Pollution Attacks Detection in the P2PSP Live Streaming System

  • Cristóbal Medina-López
  • L. G. Casado
  • Vicente González-Ruiz
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 369)

Abstract

This work studies the pollution attack: a challenging security-related problem in peer-to-peer streaming platforms. Different variations of this attack and its combinations are addressed. In order to mitigate such attacks, two different strategies have been proposed in the context of the P2PSP live streaming system, a peer-to-peer streaming platform with free access (i.e. it is not necessary to provide an identification and only endpoints are stored). The first prevention strategy is based on the existence of anonymous trusted peers that detect and report attackers, which are finally expelled. The second strategy increases the security level in the overlay at the cost of a higher computation and communication overhead. Both strategies are analyzed theoretically for several attack configurations.

Keywords

P2PSP Content integrity Live streaming Pollution attacks  Peer-to-peer networks 

References

  1. 1.
    Bellovin, S.M.: Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Commun. Rev. 19(2), 32–48 (1989)CrossRefGoogle Scholar
  2. 2.
    Conner, W., Nahrstedt, K.: Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: Proceedings of the 4th on Middleware Doctoral Symposium, p. 13. ACM (2007)Google Scholar
  3. 3.
    Conrad, M.: Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. In: Proceedings of the 2006 ACM CoNEXT Conference, CoNEXT ’06, pp. 30:1–30:2. ACM, New York, NY, USA (2006)Google Scholar
  4. 4.
    Dai, W.: Speed Comparison of Popular Crypto Algorithms. http://www.cryptopp.com/benchmarks.html
  5. 5.
    Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IP-TV, pp. 323–328. ACM (2007)Google Scholar
  6. 6.
    Gouda, M.G.: Keynote talk: communication without repudiation: the unanswered question. In: Networked Systems, pp. 1–8. Springer (2014)Google Scholar
  7. 7.
    Hu, Bo., Zhao, H.V.: Pollution-resistant peer-to-peer live streaming using trust management. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp. 3057–3060, Nov 2009Google Scholar
  8. 8.
    Xin, K., Wu, Y.: A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput. Netw. 72, 62–73 (2014)Google Scholar
  9. 9.
    Lin, W.S., Zhao, H.V., Liu, K.J.R.: Attack-resistant collaboration in wireless video streaming social networks. In: 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–4. IEEE (2010)Google Scholar
  10. 10.
    Cigno, R.L., Russo, A., Carra, D.: On some fundamental properties of P2P push/pull protocols. In: ICCE 2008 Second International Conference on Communications and Electronics, pp. 67–73. IEEE (2008)Google Scholar
  11. 11.
    Magharei, N., Rejaie, R.: Understanding mesh-based peer-to-peer streaming. In: Proceedings of the 2006 international Workshop on Network and Operating Systems Support for Digital Audio and Video, p. 10. ACM (2006)Google Scholar
  12. 12.
    Marti, S., Garcia-Molina, H.: Identity crisis: anonymity vs reputation in P2P systems. In: Proceedings of Third International Conference on Peer-to-Peer Computing, (P2P 2003). pp. 134–141. IEEE (2003)Google Scholar
  13. 13.
    Medina-López, C., García-Ortiz, J.P., Naranjo, J.A.M., Casado, L.G., González-Ruiz, V.: IPTV using P2PSP and HTML5+WebRTC. In: The Fourth W3C Web and TV Workshop. Munich, Germany, March 2014Google Scholar
  14. 14.
    Medina-López, C., Naranjo, J.A.M., García-Ortiz, J.P., Casado, L.G., González-Ruiz, V.: Execution of the P2PSP protocol in parallel environments. In: Guillermo Botella y Alberto A. Del Barrio Garcia, editor, Actas XXIV Jornadas de Paralelismo (http://www.congresocedi.es/images/site/actas/ActasParalelismo.pdf), pp. 216–221. Madrid, Septiembre 2013
  15. 15.
    Liu, Y., Yang, S., Guo, L., Chen, W., Guo, L.: A distributed trust-based reputation model in p2p system. In: 2007 Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, vol. 1, pp. 294–299, July 2007Google Scholar
  16. 16.
    Salama, P., Shroff, N.B., Coyle, E.J., Delp, E.J.: Error concealment techniques for encoded video streams. In: International Conference on Image Processing, vol. 1, pp. 9–9. IEEE Computer Society (1995)Google Scholar
  17. 17.
    P2PSP Team. Peer to Peer Straightforward Protocol. http://p2psp.org/en/p2psp-protocol
  18. 18.
    Vieira, A.B., Campos, S., Almeida, J.: Fighting attacks in P2P live streaming. simpler is better. In: IEEE INFOCOM Workshops 2009, pp. 1–2. IEEE (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Cristóbal Medina-López
    • 1
  • L. G. Casado
    • 1
  • Vicente González-Ruiz
    • 1
  1. 1.University of Almería (CeiA3)AlmeríaSpain

Personalised recommendations