency Computation: Practice and Experience, 23 (1), 117–141.CrossRef
go back to reference Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., & Su, Z. (2012). Behavior-based reputation management in P2P file-sharing networks. Journal of Computer and System Sciences, 78(6), 1737–1750.CrossRef Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., & Su, Z. (2012). Behavior-based reputation management in P2P file-sharing networks. Journal of Computer and System Sciences, 78(6), 1737–1750.CrossRef
go back to reference Centeno, R., Hermoso, R., & Fasli, M. (2014). On the inaccuracy of numerical ratings: dealing with biased opinions in social networks. Information Systems Frontiers, 17(4), 809– 825.CrossRef Centeno, R., Hermoso, R., & Fasli, M. (2014). On the inaccuracy of numerical ratings: dealing with biased opinions in social networks. Information Systems Frontiers, 17(4), 809– 825.CrossRef
go back to reference Liu, H., Ma, C., & Walshe, R. (2013). An adaptive membership protocol against Sybil attack in unstructured P2P networks, IET International Conference on Information and Communications Technologies, 29–34. Liu, H., Ma, C., & Walshe, R. (2013). An adaptive membership protocol against Sybil attack in unstructured P2P networks, IET International Conference on Information and Communications Technologies, 29–34.
go back to reference Saini, N. K., Sihag, V. K., & Yadav, R.C. (2014). A reactive approach for detection of collusion attacks in P2P trust and reputation systems. IEEE International Advance Computing Conference, 312–317. Saini, N. K., Sihag, V. K., & Yadav, R.C. (2014). A reactive approach for detection of collusion attacks in P2P trust and reputation systems. IEEE International Advance Computing Conference, 312–317.
go back to reference Shafiee Sarjaz, B., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications, 6(1), 86–100.CrossRef Shafiee Sarjaz, B., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications, 6(1), 86–100.CrossRef
go back to reference Wang, Y., Yun, X., & Yifei, L (2007). Analyzing the characteristics of gnutella overlays, International Conference on Information Technology, 1095–1100. Wang, Y., Yun, X., & Yifei, L (2007). Analyzing the characteristics of gnutella overlays, International Conference on Information Technology, 1095–1100.
Metadata
Title
Adaptive approach to restraining content pollution in peer-to-peer networks
Authors
Mohammed Hawa
Raed Al-Zubi
Khalid A. Darabkh
Ghazi Al-Sukkar
Publication date
28-04-2016
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 6/2017
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-016-9651-0

Other articles of this Issue 6/2017

Information Systems Frontiers 6/2017 Go to the issue

Premium Partner