access icon free Distributed mitigation of content pollution in peer-to-peer video streaming networks

Video streaming has become increasingly popular in the Internet. Frequently, video transmissions are based on peer-to-peer networks, in which peers running on end-user hosts transmit data among themselves. An important security vulnerability of this strategy is that content can be easily altered by malicious users. Thus, it becomes essential to diagnose and fight content pollution in these systems. In this work, the authors present a novel strategy that relies on comparison-based diagnosis to mitigate content pollution in live video streaming peer-to-peer networks. This strategy is fully distributed and effectively combats the dissemination of content pollution. In the strategy, peers independently identify and avoid polluters. The solution works on top of the scalable overlay network Fireflies. Experimental results are presented showing the effectiveness and the low overhead of the solution. In particular, the strategy was able to significantly reduce content pollution propagation in diverse network configurations.

Inspec keywords: peer-to-peer computing; video streaming; computer network security

Other keywords: distributed content pollution mitigation; content pollution propagation; video transmissions; scalable overlay network Fireflies; peer-to-peer video streaming networks; security vulnerability; end-user hosts; live video

Subjects: Video signal processing; Optical, image and video signal processing; Data security; Computer networks and techniques; Multimedia communications; Computer communications

References

    1. 1)
      • 19. BitTorrent: ‘BitTorrent’. Available at http://wwwbittorrentcom, accessed in June 2019.
    2. 2)
      • 33. Feng, C., Li, B.: ‘On large-scale peer-to-peer streaming systems with network coding’. Proc. 16th ACM Int. Conf. on Multimedia, Vancouver, Canada, 2008.
    3. 3)
      • 46. Kooshkaki, H., Akbari, B., Ghaffari Sheshjavani, A.: ‘A multi-level reputation-based pollution attacks detection and prevention in P2P streaming’. Int. Symp. on Telecommunications, Tehran, Iran, 2016.
    4. 4)
      • 31. Ziwich, R.P., Duarte, Jr.E.P., Albini, L.C.P.: ‘Distributed integrity checking for system with replicated data’. Proc. 11th IEEE Int. Conf. on Parallel and Distributed Systems, Fukuoka, Japan, 2005.
    5. 5)
      • 22. Vieira, A.B., Almeida, R.B., Almeida, J.M., et al: ‘SimplyRep: a simple and effective reputation system to fight pollution in P2P live streaming’, Comput. Netw., 2013, 57, (4), pp. 10191036.
    6. 6)
      • 25. Duarte, Jr.E.P., Ziwich, R.P., Albini, L.C.P.: ‘A survey of comparison-based system-level diagnosis’, ACM Comput. Surv., 2011, 43, (3), pp. 22:122:56.
    7. 7)
      • 20. Liang, J., Naoumov, N., Ross, K.W.: ‘Efficient blacklisting and pollution-level estimation in P2P file-sharing systems’. Asian Internet Engineering Conf., Bangkok, Thailand, 2005.
    8. 8)
      • 3. PPS.tv: ‘PPS.tv (PPStream)’. Available at http://ppstv, accessed in June 2019.
    9. 9)
      • 47. Wang, Q., Vu, L., Nahrstedt, K., et al: ‘MIS: malicious nodes identification scheme in network-coding-Based peer-to-peer streaming’. Proc. 29th IEEE Int. Conf. on Computer Communications, San Diego, CA, USA, 2010.
    10. 10)
      • 23. So, J., Reeves, D.: ‘AntiLiar: defending against cheating attacks in mesh based streaming’. Proc. IEEE 12th Int. Conf. on Peer-to-Peer Computing, Tarragona, Spain, 2012.
    11. 11)
      • 37. Coelho, R.V., Pastro, J.T., Antunes, R.S., et al: ‘Challenging the feasibility of authentication mechanisms for P2P live streaming’. Proc. Sixth Latin America Networking Conf., Quito, Ecuador, 2011, pp. 5563.
    12. 12)
      • 42. Lu, M., Lee, P.P.C., Lui, J.C.S.: ‘Identity attack and anonymity protection for P2P-VoD systems’. Proc. ACM/IEEE Int. Workshop on Quality of Service, San Jose, CA, USA, 2011, pp. 19.
    13. 13)
      • 39. Maheswari, B.U., Sudarshan, T.S.B.: ‘Reputation based mesh-tree-Mesh cluster hybrid architecture for P2P live streaming’. Proc. Third Int. Conf. on Devices, Circuits and Systems, Coimbatore, India, 2016.
    14. 14)
      • 11. Fiandrotti, A., Gaeta, R., Grangetto, M.: ‘Securing network coding architectures against pollution attacks with band codes’, IEEE Trans. Inf. Forensics Sec., 2019, 14, (3), pp. 730742.
    15. 15)
      • 1. Dernbach, S., Taft, N., Kurose, J., et al: ‘Cache content-selection policies for streaming video services’. IEEE Intl Conf on Computer Communications, San Francisco, CA, USA, 2016.
    16. 16)
      • 43. Borges, A., Gomes, P., Nacif, J., et al: ‘Characterizing sopCast client behavior’, Comput. Commun., 2012, 35, (8), pp. 10041016.
    17. 17)
      • 27. Haridasan, M., van Renesse, R.: ‘SecureStream: an intrusion-tolerant protocol for live-streaming dissemination’, Comput. Commun., 2008, 31, (3), pp. 563575.
    18. 18)
      • 34. Wong, C.K., Lam, S.S.: ‘Digital signatures for flows and multicasts’, IEEE/ACM Trans. Netw., 1999, 7, (4), pp. 502513.
    19. 19)
      • 4. PPLive: ‘PPLive - The most popular net TV in the world’. Available at http://wwwpplivecom/en, accessed in June 2019.
    20. 20)
      • 16. Borges, A., Almeida, J., Campos, S.: ‘Fighting pollution in P2P live streaming systems’. IEEE Int. Conf. on Multimedia and Expo, Hanover, Germany, 2008, pp. 481484.
    21. 21)
      • 9. Gkortsilas, I., Deltouzos, K.: ‘Detecting and isolating pollution attacks in peer-to-peer voD systems’. European Conf on Networks and Communications, Athens, Greece, 2016.
    22. 22)
      • 13. Fiandrotti, A., Gaeta, R., Grangetto, M.: ‘Simple countermeasures to mitigate the effect of pollution attack in network coding-based peer-to-peer live streaming’, IEEE Trans. Multimedia, 2015, 17, (4), pp. 562573.
    23. 23)
      • 30. Maeng, J., Malek, M.: ‘A comparison connection assignment for self-diagnosis of multiprocessor systems’. Proc. 11th IEEE Fault-Tolerant Computing Symp, Portland, OR, USA, 1981.
    24. 24)
      • 40. Yu, X., Fujita, S.: ‘Whitewash-aware reputation management in peer-to-peer file sharing system’. Proc. World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, NV, USA, 2012.
    25. 25)
      • 26. Johansen, H., Allavena, A., van Renesse, R.: ‘Fireflies: scalable support for intrusion-tolerant network overlays’. Proc First ACM SIGOPS/EuroSys European Conf. on Computer Systems, Leuven, Belgium, 2006.
    26. 26)
      • 29. Ziwich, R.P., Duarte, Jr. E.P.: ‘A nearly optimal comparison-based diagnosis algorithm for systems of arbitrary topology’, IEEE Trans. Parallel Distrib. Syst., 2016, 27, (11), pp. 31313143.
    27. 27)
      • 2. Coolstreaming: ‘CoolStreaming - Live Tv Streaming Platform’. Available at http://wwwcoolstreamingus, accessed in June 2019.
    28. 28)
      • 7. Anjum, N., Karamshuk, D., Shikr-Bahaei, M., et al: ‘Survey on peer-assisted content delivery networks’, Comput. Netw., 2017, 116, pp. 7995.
    29. 29)
      • 5. SopCast: ‘SopCast - Free P2P internet TV’. Available at http://wwwsopcastcom, accessed in June 2019.
    30. 30)
      • 36. Chen, R., Lua, E.K., Crowcroft, J., et al: ‘Securing peer-to-peer content sharing service from poisoning attacks’. Proc. of the Eighth IEEE Int. Conf. on Peer-to-Peer Computing, Aachen, Germany, 2008.
    31. 31)
      • 21. Li, J.S., Hsieh, C.J., Wang, Y.K.: ‘Distributed key management scheme for peer-to-peer live streaming services’, Int. J. Commun. Syst., 2012, 26, (10),.
    32. 32)
      • 17. Dhungel, P., Hei, X., Ross, K.W., et al: ‘The pollution attack in P2P live video streaming: measurement results and defenses’. Proc Workshop on Peer-to-peer Streaming and IP-TV, Kyoto, Japan, 2007, pp. 323328.
    33. 33)
      • 38. Lin, E., de Castro, D.M.N., Wang, M., et al: ‘SPoIM: a close look at pollution attacks in P2P live streaming’. Proc. 18th Int. Workshop on Quality of Service, San Jose, CA, USA, 2010, pp. 19.
    34. 34)
      • 24. Liang, J., Kumar, R., Ross, K.W.: ‘The fastTrack overlay: a measurement study’, Comput. Netw., 2006, 50, (6), pp. 842858.
    35. 35)
      • 32. Gheorghe, G., Cigno, R.L., Montresor, A.: ‘Security and privacy issues in P2P streaming systems: a survey’, Peer-to-Peer Netw. Appl., 2011, 4, (2), pp. 7591.
    36. 36)
      • 41. Hu, B., Zhao, H.: ‘Joint pollution detection and attacker identification in peer-to-peer live streaming’. Proc. IEEE Intl Conf on Acoustics Speech and Signal Processing, Dallas, TX, USA, 2010.
    37. 37)
      • 35. Dhungel, P., Hei, X., Ross, K.W., et al: ‘Pollution in P2P live video streaming’, Int. J. Comput. Netw. Commun., 2009, 1, (2), pp. 99110.
    38. 38)
      • 12. Fiandrotti, A., Gaeta, R., Grangetto, M.: ‘Characterization of band codes for pollution-resilient peer-to-peer video streaming’, IEEE Trans. Multimedia, 2016, 18, (6), pp. 11381148.
    39. 39)
      • 6. Sahoo, J., Salahuddin, M.A., Glitho, R., et al: ‘A survey on replica server placement algorithms for content delivery networks’, IEEE Commun. Surv. Tutor., 2017, 19, (2), pp. 10021026.
    40. 40)
      • 18. Haizhou, W., Xingshu, C., Wenxian, W.: ‘A measurement study of polluting a large-scale P2P IPTV system’, China Commun., 2011, 8, (2), pp. 95102.
    41. 41)
      • 10. Hawa, M., Al-Zubi, R., Darabkh, K.A., et al: ‘Adaptive approach to restraining content pollution in peer-to-peer networks’, Inf. Syst. Front., 2017, 19, (6), pp. 13731390.
    42. 42)
      • 45. Medina-Lopez, C., Shakirov, I., Casado, L.G., et al: ‘On pollution attacks in fully connected P2P networks using trusted peers’. Int. Conf. on Intelligent Systems Design and Applications, Porto, Portugal, 2016.
    43. 43)
      • 44. Ziwich, R.P., Schimidt, E.A., Duarte, Jr. E.P., et al: ‘Diagnosis of content pollution in P2P live streaming networks’. Proc. Sixth Latin-American Symp on Dependable Computing, Rio de Janeiro, Brazil, 2013.
    44. 44)
      • 15. Tauhiduzzaman, M., Wang, M.: ‘Fighting pollution attacks in P2P streaming’, The Int. J. Comput. Telecommun. Netw., 2015, 79, (C), pp. 3952.
    45. 45)
      • 8. Wang, H., Chen, X., Wang, W., et al: ‘Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis’, IET Commun., 2018, 12, (17), pp. 21192131.
    46. 46)
      • 28. Hei, X., Liu, Y., Ross, K.W.: ‘IPTV over P2P streaming networks: the mesh-pull approach’, IEEE Commun. Mag., 2008, 46, (2), pp. 8692.
    47. 47)
      • 14. Ismail, H., Roos, S., Suri, N.: ‘A detection mechanism for internal attacks on pull-based P2P streaming systems’. IEEE Int. Symp. on A World of Wireless, Mobile and Multimedia Networks, Chania, Greece, 2018.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2019.0627
Loading

Related content

content/journals/10.1049/iet-com.2019.0627
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading