Análise do Impacto de Ataques de Poluição Combinado com Whitewashing em Sistemas P2P de Live Streaming

  • Rafael Barra de Almeida UFJF
  • Alex Borges Vieira UFJF
  • Ana Paula Couto Silva UFJF

Abstract


P2P live streaming has become a popular method of transmitting live content. Due to its popularity, it may be the target of attacks and opportunistic users behavior. These attacks can lower transmission quality or even make users abandon the system. In this article, we address attacks in a P2P system. More precisely, we analyze a reputation system in a mesh based P2P system under a pollution attack. During the attack, malicious users collude and also change their identities (whitewashing) often trying to cheat the reputation system. We have tested the reputation system on PlanetLab, which confirms it efficiency during an attack without whitewashing. Ours results are twofold: first we show that just verifying package integrity is not an effective protection. In this case, peers have to ask again for the polluted data, generating a significant data transmission overhead. Second, a simple reputation mechanism is effective against pollution attack and peers collusion, but when malicious peers do whitewashing, the mechanism becomes ineffective. In this case, we note up to 180% of overhead due pollution and retransmission.

References

Borges, A., Almeida, J., and Campos, S. (2008). Fighting pollution in p2p live streaming systems. In Multimedia and Expo, 2008 IEEE International Conference on.

Chen, J., Lu, H., and Bruda, S. (2009). A solution for whitewashing in p2p systems based on observation preorder. In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, pages 547–550. IEEE.

Dhungel, P., Hei, X., Ross, K., and Saxena, N. (2007). The pollution attack in p2p live video streaming: measurement results and defenses. In Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV, pages 323–328. ACM.

Feldman, M., Papadimitriou, C., Chuang, J., and Stoica, I. (2006). Free-riding and whitewashing in peer-to-peer systems. Selected Areas in Communications, IEEE Journal on, 24(5):1010–1019.

Friedman, E. and Resnick, P. (1999). The social cost of cheap pseudonyms. Ann Arbor, 1001:48109–1092.

Haizhou, W., Xingshu, C., and Wenxian, W. (2011). A measurement study of polluting a large-scale p2p iptv system. In College of Computer Science, Sichuan University, Chengdu 610065, P. R. China.

Haridasan, M. and van Renesse, R. (2007). Securestream: An intrusion-tolerant protocol for live-streaming dissemination. In Journal of Computer Communications. Special issue on Foundation of Peer-to-Peer Computing. Elsevier.

Hei, X., Liang, C., Liang, J., Liu, Y., and Ross, K. (2007). A measurement study of a large-scale p2p iptv system. Multimedia, IEEE Transactions on, 9(8):1672–1687.

Hei, X., Liu, Y., and Ross, K. (2008). Iptv over p2p streaming networks: the mesh-pull approach. Communications Magazine, IEEE, 46(2):86–92.

Lin, E., de Castro, D., Wang, M., and Aycock, J. (2010). Spoim: A close look at pollution attacks in p2p live streaming. In Quality of Service (IWQoS), 2010 18th International Workshop on, pages 1–9. IEEE.

Marti, S. and Garcia-Molina, H. (2006). Taxonomy of trust: Categorizing p2p reputation systems. Computer Networks, 50(4):472–484.

Oualha, N. and Roudier, Y. (2009). A game theoretical approach in securing p2p storage against whitewashers. In Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009. WETICE’09. 18th IEEE International Workshops on.

Seibert, J., Sun, X., Nita-Rotaru, C., and Rao, S. (2010). Towards securing data delivery in peer-to-peer streaming. In Communication Systems and Networks (COMSNETS), 2010 Second International Conference on, pages 1–10. IEEE.

The New York Times (2009). CNN: Inauguration P2P Stream a Success, Despite Backlash.
Published
2012-04-30
ALMEIDA, Rafael Barra de; VIEIRA, Alex Borges; SILVA, Ana Paula Couto. Análise do Impacto de Ataques de Poluição Combinado com Whitewashing em Sistemas P2P de Live Streaming. In: FAULT TOLERANCE WORKSHOP (WTF), 13. , 2012, Ouro Preto/MG. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2012 . p. 31-40. ISSN 2595-2684. DOI: https://doi.org/10.5753/wtf.2012.23078.