The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications

There has been significant progress in the development and deployment of peer-to-peer (P2P) live video streaming systems. However, there has been little study on the security aspect in such systems. Our prior experiences in Anysee exhibit that existing systems are largely vulnerable to intermediate attacks, in which the content pollution is a common attack that can significantly reduce the content availability, and consequently impair the playback quality. This paper carries out a formal analysis of content pollution and discusses its implications in P2P live video streaming systems. Specifically, we establish a probabilistic model to capture the progress of content pollution. We verify the model using a real implementation based on Anysee system; we evaluate the content pollution effect through extensive simulations. We demonstrate that (1) the number of polluted peers can grow exponentially, similar to random scanning worms. This is vital that with 1% polluters, the overall system can be compromised within minutes; (2) the effective bandwidth utilization can be sharply decreased due to the transmission of polluted packets; (3) Augmenting the number of polluters does not imply a faster progress of content pollution, in which the most influential factors are the peer degree and access bandwidth. We further examine several techniques and demonstrate that a hash-based signature scheme can be effective against the content pollution, in particular when being used during the initial phase.

[1]  Keith W. Ross,et al.  Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems , 2005, AINTEC.

[2]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[3]  Juan E. Tapiador,et al.  A Protocol for Secure Content Distribution in Pure P2P Networks , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).

[4]  Rakesh Kumar,et al.  The FastTrack overlay: A measurement study , 2006, Comput. Networks.

[5]  Vincent W. S. Chan Near-Term Future of the Optical Network in Question? , 2007, IEEE J. Sel. Areas Commun..

[6]  Minaxi Gupta,et al.  A study of malware in peer-to-peer networks , 2006, IMC '06.

[7]  Bo Li,et al.  Inside the New Coolstreaming: Principles and Measurements , 2007 .

[8]  Yunhao Liu,et al.  AnySee: Peer-to-Peer Live Streaming , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  Hai Jin,et al.  P2P Live Streaming with Tree-Mesh based Hybrid Overlay , 2007, 2007 International Conference on Parallel Processing Workshops (ICPPW 2007).

[10]  Qian Zhang,et al.  Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[11]  Prithula Dhungel,et al.  The pollution attack in P2P live video streaming: measurement results and defenses , 2007, P2P-TV '07.

[12]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[13]  Rakesh Kumar,et al.  Fluid modeling of pollution proliferation in P2P networks , 2006, SIGMETRICS '06/Performance '06.

[14]  Guanling Chen,et al.  Simulating non-scanning worms on peer-to-peer networks , 2006, InfoScale '06.

[15]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[16]  Robbert van Renesse,et al.  Defense against Intrusion in a Live Streaming Multicast System , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[17]  Krishna P. Gummadi,et al.  Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.

[18]  Bo Li,et al.  DONet: A Data-Driven Overlay Network For Efficient Live Media Streaming , 2004, INFOCOM 2005.

[19]  Virgílio A. F. Almeida,et al.  Impact of peer incentives on the dissemination of polluted content , 2006, SAC.

[20]  Vern Paxson,et al.  Proceedings of the 13th USENIX Security Symposium , 2022 .

[21]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .