2011 IEEE Nineteenth IEEE International Workshop on Quality of Service 2011
DOI: 10.1109/iwqos.2011.5931313
|View full text |Cite
|
Sign up to set email alerts
|

Identity attack and anonymity protection for P2P-VoD systems

Abstract: Abstract-As P2P multimedia streaming service is becoming more popular, it is important for P2P-VoD content providers to protect their servers identity. In this paper, we first show that it is possible to launch an "identity attack": exposing and identifying servers of peer-to-peer video-on-demand (P2P-VoD) systems. The conventional wisdom of the P2P-VoD providers is that identity attack is very difficult because peers cannot distinguish between regular peers and servers in the P2P streaming process. We are the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Content pollution is the most popular and common attack in P2P streaming systems [ 74 ]; it was detected in 50%-80% of files in KaZaA and about 50% of popular files in eDonkey [ 73 , 74 ]. Pollution is not necessarily caused by malicious users; P2P systems are notorious for illegally sharing and disseminating copyrighted content, and content is often polluted by copyright owners as a countermeasure to protect their rights when legal actions fail [ 71 , 72 ]. To facilitate the protection of copyright claims, some P2P system providers even weaken protection from pollution attacks in their network [ 73 ], although this affects the confidence of users in such systems [ 72 , 73 ].…”
Section: Resultsmentioning
confidence: 99%
“…Content pollution is the most popular and common attack in P2P streaming systems [ 74 ]; it was detected in 50%-80% of files in KaZaA and about 50% of popular files in eDonkey [ 73 , 74 ]. Pollution is not necessarily caused by malicious users; P2P systems are notorious for illegally sharing and disseminating copyrighted content, and content is often polluted by copyright owners as a countermeasure to protect their rights when legal actions fail [ 71 , 72 ]. To facilitate the protection of copyright claims, some P2P system providers even weaken protection from pollution attacks in their network [ 73 ], although this affects the confidence of users in such systems [ 72 , 73 ].…”
Section: Resultsmentioning
confidence: 99%
“…We also plan to investigate dynamic and self-adaptive monitoring intervals which could be increased or decreased in runtime based on the system load. presents a model and estimates content pollution propagation [11][12][13] ✓ employs band codes to construct black lists of polluters [47] ✓ network coding is employed to allow the identification of polluters and limit content pollution [32] ✓ proposes the application of black lists to live streaming [17,27] ✓ transmits hash-based signatures of all chunks; the challenge is to receive hashes in advance for live streaming [21,24] ✓ applies cryptography to every whole chunk and employs a distributed key management scheme [36] ✓ employs peer groups to ensure chunk integrity; the server publishes content information in that group; peers access the group to verify chunks integrity [34] ✓ Merkle-trees are employed that use hashes to guarantee the integrity of streams of chunks [35] presents an evaluation of black lists, cryptography, hash-based verification and digital signatures [38] presents an evaluation of the impact of pollution attacks; shows that the impact depends on the stability of the network, and on the bandwidth available at both malicious peers and the source [37] evaluates content authentication mechanisms to live streaming [39,40] ✓ employs reputation and ranking to file sharing P2P systems [22] ✓ employs reputation and ranking to live streaming; the reputation mechanisms are based on peer experience [23] shows that reputation-based approaches can suffer with the collusion of malicious peers, with false positives, and present a high delay to propagate conclusions [41] a confidence management strategy is proposed based on retransmissions of the polluted data; depending on the situation the number of retransmissions can be high [42] in order to prevent DDoS attacks on streming sources proposes a strategy to hide source identity; used in the context of P2P VoD [43] presents a through evaluation of SopCast reaches the conclusion that a single attacker can harm up to 50% of peers and consume up to 30% of the available bandwidth [44] a centralised (non-distributed) solution is proposed to detect polluters in live streaming networks employing comparasionbased system-level diagnosis [this work] ✓ presents a distributed strategy that employs comparison-based diagnosis to combat pollution in live streaming; each peer independently identifies and stops requesting chunks from its polluter neighbours…”
Section: Resultsmentioning
confidence: 99%
“…In [9] a strategy is proposed based on an overlay to monitor and isolate content pollution in video-on-demand (VoD) P2P networks. Earlier, in [42] the authors presented a strategy to hide source identity in these networks. The purpose is to avoid DDoS attacks directed at the sources, which can completely destroy live streaming sessions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [20] the authors present a strategy to hide the identity of source servers in P2P-VoD (Video-on-Demand) networks. This is important as with that information a bad intentioned entity can direct attacks such as DDoS to those servers in order to harm the live streaming session.…”
Section: Related Workmentioning
confidence: 99%