Skip to main content

On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 557))

Abstract

This work studies the impact of the pollution attack in a fully connected live video streaming P2P push based overlay network, as well as the effectiveness of using trusted peers as the only defense mechanism. Determining the best strategies for both: (i) trusted peers (TPs) with the aim to detect and expel malicious peers (MPs) and (ii) malicious peers in order to pollute without being detected, is a challenge. Preliminary experimental results for the studied strategies show that the use of TPs is not an enough solution to defeat a large number of MPs because the number of TPs should be at least equal to the number of MPs. Additionally, this study shows the ingredients of a possible game theory problem formulation where the proposed attacker strategy could be improved to detect TPs, which in turn could improve the defense strategy, and so on.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://p2psp.org/en.

  2. 2.

    In the context of P2PSP, peers are identified by their IP addresses, so, attacker should use botnets to perform a sybil attack.

  3. 3.

    Or refuse-to-send, which is equivalent for our analysis.

References

  1. Bellovin, S.M.: Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Commun. Rev. 19(2), 32–48 (1989)

    Article  Google Scholar 

  2. Borges, A., Almeida, J., Campos, S.: Fighting pollution in P2P live streaming systems. In: 2008 IEEE International Conference on Multimedia and Expo, pp. 481–484. IEEE (2008)

    Google Scholar 

  3. Conner, W., Nahrstedt, K.: Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: Proceedings of the 4th on Middleware Doctoral Symposium, MDS 2007, pp. 13:1–13:6. ACM, New York (2007)

    Google Scholar 

  4. Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-Peer Streaming and IP-TV, pp. 323–328. ACM (2007)

    Google Scholar 

  5. Gaeta, R., Grangetto, M.: Identification of malicious nodes in peer-to-peer streaming: A belief propagation-based technique. IEEE Trans. Parallel Distrib. Syst. 24(10), 1994–2003 (2013)

    Article  Google Scholar 

  6. Hu, B., Zhao, H.V.: Pollution-resistant peer-to-peer live streaming using trust management. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp. 3057–3060, November 2009

    Google Scholar 

  7. Kang, X., Yongdong, W.: A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput. Netw. 72, 62–73 (2014)

    Article  Google Scholar 

  8. Lin, E., de Castro, D.M.N., Wang, M., Aycock, J.: SPoIm: A close look at pollution attacks in P2P live streaming. In: 2010 18th International Workshop on Quality of Service (IWQoS), pp. 1–9 (2010)

    Google Scholar 

  9. Marti, S., Garcia-Molina, H.: Identity crisis: anonymity vs reputation in P2P systems. In: 2003 Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P 2003), pp. 134–141. IEEE (2003)

    Google Scholar 

  10. Medina-López, C., Casado, L.G., González-Ruiz, V.: Pollution attacks detection in the P2PSP live streaming system. In: Herrero, Á., Baruque, B., Sedano, J., Quintian, H., Corchado, E. (eds.) International Joint Conference. AISC, pp. 401–410. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  11. Stutzbach, D., Rejaie, R.: Understanding churn in peer-to-peer networks. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006, pp. 189–202. ACM, New York (2006)

    Google Scholar 

  12. The P2PSP Team: P2PSP war-games repository. https://github.com/P2PSP/war-games

  13. The P2PSP Team: Peer to Peer Straightforward Protocol Source Code. http://code.p2psp.org

Download references

Acknowledgments

This paper has been supported by the Spanish Ministry (TIN2015-66680), in part financed by the European Regional Development Fund (ERDF). Cristóbal is supported by an FPU Fellowship (FPU14/00635) from the Spanish Ministry of Education (MECD). The work done by Ilshat was funded by Google Summer of Code (GSoC) 2015 initiative.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cristóbal Medina-López .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Medina-López, C., Shakirov, I., Casado, L.G., González-Ruiz, V. (2017). On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers. In: Madureira, A., Abraham, A., Gamboa, D., Novais, P. (eds) Intelligent Systems Design and Applications. ISDA 2016. Advances in Intelligent Systems and Computing, vol 557. Springer, Cham. https://doi.org/10.1007/978-3-319-53480-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53480-0_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53479-4

  • Online ISBN: 978-3-319-53480-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics