Prevent Contents Leaking in P2P CDNs with Robust and Quick Detection of Colluders
نویسندگان
چکیده
The objective of Peer-to-Peer Content Delivery Networks is to deliver copyrighted contents to paid clients in an efficient and secure manner. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme to restrain an illegal download conducted by unauthorized peers, and a scheme to identify colluders who illegally leak the contents to such unauthorized peers. In this paper, we propose three schemes which extend the Lou and Hwang’s colluder detection scheme in two directions. The first direction is to introduce an intensive probing to check suspected peers, and the second direction is to adopt a reputation system to select reliable (non-colluder) peers as a decoy. The performance of the resulting scheme is evaluated by simulation. The result of simulations indicates that the proposed schemes detect all colluders about 30% earlier on average than the original scheme while keeping the accuracy of the colluder detection at medium collusion rate.
منابع مشابه
Proactive Content Poisoning To Prevent Collusive Piracy in P2P File Sharing
Today’s peer-to-peer (P2P) networks are grossly abused by Illegal distributions of music, games, video streams, and popular software. These abuses have resulted in heavy financial loss in media and content industry. Collusive piracy is the main source of intellectual property violations within the boundary of P2P networks. This problem is resulted from paid clients (colluders) illegally sharing...
متن کاملCopyright-Protected Content Delivery in Open Peer-to-Peer Networks
Open peer-to-peer (P2P) networks are being grossly abused by illegal distribution of copyrighted music, games, video streams, and popular software. These abuses are resulted from lack of proper peer authentication, modifiable file indices, and unauthorized file access in a P2P network. Peer collusion is a major source of illegal sharing of content files among clients and pirates. We propose a n...
متن کاملBotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملA collusion mitigation scheme for reputation systems
Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...
متن کاملConsistency Maintenance of State of Management Data in P2P-based Autonomic Network Management
Complex Dynamic Networks can be exploited in solving problems where traditional solutions may not be sufficient. The increasing complexity of computer networks imposes problems to the current network management solutions. In this context, network management is an example of a research area that could benefit from the use of CDNs. However, the consistency of state of management data among the el...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JIP
دوره 20 شماره
صفحات -
تاریخ انتشار 2012