Skip to main content
Log in

Adaptive approach to restraining content pollution in peer-to-peer networks

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected content in an attempt to disrupt the system and waste network resources. When faced by such phenomenon, regular peers get discouraged from participating in the P2P network as they find less value in the system. In this work, we investigate the amount of resources required to restrain pollution attacks by means of content validation. We introduce multiple adaptive techniques that can minimize the spread of polluted content, while at the same time reduce the cost of content validation for peers participating in the network. Furthermore, the proposed pollution-restraint techniques are resistant to collusion from malicious peers, and they do not contribute to excessive communication overhead in the P2P network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

Notes

  1. 1 In this context, recent acquaintances of a local peer refer to remote peers with whom the local peer interacted recently (by uploading or downloading files to such peers).

References

  • Bradai, A., Abbasi, U., Landa, R., & Ahmed, T. (2014). An efficient playout smoothing mechanism for layered streaming in P2P networks. Peer-to-Peer Networking and Applications, 7(2), 1936–6442.

    Article  Google Scholar 

  • Narang, P., & Hota, C. (2015). Game-theoretic strategies for IDS deployment in peer-to-peer networks. Information Systems Frontiers, 17(5), 1017–1028.

    Article  Google Scholar 

  • Hawa, M., Rahhal, J. S., & Abu-Al-Nadi, D. I. (2012). File size models for shared content over the BitTorrent peer-to-peer network. Peer-to-Peer Networking and Applications, 5(3), 279–291.

    Article  Google Scholar 

  • Teng, H. -Y., Lin, C. -N., & Hwang, R. -H. (2014). A self-similar super-peer overlay construction scheme for super large-scale P2P applications. Information Systems Frontiers, 16(1), 45–58.

    Article  Google Scholar 

  • Wang, J., Shen, R., Ullrich, C., Luo, H., & Niu, C. (2010). Resisting free-riding behavior in BitTorrent. Future Generation Computer Systems, 26(8), 1285–1299.

    Article  Google Scholar 

  • Hou, L., Duan, H., & Wu, J. (2010). Distinguishing the master to defend DDos attack in peer-to-peer networks, IEEE International Conference on Computer and Information Technology, 1002–1008.

  • Hawa, M., Al-Zubi, R., Darabkh, K. A., & Al-Sukkar, G. (2013). On Combating Content Poisoning in Peer-to-Peer Networks, World Congress on Engineering, 1276–1280.

  • Meng, X., & Cui, W. (2012). Research on the immune strategy for the polluted file propagation in structured P2P networks. Computers & Electrical Engineering, 38(2), 194–205.

    Article  Google Scholar 

  • Yoshida, M., Ohzahata, S., Nakao, A., & Kawashima, K. (2010). Controlling file distribution in the share network through content poisoning, IEEE International Conference on Advanced Information Networking and Applications, 1004–1011.

  • Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. Journal of Network and Computer Applications, 35(1), 72–84.

    Article  Google Scholar 

  • Wang, C. -H., & Chiu, C. -Y. (2011). Copyright protection in P2P networks by false pieces pollution, International Conference on Autonomic and Trusted Computing, 215–227.

  • Montassier, G., Cholez, T., Doyen, G., Khatoun, R., Chrisment, I., & Festor, O. (2011). Content pollution quantification in large P2P networks: A measurement study on KAD, IEEE International Conference on Peer-to-Peer Computing, 30–33.

  • Peiqing, Z., & Helvik, B.E. (2011). Modeling and analysis of P2P content distribution under coordinated attack strategies, IEEE Consumer Communications and Networking Conference, 131—135.

  • Kong, J., Cai, W., & Wang, L. (2010). The Evaluation of index poisoning in BitTorrent, International Conference on Communication Software and Networks, 382–386.

  • Rodriguez, P., Tan, S. M., & Gkantsidis, C. (2006). On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review, 36(1), 75–78.

    Article  Google Scholar 

  • Liao, J., Yang, D., Li, T., Wang, J., Qi, Q., & Zhu, X. (2014). A scalable approach for content based image retrieval in cloud datacenter. Information Systems Frontiers, 16(1), 129–141.

    Article  Google Scholar 

  • Kreitz, G., & Niemela, F. (2010). Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming, IEEE International Conference on Peer-to-Peer Computing, 1–10.

  • Aurelius, A., Lagerstedt, C., & Kihl, M. (2011). Streaming media over the Internet: Flow based analysis in live access networks, IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 1–6.

  • Warren, T. (2015). Microsoft to deliver Windows 10 updates using peer-to-peer technology. http://www.theverge.com/2015/3/15/8218215/microsoft-windows-10-updates-p2p.

  • Toka, L., Cataldi, P., Dell’Amico, M., & Michiardi, P. (2012). Redundancy management for P2P backup, IEEE INFOCOM, 2986–2990.

  • eMule. eMule official website and source code, http://www.emule-project.net.

  • Min, Z., Changjia, C., & Jinkang, J. (2008). Fake servers in EDonkey networks, International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 29:1–29:7.

  • Cohen, B. (2008). The BitTorrent Protocol Specification . http://www.bittorrent.org/beps/bep_0003.html.

  • Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., & Rejaie, R. (2010). Is content publishing in BitTorrent altruistic or profit-driven? International Conference on Emerging Networking Experiments and Technologies, 11:1–11:12.

  • Dhungel, P., Hei, X., Ross, K.W., & Saxena, N. (2007). The pollution attack in P2P live video streaming: measurement results and defenses, Workshop on Peer-to-peer Streaming and IP-TV, 323–328.

  • Wu, Y., & Deng, R. H. (2012). A pollution attack to public-key watermarking schemes, IEEE International Conference on Multimedia and Expo, 230–235.

  • Ormandi, R., Hegedus, I., Csernai, K., & Jelasity, M. (2010). Towards inferring ratings from user behavior in BitTorrent communities, IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, 217– 222.

  • Shang-Fu, G., & Jian-Lei, Z. (2012). A survey of reputation and trust mechanism in peer-to-peer network, International Conference on Industrial Control and Electronics Engineering, 116– 119.

  • Chu, X., Chen, X., Zhao, K., & Liu, J. (2010). Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems, 44(3-4), 191–203.

    Article  Google Scholar 

  • Hawa, M., As-Sayid-Ahmad, L., & Khalaf, L. D. (2013). On enhancing reputation management using peer-to-peer interaction history. Peer-to-Peer Networking and Applications, 6(1), 101– 113.

    Article  Google Scholar 

  • Barcellos, M. P., Gaspary, L. P., da Costa Cordeiro, W. L., & Antunes, R. S. (2011). A conservative strategy to protect P2P file sharing systems from pollution attacks. Concurrency Computation: Practice and Experience, 23 (1), 117–141.

    Article  Google Scholar 

  • Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., & Su, Z. (2012). Behavior-based reputation management in P2P file-sharing networks. Journal of Computer and System Sciences, 78(6), 1737–1750.

    Article  Google Scholar 

  • Centeno, R., Hermoso, R., & Fasli, M. (2014). On the inaccuracy of numerical ratings: dealing with biased opinions in social networks. Information Systems Frontiers, 17(4), 809– 825.

    Article  Google Scholar 

  • Liu, H., Ma, C., & Walshe, R. (2013). An adaptive membership protocol against Sybil attack in unstructured P2P networks, IET International Conference on Information and Communications Technologies, 29–34.

  • Saini, N. K., Sihag, V. K., & Yadav, R.C. (2014). A reactive approach for detection of collusion attacks in P2P trust and reputation systems. IEEE International Advance Computing Conference, 312–317.

  • Shafiee Sarjaz, B., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications, 6(1), 86–100.

    Article  Google Scholar 

  • Wang, Y., Yun, X., & Yifei, L (2007). Analyzing the characteristics of gnutella overlays, International Conference on Information Technology, 1095–1100.

  • CISCO (2015). Cisco Visual networking index: Forecast and methodology, 2014–2019. http://www.cisco.com/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Hawa.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hawa, M., Al-Zubi, R., Darabkh, K.A. et al. Adaptive approach to restraining content pollution in peer-to-peer networks. Inf Syst Front 19, 1373–1390 (2017). https://doi.org/10.1007/s10796-016-9651-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-016-9651-0

Keywords

Navigation