Abstract
In recent years, P2P file-sharing networks are used all over the world. This has led to social problems such as the illegal distribution of copyrighted material and the leakage of personal information through computer viruses because P2P does not have a control function for file distribution. To address these issues, a control method called index poisoning has been studied. However, problems such as pollution in the network index and a need to increment control traffic have been reported when index poisoning is applied to a P2P file-sharing network. We propose a method that implements dynamic clustering to limit the range of index poisoning as a solution for these problems that also maintains the effectiveness of the control function. In this study, we implement index poisoning on the large-scale Winny network and evaluate the system performance.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hegarty, R., Haggerty, J.: Extrusion detection of illegal files in cloud-based systems. Int. J. Space Based Situat. Comput. 5(3), 150–158 (2015)
Cha, B., Kim, J.: Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments. Int. J. Grid Util. Comput. 4(1), 1–9 (2013)
Gueye, B., Flauzac, O., Rabat, C., Niang, I.: A self-adaptive structuring for large-scale P2P Grid environment: design and simulation analysis. Int. J. Grid Util. Comput. 8(3), 254–267 (2017)
Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S.S.: FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids. Int. J. Grid Util. Comput. 6(1), 57–66 (2015)
Liang, J., Kumar, R., Xi, Y., Ross, K.W.: Pollution in P2P file sharing systems. In: Proceedings of IEEE Infocom 2005, pp. 1174–1185 (2005)
Liang, J., Naoumov, N., Ross, K.: The index poisoning attack in P2P file sharing systems. In: Proceedings of IEEE Infocom 2006, pp. 1–12 (2006)
Aburada, K., Yamaba, H., Katayama, T., Park, M., Okazaki, N.: Implementation and evaluation of index poisoning method using the clustering for Winny network. Trans. IPS Japan 56(12), 2395–2405 (2015). (in Japanese)
Naoumov, N., Ross, K.: Exploiting P2P system for DDos attacks. In: Proceedings of the 1st International Conference on Scalable Information Systems, vol. 47 (2006)
Acknowledgements
This work was supported by JSPS KAKENHI Grant Numbers JP17H01736 and JP17K00139.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Aburada, K., Kita, Y., Yamaba, H., Katayama, T., Park, M., Okazaki, N. (2018). Evaluation of Index Poisoning Method in Large Scale Winny Network. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-75928-9_92
Download citation
DOI: https://doi.org/10.1007/978-3-319-75928-9_92
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75927-2
Online ISBN: 978-3-319-75928-9
eBook Packages: EngineeringEngineering (R0)