skip to main content
research-article

Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring

Published: 23 March 2010 Publication History

Abstract

Current peer-to-peer (P2P) streaming systems often assume that nodes cooperate to upload and download data. However, in the open environment of the Internet, this is not necessarily true and there exist malicious nodes in the system. In this article, we study malicious actions of nodes that can be detected through peer-based monitoring. We require each node to monitor the data received and to periodically send monitoring messages about its neighbors to some trustworthy nodes. To efficiently store and search messages among multiple trustworthy nodes, we organize trustworthy nodes into a threaded binary tree. Trustworthy nodes also dynamically redistribute monitoring messages among themselves to achieve load balancing. Our simulation results show that this scheme can efficiently detect malicious nodes with high accuracy, and that the dynamic redistribution method can achieve good load balancing among trustworthy nodes.

References

[1]
Aberer, K. and Despotovic, Z. 2001. Managing trust in a peer-2-peer information system. In Proceedings of the ACM Conference on Information and Knowledge Management (CIKM). 310--317.
[2]
Adar, E. and Huberman, B. A. 2000. Free riding on Gnutella. Tech. rep., HP. http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf.
[3]
Banerjee, S., Bhattacharjee, B., and Kommareddy, C. 2002. Scalable application layer multicast. In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM). 205--217.
[4]
Chen, R. and Yeager, B. 2001. Poblano: A distributed trust model for peer-to-peer networks. Tech. rep. SUN Microsystems.
[5]
Chu, Y. H., Rao, S., Seshan, S., and Zhang, H. 2002. A case for end system multicast. IEEE J. Sel. Areas Commun. 20, 8, 1456--1471.
[6]
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. 2001. Introduction to Algorithms. MIT Press.
[7]
Cornelli, F., Damiani, E., Vimercati, S., Paraboschi, S., and Samarati, P. 2002. Choosing reputable servents in a P2P network. In Proceedings of the Conference on the World Wide Web (WWW). 376--386.
[8]
Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P., and Violante, F. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS). 207--216.
[9]
Deering, S. E. 1988. Multicast routing in internetworks and extended LANs. ACM SIGCOMM CCR '18, 4, 55--64.
[10]
Do, T., Hua, K. A., and Tantaoui, M. 2004. P2VoD: Providing fault tolerant video-on-demand streaming in peer-to-peer environment. In Proceedings of the IEEE International Communications Conference (ICC). 1467--1472.
[11]
Dragovic, B., Kotsovinos, E., Hand, S., and Pietzuch, P. 2003. XenoTrust: Event-based distributed trust management. In Proceedings of the International Conference on Database and Expert Systems (DEXA).
[12]
Guo, Y., Suh, K., Kurose, J., and Towsley, D. 2003. P2Cast: Peer-to-peer patching scheme for VoD service. In Proceedings of the Conference on the World Wide Web (WWW). 301--309.
[13]
Habib, A. and Chuang, J. 2006. Service differentiated peer selection: An incentive mechanism for peer-to-peer media streaming. IEEE Trans. Multimedia 8, 3, 610--621.
[14]
Hei, X., Liang, C., Liang, J., Liu, Y., and Ross, K. W. 2007. A measurement study of a large-scale P2P IPTV system. IEEE Trans. Multimedia 9, 8, 1672--1687.
[15]
Hernandez, E. A., Chidester, M. C., and George, A. D. 2001. Adaptive sampling for network management. J. Netw. Syst. Manage. 9, 4.
[16]
Jannotti, J., Gifford, D. K., Johnson, K. L., Kaashoek, M. F., and O'Toole, J. W. 2000. Overcast: Reliable multicasting with an overlay network. In Proceedings of the USINEX Symposium on Operating Systems Design and Implementation (OSDI). 197--212.
[17]
Jin, X., Chan, S.-H. G., Yiu, W.-P. K., Xiong, Y., and Zhang, Q. 2006a. Detecting malicious hosts in the presence of lying hosts in peer-to-peer streaming. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME). 1537--1540.
[18]
Jin, X., Xia, Q., and Chan, S.-H. G. 2006b. Building a monitoring overlay for peer-to-peer streaming. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM).
[19]
Jun, S., Ahamad, M., and Xu, J. 2005. Robust information dissemination in uncooperative environments. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). 293--302.
[20]
Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the Conference on the World Wide Web (WWW). 640--651.
[21]
KaZaa. http://www.kazaa.com.
[22]
Knuth, D. E. 1998. The Art of Programming, Volume 3: Sorting and Searching 2nd Ed. Addison-Wesley.
[23]
Lai, K., Feldman, M., Chuang, J., and Stoica, I. 2003. Incentives for cooperation in peer-to-peer networks. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems (P2PECON).
[24]
Liu, J. and Zhou, M. 2006. Tree-assisted gossiping for overlay video distribution. Kluwer Multimedia Tools Appl. 29, 3, 211--232.
[25]
Marti, S. and Garcia-Molina, H. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50, 40, 472--484.
[26]
Mekouar, L., Iraqi, Y., and Boutaba, R. 2006. Peer-to-peer's most wanted: malicious peers. Comput. Netw. 50, 4, 545--562.
[27]
Nielson, S., Crosby, S., and Wallach, D. 2005. A taxonomy of rational attacks. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS).
[28]
Rodrigues, R. and Liskov, B. 2005. High availability in DHTs: Erasure coding vs. replication. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS).
[29]
Rowstron, A. and Druschel, P. 2001. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP). 188--201.
[30]
Sherwood, R., Lee, S., and Bhattacharjee, B. 2006. Cooperative peer groups in NICE. Comput. Netw. 50, 4, 523--544.
[31]
Singh, A., Castro, M., Druschel, P., and Rowstron, A. 2004. Defending against Eclipse attacks on overlay networks. In Proceedings of the ACM Special Interest Group on Operating Systems European Workshops (SIGOPS EW).
[32]
Singh, A. and Liu, L. 2003. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. In Proceedings of the IEEE Conference on Peer to Peer Computing (P2P). 142--149.
[33]
SSL. Introduction to SSL, http://docs.sun.com/source/816-6156-10/contents.htm.
[34]
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM). 149--160.
[35]
Tan, G. and Jarvis, S. A. 2006. A payment-based incentive and service differentiation mechanism for peer-to-peer streaming broadcast. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS). 41--50.
[36]
Tang, Y., Luo, J.-G., Zhang, Q., Zhang, M., and Yang, S.-Q. 2007. Deploying P2P networks for large-scale live video-streaming service. IEEE Comm. Mag. 45, 6, 100--106.
[37]
Tran, D. A., Hua, K. A., and Do, T. T. 2004. A peer-to-peer architecture for media streaming. IEEE J. Sel. Areas Commun. 22, 1, 121--133.
[38]
Xiong, L. and Liu, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Know. Data Engin. 16, 7, 843--857.
[39]
Zhang, B., Jamin, S., and Zhang, L. 2002. Host multicast: A framework for delivering multicast to end users. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 1366--1375.
[40]
Zhang, X., Liu, J., Li, B., and Yum, T.-S. P. 2005. CoolStreaming/DONet: A data-driven overlay network for peer-to-peer live media streaming. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 2102--2111.

Cited By

View all
  • (2020)MethodologyText Segmentation and Recognition for Enhanced Image Spam Detection10.1007/978-3-030-53047-1_3(43-53)Online publication date: 11-Aug-2020
  • (2018)Distributed classification for image spam detectionMultimedia Tools and Applications10.1007/s11042-017-4944-y77:11(13249-13278)Online publication date: 1-Jun-2018
  • (2017)A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA.2017.224(128-134)Online publication date: Oct-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 6, Issue 2
March 2010
119 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/1671962
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 March 2010
Accepted: 01 January 2009
Revised: 01 January 2009
Received: 01 September 2008
Published in TOMM Volume 6, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Malicious nodes
  2. peer monitoring
  3. peer-to-peer streaming

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)MethodologyText Segmentation and Recognition for Enhanced Image Spam Detection10.1007/978-3-030-53047-1_3(43-53)Online publication date: 11-Aug-2020
  • (2018)Distributed classification for image spam detectionMultimedia Tools and Applications10.1007/s11042-017-4944-y77:11(13249-13278)Online publication date: 1-Jun-2018
  • (2017)A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA.2017.224(128-134)Online publication date: Oct-2017
  • (2016)Credibility based feedback for reputation computation in peer-to-peer file sharing network2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)10.1109/JCSSE.2016.7748924(1-6)Online publication date: Jul-2016
  • (2016)Predicting the level of cooperation in a Peer-to-Peer live streaming applicationMultimedia Systems10.1007/s00530-014-0434-522:2(161-180)Online publication date: 1-Mar-2016
  • (2015)Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live StreamingIEEE Transactions on Multimedia10.1109/TMM.2015.240251617:4(562-573)Online publication date: Apr-2015
  • (2015)Using K-nearest neighbor algorithm to reduce false negatives in P2P secure routing protocols2015 International Wireless Communications and Mobile Computing Conference (IWCMC)10.1109/IWCMC.2015.7289207(929-934)Online publication date: Aug-2015
  • (2015)Pollution-resilient peer-to-peer video streaming with Band Codes2015 IEEE International Conference on Multimedia and Expo (ICME)10.1109/ICME.2015.7177408(1-6)Online publication date: Jun-2015
  • (2015)Study of Filter Sharing Method Using Virtual Peers in P2P Networks2015 IEEE 29th International Conference on Advanced Information Networking and Applications10.1109/AINA.2015.259(720-726)Online publication date: Mar-2015
  • (2014)DIPACM Transactions on Multimedia Computing, Communications, and Applications10.1145/256822310:3(1-20)Online publication date: 17-Apr-2014
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media