Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1140277.1140316acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
Article

Fluid modeling of pollution proliferation in P2P networks

Published: 26 June 2006 Publication History
  • Get Citation Alerts
  • Abstract

    P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsuspecting users. However, to our knowledge, there are no closed-form solutions that describe this phenomenon, nor are there models that describe how the injection of multiple versions of corrupted content impacts a clients' ability to receive a valid copy. In this paper we develop a suite of fluid models that model pollution proliferation in P2P systems. These fluid models lead to systems of non-linear differential equations. We obtain closed-form solutions for the differential equations; for the remaining models, we efficiently solve the differential equations numerically. The models capture a variety of user behaviors, including propensity for popular versions, abandonment after repeated failure to obtain a good version, freeloading, and local version blacklisting. Our analysis reveals intelligent strategies for attackers as well as strategies for clients seeking to recover non-polluted content within large-scale P2P networks.

    References

    [1]
    E. Adar and B.A. Huberman, "Free Riding on Gnutella," First Monday, 5(10), October 2000, www.firstmonday.dk/issues/issue5_10/adar/
    [2]
    http://www.cachelogic.com
    [3]
    B. Cohen, "Incentives Build Robustness in BitTorrent", Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.
    [4]
    N. Christin, A. Weigend, and J. Chuang, "Content availability, Pollution and Poisoning in Peer-to-Peer File Sharing networks," Proceedings of the 6th ACM conference on Electronic commerce, Vancouver, Canada, 2005.
    [5]
    F. Dabek, M. Frans Kaashoek, D. Karger, R. Morris and I. Stoica, "Wide-area Cooperative Storage with CFS," Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), Chateau Lake Louise, Banff, Canada, October 2001.
    [6]
    D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-Service Resilience in Peer-to-Peer File-Sharing Systems," Proceedings of ACM SIGMETRICS 2005, Banff, Canada, June 2005.
    [7]
    H. Feng, A. Kamra, V. Misra and A. Keromytis, "The Effect of DNS Delays on Worm Propagation in an IPv6 Internet," Proceedings of IEEE INFOCOM 2005, March 2005, Miami, FL, USA.
    [8]
    S. Iyer, A. Rowstron and P. Druschel, "SQUIRREL: A Decentralized, Peer-to-Peer Web Cache," 12th ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey, California, USA, July 2002.
    [9]
    J. Liang, N. Naoumov, and K.W. Ross, "The Index Poisoning Attack in P2P File-Sharing Systems," To appear in proceedings of IEEE Infocom 2006, April 2006, Barcelona, Spain.
    [10]
    J. Liang, R. Kumar, Y. Xi and K.W. Ross, "Pollution in P2P File Sharing Systems," Proceedings of IEEE Infocom 2005, March 2005, Miami, FL, USA.
    [11]
    J. Liang, R. Kumar and K.W. Ross, "The Kazaa Overlay: A Measurement Study," Computer Networks (Special Issue on Overlay Distribution Structures and their Applications), to appear.
    [12]
    http://www.overpeer.com/
    [13]
    A. Rowstron and P. Druschel, "Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems," Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), Heidelberg, Germany, pages 329--350, November, 2001.
    [14]
    S. Saroiu, P. K. Gummadi, and S. D. Gribble, "A Measurement Study of Peer-to-Peer File Sharing Systems," Proceedings of Multimedia Computing and Networking (MMCN'02), San Jose, CA, USA, January 2002.
    [15]
    C. C. Zou, D. Towsley, and W. Gong, "Email Virus Propagation Modeling and Analysis," Umass ECE Dept., Tech. Rep. TR-03-CSE-04, May 2003.

    Cited By

    View all
    • (2018)Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysisIET Communications10.1049/iet-com.2018.506912:17(2119-2131)Online publication date: 30-Oct-2018
    • (2015)Fighting pollution attacks in P2P streamingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2014.12.00979:C(39-52)Online publication date: 14-Mar-2015
    • (2014)Analysis of the effect of InfoRanking on content pollution in peer-to-peer systemsSecurity and Communication Networks10.1002/sec.7737:4(700-713)Online publication date: 1-Apr-2014
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMETRICS '06/Performance '06: Proceedings of the joint international conference on Measurement and modeling of computer systems
    June 2006
    404 pages
    ISBN:1595933190
    DOI:10.1145/1140277
    • cover image ACM SIGMETRICS Performance Evaluation Review
      ACM SIGMETRICS Performance Evaluation Review  Volume 34, Issue 1
      Performance evaluation review
      June 2006
      388 pages
      ISSN:0163-5999
      DOI:10.1145/1140103
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 June 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Markov chain
    2. P2P
    3. fluid model
    4. pollution attack

    Qualifiers

    • Article

    Conference

    SIGMETRICS06

    Acceptance Rates

    Overall Acceptance Rate 459 of 2,691 submissions, 17%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysisIET Communications10.1049/iet-com.2018.506912:17(2119-2131)Online publication date: 30-Oct-2018
    • (2015)Fighting pollution attacks in P2P streamingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2014.12.00979:C(39-52)Online publication date: 14-Mar-2015
    • (2014)Analysis of the effect of InfoRanking on content pollution in peer-to-peer systemsSecurity and Communication Networks10.1002/sec.7737:4(700-713)Online publication date: 1-Apr-2014
    • (2011)The mechanism to control file-pollution based on hybrid trust-model in P2P network2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification10.1109/ASID.2011.5967407(20-24)Online publication date: Jun-2011
    • (2010)SP2MSProceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops10.1109/WAINA.2010.86(311-316)Online publication date: 20-Apr-2010
    • (2009)A management service for P2P content over MANetsProceedings of the 11th international conference on Advanced Communication Technology - Volume 110.5555/1701955.1702084(661-666)Online publication date: 15-Feb-2009
    • (2009)A Public Keys Based Architecture for P2P Identification, Content Authenticity and ReputationProceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops10.1109/WAINA.2009.139(159-164)Online publication date: 26-May-2009
    • (2009)A modeling framework of content pollution in Peer-to-Peer video streaming systemsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2009.06.00453:15(2703-2715)Online publication date: 1-Oct-2009
    • (2009)Autonomic Peer-to-Peer Systems: Incentive and Security IssuesAutonomic Computing and Networking10.1007/978-0-387-89828-5_9(205-236)Online publication date: 30-Apr-2009
    • (2008)On the effectiveness of internal patching against file-sharing wormsProceedings of the 6th international conference on Applied cryptography and network security10.5555/1788857.1788858(1-20)Online publication date: 3-Jun-2008
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media