Abstract
Due to the free and self-organized features, the Peer-to-Peer file sharing networks have become one of the major transmission channels for harmful contents, such as child pornography and abuse video. Traditional monitoring techniques deploy centralized powerful servers at gateways to analyse and filter the P2P traffic. However, the immense amount of documents shared and transferred in the P2P networks makes these techniques quite cost-expensive and inefficient. To address this problem, we develop the iDetect, a distributed harmful content detection algorithm inspired by the Clonal Selection mechanism of immune systems. Analogous to the B-lymphocytes secreting antibodies against antigens in human bodies, the clients in the P2P networks deployed with iDetect cooperate to detect the harmful contents in a distributed and self-organized manner. We build a probability model of the detection procedure to prove the performance of iDetect theoretically. We also conduct simulations to compare iDetect with traditional centralized filtering algorithms. The theoretical proof and experimental results show that iDetect is efficient, effective, self-optimized and scalable to locate the clients sharing harmful contentsin P2P networks.
Similar content being viewed by others
References
Fournier R, Cholez T, Latapy M, Magnien C, Chrisment I, Daniloff I, Festor O (2012) Comparing paedophile activity in different P2P systems. Arxiv eprint, arXiv:1206.4167
Wolak J, Finkelhor D, Mitchell K (2011) Child pornography possessors: trends in offender and case characteristics. Sexual Abuse 23(1):22–42
Hughes D, Walkerdine J, Coulson G, Gibson S (2006) Peer-to-Peer: is deviant behavior the norm on P2P file-sharing networks? IEEE Distrib Syst Online 7(2):1–7
Nam T, Lee H, Jeong C, Han C (2005) A harmful content protection in peer-to-peer networks. Artif Intell Simul 3397:617–626
Liu J, Ning L, Xue Y, Wang D (2006) PIFF: an intelligent file filtering mechanism for peer-to-peer network. In: Proceedings 2nd IEEE symposium dependable, autonomic and secure computing, DASC’06. Indianapolis, pp 308–314
Lee H, Nam T (2007) P2P honeypot to prevent illegal or harmful contents from spreading in P2P network. In: Proceedings 9th international conference advanced communication technology, ICACT’07. Gangwon-Do, pp 497–501
Cruz IP, Aller CF, Garcia SS, Gallardo JC (2010) A careful design for a tool to detect child pornography in P2P networks. In: Proceedings IEEE international symposium technology and society, ISTAS’10. Wollongong, pp 227–233
Burnet FM (1959) The clonal selection theory of acquired immunity. Cambridge University Press, Cambridge
de Castro LN, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Comput 6(3):239–251
www.bittorrent.com/, 2010
www.emule.org/, 2010
Hammami M, Chahir Y, Chen L (2006) WebGuard: a web filtering engine combining textual, structural, and visual content-based analysis. IEEE Trans Knowl Data Eng 18(2):272–284
Lee PY, Hui SC, Fong ACM (2005) An intelligent categorization engine for bilingual web content filtering. IEEE Trans Multimedia 7(6):1183–1190
Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Trans Evol Comput 6(3):252–280
Dasgupta D, Gonzalez F (2002) An immunity-based technique to characterize intrusions in computer networks. IEEE Trans Evol Comput 6(3):281–291
Gonzales F, Dasgupta D, Kozma R (2002) Combining negative selection and classification techniques for anomaly detection. In: Proceedings IEEE congress evolutionary computation, CEC’02. Honolulu, pp 705–710
Dasgupta D, Majumdar NS (2002) Anomaly detection in multidimensional data using negative selection algorithm. In: Proceedings IEEE congress evolutionary computation CEC’02. Honolulu, pp 1039–1044
Anchor KP, Williams PD, Gunsch GH, Lamont GB (2002) The computer defense immune system: current and future research in intrusion detection. In: Proceedings IEEE congress evolutionary computation, CEC’02. Honolulu, pp 1027–1032
de Castro LN, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer-Verlag, Berlin
Powers S, He J (2008) A hybrid artificial immune system and self organising map for network intrusion detection. Inf Sci 178(15):3024–3042
Freitas AA, Timmis J (2007) Revisiting the foundations of artificial immune systems for data mining. IEEE Trans Evol Comput 11(4):521–540
Chen TM, Wang V (2010) Web filtering and censoring. Computer 43(3):94–97
Saroiu S, Gummadi PK, Gribble SD (2002) A Measurement study of peer-to-peer file sharing systems. In: Proceedings multimedia computing and networking, MMCN’02, San Jose
Hu W, Wu O, Chen Z, Fu Z, Maybank S (2007) Recognition of pornographic web pages by classifying texts and images. IEEE Trans Pattern Anal Mach Intell 29(6):1019–1034
Singh A, Ngan T, Druschel P, Wallach D (2006) Eclipse attacks on overlay networks: threats and defenses. In: Proceedings IEEE international conference computer communications, INFOCOM’06. Barcelona, pp 1–12
Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: Proceedings ACM SIGCOMM conference, SIGCOMM’01. San Diego, pp 161–172
Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peertopeer lookup service for internet applications. In: Proceedings ACM SIGCOMM conference, SIGCOMM’01. San Diego, pp 149–160
Tang C, Xu Z, Dwarkadas S (2001) Peer-to-peer information retrieval using self-organizing semantic overlay networks. In: Proceedings ACM SIGCOMM conference, SIGCOMM’01. San Diego, pp 175–186
Reynolds P, Vahdat A (2003) Efficient peer-to-peer keyword searching. In: Proceedings ACM/IFIP/USENIX international middleware conference, middleware’03. Rio de Janeiro, pp 21–40
Muller W, Boykin PO, Roychowdhury VP, Sarshar N (2008) Comparison of image similarity queries in P2P systems. Comput Commun 31(2):375–386
Picard D, Revel A, Cord M (2010) An application of swarm intelligence to distributed image retrieval. Inf Sci. In Press, Corrected Proof, Available online
Yang B, Garcia-Molina H (2002) Improving search in peer-to-peer networks. In: Proceedings international conference distributed computing systems, ICDCS’02. Vienna, pp 5–14
Crespo A, Garcia-Molina H (2002) Routing indices for peer-to-peer systems. In: Proceedings international conference distributed computing systems, ICDCS’02. Vienna, pp 23–32
Kalogeraki V, Gunopulos D, Zeinalipour-Yazti D (2002) A local search mechanism for peer-to-peer networks. In: Proceedings international conference information and knowledge management, CIKM’02. McLean, pp 300–307
Friedmana M, Lastb M, Makoverb Y, Kandelc A (2007) Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology. Inf Sci 177(2):467–475
Lv J, Yu Z, Zhang T (2011) iDetect: an immunity based algorithm to detect harmful content shared in peer-to-peer networks. In: Proceedings international conference machine learning and cybernetics, ICMLC’11. Guilin, pp 926–931
Acknowledgments
The work described in this paper was supported by grants from National Natural Science Foundation of China (Project No.61070090, 61003174, 60973083 and 61170080), the grant from the Comprehensive Strategic Cooperation Project of Guangdong Province and Chinese Academy of Sciences (Project No.2012B090400016), the grant from the Technology Planning Project of Guangdong Province (Project No.2012A011100005), and the grant from the Fundamental Research Funds for the Central Universities (Project No.2011ZM0069).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lv, J., Yu, Z. & Zhang, T. Towards an immunity based distributed algorithm to detect harmful files shared in P2P networks. Peer-to-Peer Netw. Appl. 8, 49–62 (2015). https://doi.org/10.1007/s12083-013-0221-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-013-0221-7