skip to main content
10.5555/2228298.2228309guideproceedingsArticle/Chapter ViewAbstractPublication PagesnsdiConference Proceedingsconference-collections
Article

Reliable client accounting for P2P-infrastructure hybrids

Published: 25 April 2012 Publication History

Abstract

Content distribution networks (CDNs) have started to adopt hybrid designs, which employ both dedicated edge servers and resources contributed by clients. Hybrid designs combine many of the advantages of infrastructure-based and peer-to-peer systems, but they also present new challenges. This paper identifies reliable client accounting as one such challenge. Operators of hybrid CDNs are accountable to their customers (i.e., content providers) for the CDN's performance. Therefore, they need to offer reliable quality of service and a detailed account of content served. Service quality and accurate accounting, however, depend in part on interactions among untrusted clients. Using the Akamai NetSession client network in a case study, we demonstrate that a small number of malicious clients used in a clever attack could cause significant accounting inaccuracies.
We present a method for providing reliable accounting of client interactions in hybrid CDNs. The proposed method leverages the unique characteristics of hybrid systems to limit the loss of accounting accuracy and service quality caused by faulty or compromised clients. We also describe RCA, a system that applies this method to a commercial hybrid content-distribution network. Using trace-driven simulations, we show that RCA can detect and mitigate a variety of attacks, at the expense of a moderate increase in logging overhead.

References

[1]
Joost. http://www.joost.com/.
[2]
Limelight networks. http://www.limelight.com/.
[3]
Octoshape. http://www.octoshape.com/.
[4]
Pando networks. http://www.pandonetworks.com/.
[5]
Velocix P2P assisted delivery. http://www.velocix.com/ network_delivery.php.
[6]
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proc. OSDI, Dec. 2002.
[7]
S. Agarwal and J. R. Lorch. Matchmaking for online games and other latency-sensitive P2P systems. In Proc. SIGCOMM, 2009.
[8]
Akamai acquires Red Swoosh. http://www.akamai. com/html/about/press/releases/2007/press_ 041207.html, Apr. 2007.
[9]
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In Proc. AsiaCCS, 2006.
[10]
R. A. Bazzi and G. Konjevod. On the establishment of distinct identities in overlay networks. In PODC, pages 312-320, 2005.
[11]
M. Cha, P. Rodriguez, J. Crowcroft, S. Moon, and X. Amatriain. Watching television over an IP network. In Proc. IMC, 2008.
[12]
E. Chan-Tin, D. Feldman, Y. Kim, and N. Hopper. The frogboiling attack: Limitations of anomaly detection for secure network coordinates. In Proc. SecureComm, 2009.
[13]
V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM Comput. Surv., 41:15:1-15:58, July 2009.
[14]
B. Cohen. Incentives build robustness in BitTorrent. In Proc. P2PEcon, June 2003.
[15]
D. E. Denning. An intrusion-detection model. IEEE Trans. on Software Engineering, 13(2):222-232, 1987.
[16]
M. Dischinger, A. Haeberlen, K. P. Gummadi, and S. Saroiu. Characterizing residential broadband networks. In Proc. IMC, Oct 2007.
[17]
J. R. Douceur. The Sybil attack. In Proc. IPTPS, Mar 2002.
[18]
M. J. Freedman and R. Morris. Tarzan: a peer-to-peer anonymizing network layer. In Proc. ACM CCS, 2002.
[19]
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proc. SOSP, Oct. 2003.
[20]
A. Haeberlen, P. Kuznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In SOSP, Oct. 2007.
[21]
C. Huang, A. Wang, J. Li, and K.W. Ross. Understanding hybrid CDN-P2P: why Limelight needs its own Red Swoosh. In Proc. NOSSDAV, 2008.
[22]
T. Karagiannis, P. Rodriguez, and K. Papagiannaki. Should Internet service providers fear peer-assisted content distribution? In Proc. IMC, 2005.
[23]
D. M. Lewin, B. Maggs, and J. J. Kloninger. Internet Content Delivery Service with Third Party Cache Interface Support. U.S. Patent Number 7,010,578, Mar. 2006.
[24]
Q. Lian, Z. Zhang, M. Yang, B. Y. Zhao, Y. Dai, and X. Li. An empirical study of collusion behavior in the Maze P2P file-sharing system. In Proc. ICDCS, 2007.
[25]
N. B. Margolin and B. N. Levine. Financial cryptography and data security; Chapter "Quantifying resistance to the Sybil attack". Springer-Verlag, 2008.
[26]
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov. Botgrep: finding P2P bots with structured graph analysis. In Proceedings of the 19th USENIX conference on Security, Aug. 2010.
[27]
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. M. Maggs, and Y.-C. Hu. Portcullis: Protecting connection setup from denial-of-capability attacks. In Proc. SIGCOMM, 2007.
[28]
R. S. Peterson and E. G. Sirer. Antfarm: efficient content distribution with managed swarms. In Proc. NSDI, 2009.
[29]
Major features in PunkBuster. http://www.evenbalance. com/index.php?page=info.php.
[30]
S. Seuken and D. C. Parkes. On the Sybil-proofness of accounting mechanisms. In Proc. NetEcon, June 2011.
[31]
M. Sirivianos, J. H. Park, X. Yang, and S. Jarecki. Dandelion: Cooperative content distribution with robust incentives. In Proc. USENIX ATC, June 2007.
[32]
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proc. CCS, 2009.
[33]
L. Vu, I. Gupta, K. Nahrstedt, and J. Liang. Understanding overlay characteristics of a large-scale peer-to-peer IPTV system. ACM Trans. Multim. Comp. Comm. Appl., 6:31:1-31:24, 2010.
[34]
C. Wu, B. Li, and S. Zhao. Diagnosing network-wide P2P live streaming inefficiencies. In Proc. IEEE INFOCOM, Apr. 2009.
[35]
H. Yin, X. Liu, T. Zhan, V. Sekar, F. Qiu, C. Lin, H. Zhang, and B. Li. Design and deployment of a hybrid CDN-P2P system for live video streaming: experiences with LiveSky. In Proc. ACM MM, 2009.
[36]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against Sybil attacks. In Proc. IEEE S&P, 2008.
[37]
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against Sybil attacks via social networks. In Proc. SIGCOMM '06, Aug. 2006.

Cited By

View all
  1. Reliable client accounting for P2P-infrastructure hybrids

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
      April 2012
      30 pages

      Sponsors

      • VMware
      • NSF: National Science Foundation
      • Google Inc.
      • Infosys
      • Microsoft Reasearch: Microsoft Reasearch

      Publisher

      USENIX Association

      United States

      Publication History

      Published: 25 April 2012

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 14 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media