Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems

Pollution attack is known to have a disastrous effect on existing P2P infrastructures: it can reduce the number of legitimate P2P users by as much as 85%, and it generates abundant bogus data which may deplete the communication bandwidth. We propose a distributed defense and detection mechanism to resolve pollution attacks. The mechanism is composed of a set of ''randomized'' and ''fully distributed'' algorithms that can be executed by any legitimate peer. We present the analytical framework to quantify (a) the probability of false negative, (b) the probability of false positive, and (c) the distribution of time needed for detection. In our detection algorithm and analysis, we consider the case of (1) single attacker within the neighborhood, (2) multiple attackers within the neighborhood. Furthermore, we show how to ''optimize'' the system parameters so as to quickly discover and eliminate malicious peers from the system.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Indranil Gupta,et al.  Preventing DoS attacks in peer-to-peer media streaming systems , 2006, Electronic Imaging.

[3]  John S. Baras,et al.  Malicious Users in Unstructured Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  P. Gauthier,et al.  Dealing with Cheaters in Anonymous Peer-to-Peer Networks , 2004 .

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Srinivas Shakkottai,et al.  The asymptotic behavior of minimum buffer size requirements in large P2P streaming networks , 2009, 2010 Information Theory and Applications Workshop (ITA).

[8]  Prithula Dhungel,et al.  The pollution attack in P2P live video streaming: measurement results and defenses , 2007, P2P-TV '07.

[9]  Bo Li,et al.  Inside the New Coolstreaming: Principles, Measurements and Performance Implications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Emin Gün Sirer,et al.  Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.

[11]  Bo Li,et al.  Inside the New Coolstreaming: Principles and Measurements , 2007 .

[12]  Qian Zhang,et al.  Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[13]  John C. S. Lui,et al.  A Simple Model for Analyzing P2P Streaming Protocols , 2007, 2007 IEEE International Conference on Network Protocols.

[14]  Cheng Huang,et al.  Challenges, design and analysis of a large-scale p2p-vod system , 2008, SIGCOMM '08.

[15]  A. Singh Challenges " # , 2006 .

[16]  Emin Gün Sirer,et al.  Thwarting P2P Pollution Using Object Reputation , 2005 .

[17]  Carey L. Williamson,et al.  Analysis of bittorrent-like protocols for on-demand stored media streaming , 2008, SIGMETRICS '08.