WINNOWING : Protecting P 2 P Systems Against Pollution By Cooperative Index Filtering

Pollution (i.e., sharing corrupted files, or contaminating index information with bogus index records) is ade facto problem in many file sharing Peer-to-Peer (P2P) systems. Sin ce pollution squanders network resources and frustrates user s with unprofitable downloads (due to polluted files) and unproduct ive download requests (due to bogus index records), the future success of file sharing based P2P systems is questionable unl ess properly addressed. In this paper, we propose a novel anti-pollution scheme call ed winnowing. Winnowing aims to purify the index records (i.e. the information on files or the publishers) held by each index node in the system, so that download attempts based on these index records are more likely to yield satisfactory results. To at tain this goal, index nodes block bogus publish messages by verifying the publisher and the contents of the publish message upon recei pt of a keyword or content publish message. Second, index nodes collect feedback from the users who have downloaded files via their index records. The collected feedback is then process ed and reflected in the matching index record in a novel way. Careful consideration is given to reducing the impact of false feedb ack, and malicious index nodes. Publish message verification has been implemented on top of the latest eMule client and extensive data has been collecte d from the Kad network, using this modified client. The measurement results are summarized in this paper. The the findings from the measurement study are incorporated into our analytical model, which is used to investigate the performance of user feedbac k mediation. The model demonstrates the effectiveness of use r f edback mediation: fast convergence to near-optimal performance and insensitivity to various pollution attacks including the attacks which attempt to bypass winnowing.

[1]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[5]  Masayuki Terada,et al.  Managing resource and servent reputation in P2P networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[6]  Keith W. Ross,et al.  Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems , 2005, AINTEC.

[7]  Aleksandar Kuzmanovic,et al.  Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.

[8]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[10]  Mario Gerla,et al.  Understanding Pollution Dynamics in P2P File Sharing , 2006, IPTPS.

[11]  Daniel Stutzbach,et al.  Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[12]  Emin Gün Sirer,et al.  Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.

[13]  Rakesh Kumar,et al.  Fluid modeling of pollution proliferation in P2P networks , 2006, SIGMETRICS '06/Performance '06.

[14]  Virgílio A. F. Almeida,et al.  Impact of peer incentives on the dissemination of polluted content , 2006, SAC.

[15]  Keith W. Ross,et al.  The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[16]  Virgílio A. F. Almeida,et al.  Fighting pollution dissemination in peer-to-peer networks , 2007, SAC '07.

[17]  Qinyuan Feng,et al.  LIP: A Lifetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems , 2007, IPTPS.

[18]  Prithula Dhungel,et al.  The pollution attack in P2P live video streaming: measurement results and defenses , 2007, P2P-TV '07.

[19]  Taoufik En-Najjary,et al.  Exploiting KAD: possible uses and misuses , 2007, CCRV.

[20]  Jussara M. Almeida,et al.  Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).

[21]  Yongdae Kim,et al.  Attacking the Kad network , 2008, SecureComm.