skip to main content
research-article

Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring

Published: 23 March 2010 Publication History

Abstract

Current peer-to-peer (P2P) streaming systems often assume that nodes cooperate to upload and download data. However, in the open environment of the Internet, this is not necessarily true and there exist malicious nodes in the system. In this article, we study malicious actions of nodes that can be detected through peer-based monitoring. We require each node to monitor the data received and to periodically send monitoring messages about its neighbors to some trustworthy nodes. To efficiently store and search messages among multiple trustworthy nodes, we organize trustworthy nodes into a threaded binary tree. Trustworthy nodes also dynamically redistribute monitoring messages among themselves to achieve load balancing. Our simulation results show that this scheme can efficiently detect malicious nodes with high accuracy, and that the dynamic redistribution method can achieve good load balancing among trustworthy nodes.

References

[1]
Aberer, K. and Despotovic, Z. 2001. Managing trust in a peer-2-peer information system. In Proceedings of the ACM Conference on Information and Knowledge Management (CIKM). 310--317.
[2]
Adar, E. and Huberman, B. A. 2000. Free riding on Gnutella. Tech. rep., HP. http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf.
[3]
Banerjee, S., Bhattacharjee, B., and Kommareddy, C. 2002. Scalable application layer multicast. In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM). 205--217.
[4]
Chen, R. and Yeager, B. 2001. Poblano: A distributed trust model for peer-to-peer networks. Tech. rep. SUN Microsystems.
[5]
Chu, Y. H., Rao, S., Seshan, S., and Zhang, H. 2002. A case for end system multicast. IEEE J. Sel. Areas Commun. 20, 8, 1456--1471.
[6]
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. 2001. Introduction to Algorithms. MIT Press.
[7]
Cornelli, F., Damiani, E., Vimercati, S., Paraboschi, S., and Samarati, P. 2002. Choosing reputable servents in a P2P network. In Proceedings of the Conference on the World Wide Web (WWW). 376--386.
[8]
Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P., and Violante, F. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS). 207--216.
[9]
Deering, S. E. 1988. Multicast routing in internetworks and extended LANs. ACM SIGCOMM CCR '18, 4, 55--64.
[10]
Do, T., Hua, K. A., and Tantaoui, M. 2004. P2VoD: Providing fault tolerant video-on-demand streaming in peer-to-peer environment. In Proceedings of the IEEE International Communications Conference (ICC). 1467--1472.
[11]
Dragovic, B., Kotsovinos, E., Hand, S., and Pietzuch, P. 2003. XenoTrust: Event-based distributed trust management. In Proceedings of the International Conference on Database and Expert Systems (DEXA).
[12]
Guo, Y., Suh, K., Kurose, J., and Towsley, D. 2003. P2Cast: Peer-to-peer patching scheme for VoD service. In Proceedings of the Conference on the World Wide Web (WWW). 301--309.
[13]
Habib, A. and Chuang, J. 2006. Service differentiated peer selection: An incentive mechanism for peer-to-peer media streaming. IEEE Trans. Multimedia 8, 3, 610--621.
[14]
Hei, X., Liang, C., Liang, J., Liu, Y., and Ross, K. W. 2007. A measurement study of a large-scale P2P IPTV system. IEEE Trans. Multimedia 9, 8, 1672--1687.
[15]
Hernandez, E. A., Chidester, M. C., and George, A. D. 2001. Adaptive sampling for network management. J. Netw. Syst. Manage. 9, 4.
[16]
Jannotti, J., Gifford, D. K., Johnson, K. L., Kaashoek, M. F., and O'Toole, J. W. 2000. Overcast: Reliable multicasting with an overlay network. In Proceedings of the USINEX Symposium on Operating Systems Design and Implementation (OSDI). 197--212.
[17]
Jin, X., Chan, S.-H. G., Yiu, W.-P. K., Xiong, Y., and Zhang, Q. 2006a. Detecting malicious hosts in the presence of lying hosts in peer-to-peer streaming. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME). 1537--1540.
[18]
Jin, X., Xia, Q., and Chan, S.-H. G. 2006b. Building a monitoring overlay for peer-to-peer streaming. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM).
[19]
Jun, S., Ahamad, M., and Xu, J. 2005. Robust information dissemination in uncooperative environments. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). 293--302.
[20]
Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the Conference on the World Wide Web (WWW). 640--651.
[21]
KaZaa. http://www.kazaa.com.
[22]
Knuth, D. E. 1998. The Art of Programming, Volume 3: Sorting and Searching 2nd Ed. Addison-Wesley.
[23]
Lai, K., Feldman, M., Chuang, J., and Stoica, I. 2003. Incentives for cooperation in peer-to-peer networks. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems (P2PECON).
[24]
Liu, J. and Zhou, M. 2006. Tree-assisted gossiping for overlay video distribution. Kluwer Multimedia Tools Appl. 29, 3, 211--232.
[25]
Marti, S. and Garcia-Molina, H. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50, 40, 472--484.
[26]
Mekouar, L., Iraqi, Y., and Boutaba, R. 2006. Peer-to-peer's most wanted: malicious peers. Comput. Netw. 50, 4, 545--562.
[27]
Nielson, S., Crosby, S., and Wallach, D. 2005. A taxonomy of rational attacks. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS).
[28]
Rodrigues, R. and Liskov, B. 2005. High availability in DHTs: Erasure coding vs. replication. In Proceedings of the International Workshop on Peer to Peer Systems (IPTPS).
[29]
Rowstron, A. and Druschel, P. 2001. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP). 188--201.
[30]
Sherwood, R., Lee, S., and Bhattacharjee, B. 2006. Cooperative peer groups in NICE. Comput. Netw. 50, 4, 523--544.
[31]
Singh, A., Castro, M., Druschel, P., and Rowstron, A. 2004. Defending against Eclipse attacks on overlay networks. In Proceedings of the ACM Special Interest Group on Operating Systems European Workshops (SIGOPS EW).
[32]
Singh, A. and Liu, L. 2003. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. In Proceedings of the IEEE Conference on Peer to Peer Computing (P2P). 142--149.
[33]
SSL. Introduction to SSL, http://docs.sun.com/source/816-6156-10/contents.htm.
[34]
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM). 149--160.
[35]
Tan, G. and Jarvis, S. A. 2006. A payment-based incentive and service differentiation mechanism for peer-to-peer streaming broadcast. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS). 41--50.
[36]
Tang, Y., Luo, J.-G., Zhang, Q., Zhang, M., and Yang, S.-Q. 2007. Deploying P2P networks for large-scale live video-streaming service. IEEE Comm. Mag. 45, 6, 100--106.
[37]
Tran, D. A., Hua, K. A., and Do, T. T. 2004. A peer-to-peer architecture for media streaming. IEEE J. Sel. Areas Commun. 22, 1, 121--133.
[38]
Xiong, L. and Liu, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Know. Data Engin. 16, 7, 843--857.
[39]
Zhang, B., Jamin, S., and Zhang, L. 2002. Host multicast: A framework for delivering multicast to end users. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 1366--1375.
[40]
Zhang, X., Liu, J., Li, B., and Yum, T.-S. P. 2005. CoolStreaming/DONet: A data-driven overlay network for peer-to-peer live media streaming. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 2102--2111.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 6, Issue 2
March 2010
119 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/1671962
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 March 2010
Accepted: 01 January 2009
Revised: 01 January 2009
Received: 01 September 2008
Published in TOMM Volume 6, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Malicious nodes
  2. peer monitoring
  3. peer-to-peer streaming

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media