Skip to main content

Evaluation of Index Poisoning Method in Large Scale Winny Network

  • Conference paper
  • First Online:
  • 1971 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 17))

Abstract

In recent years, P2P file-sharing networks are used all over the world. This has led to social problems such as the illegal distribution of copyrighted material and the leakage of personal information through computer viruses because P2P does not have a control function for file distribution. To address these issues, a control method called index poisoning has been studied. However, problems such as pollution in the network index and a need to increment control traffic have been reported when index poisoning is applied to a P2P file-sharing network. We propose a method that implements dynamic clustering to limit the range of index poisoning as a solution for these problems that also maintains the effectiveness of the control function. In this study, we implement index poisoning on the large-scale Winny network and evaluate the system performance.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hegarty, R., Haggerty, J.: Extrusion detection of illegal files in cloud-based systems. Int. J. Space Based Situat. Comput. 5(3), 150–158 (2015)

    Article  Google Scholar 

  2. Cha, B., Kim, J.: Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments. Int. J. Grid Util. Comput. 4(1), 1–9 (2013)

    Article  Google Scholar 

  3. Gueye, B., Flauzac, O., Rabat, C., Niang, I.: A self-adaptive structuring for large-scale P2P Grid environment: design and simulation analysis. Int. J. Grid Util. Comput. 8(3), 254–267 (2017)

    Article  Google Scholar 

  4. Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S.S.: FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids. Int. J. Grid Util. Comput. 6(1), 57–66 (2015)

    Article  Google Scholar 

  5. Winny. https://en.wikipedia.org/wiki/Winny

  6. Liang, J., Kumar, R., Xi, Y., Ross, K.W.: Pollution in P2P file sharing systems. In: Proceedings of IEEE Infocom 2005, pp. 1174–1185 (2005)

    Google Scholar 

  7. Liang, J., Naoumov, N., Ross, K.: The index poisoning attack in P2P file sharing systems. In: Proceedings of IEEE Infocom 2006, pp. 1–12 (2006)

    Google Scholar 

  8. Aburada, K., Yamaba, H., Katayama, T., Park, M., Okazaki, N.: Implementation and evaluation of index poisoning method using the clustering for Winny network. Trans. IPS Japan 56(12), 2395–2405 (2015). (in Japanese)

    Google Scholar 

  9. Naoumov, N., Ross, K.: Exploiting P2P system for DDos attacks. In: Proceedings of the 1st International Conference on Scalable Information Systems, vol. 47 (2006)

    Google Scholar 

Download references

Acknowledgements

This work was supported by JSPS KAKENHI Grant Numbers JP17H01736 and JP17K00139.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kentaro Aburada .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aburada, K., Kita, Y., Yamaba, H., Katayama, T., Park, M., Okazaki, N. (2018). Evaluation of Index Poisoning Method in Large Scale Winny Network. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-75928-9_92

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75928-9_92

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75927-2

  • Online ISBN: 978-3-319-75928-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics