Skip to main content

Advertisement

Log in

Towards an immunity based distributed algorithm to detect harmful files shared in P2P networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Due to the free and self-organized features, the Peer-to-Peer file sharing networks have become one of the major transmission channels for harmful contents, such as child pornography and abuse video. Traditional monitoring techniques deploy centralized powerful servers at gateways to analyse and filter the P2P traffic. However, the immense amount of documents shared and transferred in the P2P networks makes these techniques quite cost-expensive and inefficient. To address this problem, we develop the iDetect, a distributed harmful content detection algorithm inspired by the Clonal Selection mechanism of immune systems. Analogous to the B-lymphocytes secreting antibodies against antigens in human bodies, the clients in the P2P networks deployed with iDetect cooperate to detect the harmful contents in a distributed and self-organized manner. We build a probability model of the detection procedure to prove the performance of iDetect theoretically. We also conduct simulations to compare iDetect with traditional centralized filtering algorithms. The theoretical proof and experimental results show that iDetect is efficient, effective, self-optimized and scalable to locate the clients sharing harmful contentsin P2P networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Fournier R, Cholez T, Latapy M, Magnien C, Chrisment I, Daniloff I, Festor O (2012) Comparing paedophile activity in different P2P systems. Arxiv eprint, arXiv:1206.4167

  2. Wolak J, Finkelhor D, Mitchell K (2011) Child pornography possessors: trends in offender and case characteristics. Sexual Abuse 23(1):22–42

    Google Scholar 

  3. Hughes D, Walkerdine J, Coulson G, Gibson S (2006) Peer-to-Peer: is deviant behavior the norm on P2P file-sharing networks? IEEE Distrib Syst Online 7(2):1–7

    Article  Google Scholar 

  4. Nam T, Lee H, Jeong C, Han C (2005) A harmful content protection in peer-to-peer networks. Artif Intell Simul 3397:617–626

    Article  Google Scholar 

  5. Liu J, Ning L, Xue Y, Wang D (2006) PIFF: an intelligent file filtering mechanism for peer-to-peer network. In: Proceedings 2nd IEEE symposium dependable, autonomic and secure computing, DASC’06. Indianapolis, pp 308–314

  6. Lee H, Nam T (2007) P2P honeypot to prevent illegal or harmful contents from spreading in P2P network. In: Proceedings 9th international conference advanced communication technology, ICACT’07. Gangwon-Do, pp 497–501

  7. Cruz IP, Aller CF, Garcia SS, Gallardo JC (2010) A careful design for a tool to detect child pornography in P2P networks. In: Proceedings IEEE international symposium technology and society, ISTAS’10. Wollongong, pp 227–233

  8. Burnet FM (1959) The clonal selection theory of acquired immunity. Cambridge University Press, Cambridge

    Google Scholar 

  9. de Castro LN, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Comput 6(3):239–251

    Article  Google Scholar 

  10. http://en.wikipedia.org/wiki/Gnutella, 2010

  11. www.bittorrent.com/, 2010

  12. www.emule.org/, 2010

  13. Hammami M, Chahir Y, Chen L (2006) WebGuard: a web filtering engine combining textual, structural, and visual content-based analysis. IEEE Trans Knowl Data Eng 18(2):272–284

    Article  Google Scholar 

  14. Lee PY, Hui SC, Fong ACM (2005) An intelligent categorization engine for bilingual web content filtering. IEEE Trans Multimedia 7(6):1183–1190

    Article  Google Scholar 

  15. Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Trans Evol Comput 6(3):252–280

    Article  Google Scholar 

  16. Dasgupta D, Gonzalez F (2002) An immunity-based technique to characterize intrusions in computer networks. IEEE Trans Evol Comput 6(3):281–291

    Article  Google Scholar 

  17. Gonzales F, Dasgupta D, Kozma R (2002) Combining negative selection and classification techniques for anomaly detection. In: Proceedings IEEE congress evolutionary computation, CEC’02. Honolulu, pp 705–710

  18. Dasgupta D, Majumdar NS (2002) Anomaly detection in multidimensional data using negative selection algorithm. In: Proceedings IEEE congress evolutionary computation CEC’02. Honolulu, pp 1039–1044

  19. Anchor KP, Williams PD, Gunsch GH, Lamont GB (2002) The computer defense immune system: current and future research in intrusion detection. In: Proceedings IEEE congress evolutionary computation, CEC’02. Honolulu, pp 1027–1032

  20. de Castro LN, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer-Verlag, Berlin

    Google Scholar 

  21. Powers S, He J (2008) A hybrid artificial immune system and self organising map for network intrusion detection. Inf Sci 178(15):3024–3042

    Article  Google Scholar 

  22. Freitas AA, Timmis J (2007) Revisiting the foundations of artificial immune systems for data mining. IEEE Trans Evol Comput 11(4):521–540

    Article  Google Scholar 

  23. Chen TM, Wang V (2010) Web filtering and censoring. Computer 43(3):94–97

    Article  MATH  Google Scholar 

  24. Saroiu S, Gummadi PK, Gribble SD (2002) A Measurement study of peer-to-peer file sharing systems. In: Proceedings multimedia computing and networking, MMCN’02, San Jose

  25. Hu W, Wu O, Chen Z, Fu Z, Maybank S (2007) Recognition of pornographic web pages by classifying texts and images. IEEE Trans Pattern Anal Mach Intell 29(6):1019–1034

    Article  Google Scholar 

  26. Singh A, Ngan T, Druschel P, Wallach D (2006) Eclipse attacks on overlay networks: threats and defenses. In: Proceedings IEEE international conference computer communications, INFOCOM’06. Barcelona, pp 1–12

  27. Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: Proceedings ACM SIGCOMM conference, SIGCOMM’01. San Diego, pp 161–172

  28. Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peertopeer lookup service for internet applications. In: Proceedings ACM SIGCOMM conference, SIGCOMM’01. San Diego, pp 149–160

  29. Tang C, Xu Z, Dwarkadas S (2001) Peer-to-peer information retrieval using self-organizing semantic overlay networks. In: Proceedings ACM SIGCOMM conference, SIGCOMM’01. San Diego, pp 175–186

  30. Reynolds P, Vahdat A (2003) Efficient peer-to-peer keyword searching. In: Proceedings ACM/IFIP/USENIX international middleware conference, middleware’03. Rio de Janeiro, pp 21–40

  31. Muller W, Boykin PO, Roychowdhury VP, Sarshar N (2008) Comparison of image similarity queries in P2P systems. Comput Commun 31(2):375–386

    Article  Google Scholar 

  32. Picard D, Revel A, Cord M (2010) An application of swarm intelligence to distributed image retrieval. Inf Sci. In Press, Corrected Proof, Available online

  33. Yang B, Garcia-Molina H (2002) Improving search in peer-to-peer networks. In: Proceedings international conference distributed computing systems, ICDCS’02. Vienna, pp 5–14

  34. Crespo A, Garcia-Molina H (2002) Routing indices for peer-to-peer systems. In: Proceedings international conference distributed computing systems, ICDCS’02. Vienna, pp 23–32

  35. Kalogeraki V, Gunopulos D, Zeinalipour-Yazti D (2002) A local search mechanism for peer-to-peer networks. In: Proceedings international conference information and knowledge management, CIKM’02. McLean, pp 300–307

  36. Friedmana M, Lastb M, Makoverb Y, Kandelc A (2007) Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology. Inf Sci 177(2):467–475

    Article  Google Scholar 

  37. Lv J, Yu Z, Zhang T (2011) iDetect: an immunity based algorithm to detect harmful content shared in peer-to-peer networks. In: Proceedings international conference machine learning and cybernetics, ICMLC’11. Guilin, pp 926–931

  38. http://www.emule-mods.de/?mods=start, 2012

Download references

Acknowledgments

The work described in this paper was supported by grants from National Natural Science Foundation of China (Project No.61070090, 61003174, 60973083 and 61170080), the grant from the Comprehensive Strategic Cooperation Project of Guangdong Province and Chinese Academy of Sciences (Project No.2012B090400016), the grant from the Technology Planning Project of Guangdong Province (Project No.2012A011100005), and the grant from the Fundamental Research Funds for the Central Universities (Project No.2011ZM0069).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianming Lv.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lv, J., Yu, Z. & Zhang, T. Towards an immunity based distributed algorithm to detect harmful files shared in P2P networks. Peer-to-Peer Netw. Appl. 8, 49–62 (2015). https://doi.org/10.1007/s12083-013-0221-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-013-0221-7

Keywords

Navigation