2013 IEEE International Conference on Communications (ICC) 2013
DOI: 10.1109/icc.2013.6654819
|View full text |Cite
|
Sign up to set email alerts
|

Pollution and whitewashing attacks in a P2P live streaming system: Analysis and counter-attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…However, the altered content may be malicious, fake, or corrupt. This affects the network’s quality of service (especially in file, voice, and video-based P2P streaming systems [ 72 , 73 , 75 , 79 , 80 ]), overall system energy consumption [ 74 ], content availability [ 78 ], and data integrity [ 72 ]. Pollution is an easy and fast way to disseminate worms or viruses from one to many peers in the network.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…However, the altered content may be malicious, fake, or corrupt. This affects the network’s quality of service (especially in file, voice, and video-based P2P streaming systems [ 72 , 73 , 75 , 79 , 80 ]), overall system energy consumption [ 74 ], content availability [ 78 ], and data integrity [ 72 ]. Pollution is an easy and fast way to disseminate worms or viruses from one to many peers in the network.…”
Section: Resultsmentioning
confidence: 99%
“…Analysis of the contents collected by the crawler revealed that over 50% of welcome copies (ie, introductory files for a collection of files) for musical files in the KaZaA network were polluted [ 73 ]. Pollution is a serious attack on P2P networks, even in a scenario with only one polluter [ 72 , 75 ]. The impact grows when the number of polluters or peers attempting a request increases [ 75 ].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Li and Lui [28] presented a set of randomised and fully distributed defence and detection analytical model to evaluate the defence effects for content pollution attack, in which they considered single attacker and multiple attackers within the neighbourhood of the detecting peer. In [29], de Almeida et al . presented a preliminary theory model to evaluate the impact of pollution attack from the view of pollution overhead.…”
Section: Related Workmentioning
confidence: 99%