On detecting malicious behaviors in interactive networks: Algorithms and analysis

Interactive networks are vulnerable to various attacks due to the existence of malicious nodes which do not comply with the network protocol so as to achieve their own purposes. For example, in a peer-to-peer (P2P) streaming system, since each peer needs to participate in uploading data to other peers, malicious peers may choose to upload bogus data so as to damage the playback and degrade the watching experience of normal peers in the system. This is known as pollution attack in P2P networks, and it can cause severe impact to the performance of P2P streaming systems. Other examples include pollution attack in wireless mesh networks (WMNs) where malicious nodes forward modified and polluted packets to other nodes, and the shill attack in online social networks (OSNs) where malicious users give wrong recommendations to others so as to mislead their purchases. In this paper, we propose a general and fully distributed detection framework which can be executed by each legitimate node in an interactive network to identify its malicious neighbors. To illustrate the effectiveness and the efficiency of our detection framework, we apply it to three realistic applications: P2P streaming networks, WMNs and OSNs, and show how to defend against the attacks launched by malicious nodes. We also quantify the performance of our detection algorithms and validate our analysis via extensive simulations.

[1]  John C. S. Lui,et al.  Mathematical Modeling of Advertisement and Influence Spread in Social Networks , 2009 .

[2]  John C. S. Lui,et al.  Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[3]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[4]  Eli Berger Dynamic Monopolies of Constant Size , 2001, J. Comb. Theory, Ser. B.

[5]  Athina Markopoulou,et al.  Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac , 2010, 2010 IEEE International Symposium on Network Coding (NetCod).

[6]  Robert Tappan Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.

[7]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[8]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[9]  Sachin Katti,et al.  Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.

[10]  Tracey Ho,et al.  Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.

[11]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[12]  Prithula Dhungel,et al.  The pollution attack in P2P live video streaming: measurement results and defenses , 2007, P2P-TV '07.

[13]  John C. S. Lui,et al.  Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[14]  Donald F. Towsley,et al.  On distinguishing between Internet power law topology generators , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[15]  John C. S. Lui,et al.  DCAR: Distributed Coding-Aware Routing in Wireless Networks , 2010, IEEE Trans. Mob. Comput..

[16]  Sachin Katti,et al.  The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .

[17]  John C. S. Lui,et al.  Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems , 2010, Perform. Evaluation.

[18]  Robert Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM 2004.

[19]  C. Fragouli,et al.  On Locating Byzantine Attackers , 2008, 2008 Fourth Workshop on Network Coding, Theory and Applications.

[20]  Tracey Ho,et al.  On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[21]  S Meenatchi Distributed Coding Aware-Routing in Wireless Networks , 2012 .

[22]  John C. S. Lui,et al.  On Modeling Product Advertisement in Large-Scale Online Social Networks , 2012, IEEE/ACM Transactions on Networking.

[23]  D. Peleg Local Majority Voting, Small Coalitions and Controlling Monopolies in Graphs: A Review , 1996 .

[24]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..