Application of Fault-Tolerant Mechanism to Reduce Pollution Attacks in Peer-to-Peer Networks

File pollution is a recent security threat to peer-to-peer (P2P) file sharing systems. By disseminating numerous polluted files with mismatched or partially tampered contents in the P2P system, the attacker causes users to download unexpected files. This attack is aimed at frustrating users and making them abandon the system. Present researches on combating file pollution have mostly focused on pollution modeling or evaluating the extent of pollution. Only a few researches have proposed effective methods to eliminate pollution attacks, and they are primarily based on reputation systems and blacklisting mechanisms. However, these methods require exchange of significant feedback among the peers in order to identify the malicious peers or polluted files in the system. In this paper, we describe the application of fault-tolerant mechanism used in the redundant arrays of independent disks system to suppress file pollution attacks based on the concept that P2P file sharing systems currently have global file storage systems. We have extended the previously developed Fluid Model to analyze and evaluate the proposed antipollution mechanism. The model accuracy has been demonstrated by performing several simulation experiments; the proposed mechanism could effectively suppress the pollution and successfully decrease the polluted-time exposure of a P2P file sharing system by approximately 40∼60%.

[1]  Luciano Paschoal Gaspary,et al.  A conservative strategy to protect P2P file sharing systems from pollution attacks , 2011, Concurr. Comput. Pract. Exp..

[2]  Yu-Kwong Kwok,et al.  Autonomic Peer-to-Peer Systems: Incentive and Security Issues , 2009, Autonomic Computing and Networking.

[3]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[4]  Dong Wei,et al.  Artificial Immunology Based Anti-Pollution P2P File Sharing System , 2007, Sixth International Conference on Grid and Cooperative Computing (GCC 2007).

[5]  Mario Gerla,et al.  Understanding Pollution Dynamics in P2P File Sharing , 2006, IPTPS.

[6]  Tzone-I Wang,et al.  Independent Row-Oblique Parity for Double Disk Failure Correction , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[7]  Juan C. Burguillo,et al.  Implementation and analysis of the BitTorrent protocol with a multi-agent model , 2011, J. Netw. Comput. Appl..

[8]  Qijun Gu,et al.  Modeling of pollution in p2p file sharing systems , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[9]  Aphrodite Tsalgatidou,et al.  Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers , 2012, Comput. Sci. Rev..

[10]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..

[11]  Douglas S. Reeves,et al.  Winnowing: Protecting P2P systems against pollution through cooperative index filtering , 2012, J. Netw. Comput. Appl..

[12]  Christos Gkantsidis,et al.  On the feasibility of commercial, legal P2P content distribution , 2006, CCRV.

[13]  Peter F. Corbett,et al.  Row-Diagonal Parity for Double Disk Failure Correction (Awarded Best Paper!) , 2004, USENIX Conference on File and Storage Technologies.

[14]  Aleksandar Kuzmanovic,et al.  Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.

[15]  Danny Bickson,et al.  The eMule Protocol Specification , 2005 .

[16]  Yong Yu,et al.  A unified model of pollution in P2P networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[17]  Chin-Chen Chang,et al.  A lossless data embedding technique by joint neighboring coding , 2009, Pattern Recognit..

[18]  Jehoshua Bruck,et al.  X-Code: MDS Array Codes with Optimal Encoding , 1999, IEEE Trans. Inf. Theory.

[19]  Hari Balakrishnan,et al.  Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.

[20]  Jehoshua Bruck,et al.  EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures , 1995, IEEE Trans. Computers.

[21]  Mark Coates,et al.  Epidemiological Modelling of Peer-to-Peer Viruses and Pollution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[22]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[23]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[24]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[25]  Keith W. Ross,et al.  Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems , 2005, AINTEC.

[26]  Virgílio A. F. Almeida,et al.  Fighting pollution dissemination in peer-to-peer networks , 2007, SAC '07.

[27]  Virgílio A. F. Almeida,et al.  Impact of peer incentives on the dissemination of polluted content , 2006, SAC.

[28]  Bo Li,et al.  A modeling framework of content pollution in Peer-to-Peer video streaming systems , 2009, Comput. Networks.

[29]  Michalis Faloutsos,et al.  File-sharing in the Internet: A characterization of P2P traffic in the backbone , 2003 .

[30]  Nathaniel Good,et al.  Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.

[31]  Emin Gün Sirer,et al.  Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.

[32]  Rakesh Kumar,et al.  Fluid modeling of pollution proliferation in P2P networks , 2006, SIGMETRICS '06/Performance '06.

[33]  Prithula Dhungel,et al.  The pollution attack in P2P live video streaming: measurement results and defenses , 2007, P2P-TV '07.

[34]  Keith W. Ross,et al.  The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[35]  Xin Yang,et al.  An incentive mechanism to reinforce truthful reports in reputation systems , 2012, J. Netw. Comput. Appl..

[36]  Zhong Chen,et al.  A holistic mechanism against file pollution in peer-to-peer networks , 2009, SAC '09.

[37]  Wei Dong,et al.  Object Reputation Based Anti-Pollution P2P File Sharing System , 2007, 2006 1st International Conference on Digital Information Management.

[38]  Tzone-I Wang,et al.  Parity Placement Schemes to Facilitate Recovery from Triple Column Disk Failure in Disk Array Systems , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..