Blacklisting Polluters and Determining Polluted Content in P2P File Sharing Systems

ثبت نشده
چکیده

Many P2P file sharing systems are subject to the pollution attack, whereby corrupted copies of popular titles are aggressively introduced into the system. In this paper we explore defenses to the pollution attack. Specifically, we develop efficient mechanisms to determine (i) the IP ranges responsible for introducing polluted content (that is, the blacklist set); and (ii) the pollution levels of titles (songs, movies, etc.) that have been targeted for attack. The methodology is efficient in that it does not involve downloading files from file-sharing nodes. Instead it determines the blacklist set and the targeted content by crawling the file-sharing system, harvesting metadata, and analyzing the metadata. We illustrate the technique by harvesting metadata from the FastTrack/Kazaa network. We apply our methodology to the harvested metadata to determine a blacklist set and the pollution levels of investigated titles. Analyzing the false positives and false negatives we conclude that the methodology is efficient and accurate.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems

P2P file-sharing systems are susceptible to pollution attacks, whereby corrupted copies of content are aggressively introduced into the system. Recent research indicates that pollution is extensive in several file sharing systems. In this paper we propose an efficient measurement methodology for identifying the sources of pollution and estimating the levels of polluted content. The methodology ...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Securing Peer-to-Peer Content Sharing Systems through Detecting Pollution Behaviors

Peer-to-Peer (P2P) content sharing systems have experienced an explosive growth, and now dominate large fractions of both the Internet users and traffic volume. However, due to the self-organization and self-maintenance nature of P2P overlay networks, these systems are vulnerable to the content pollution, where attackers aggressively inject a large quantity of polluted content into the systems....

متن کامل

Determining the Appropriate Thresholds for P2P Content File Sharing in Disconnected MANETs

Peer 2 Peer over MANETs is the largely popular used pattern of file sharing within MANETs. P2P system is started in the middle of 1990s. P2P system is deployed on the Internet which is formed by creating an overlay network. P2P overlay consists of upper-layer connections among nodes, or peers, which are selfdetermining of the underlay or substrate network, abstract peer’s view of the connection...

متن کامل

Adaptive Content Poisoning To Prevent Illegal File Distribution in P2P Networks

Digital content owners have attempted to use content poisoning to disrupt illegal distribution of copyrighted files in peer-to-peer (P2P) systems. This paper provides an analytical model to quantify the impact of content poisoning. Tradeoffs between content poisoning and download efficiency are revealed. In particular, we apply this poisoning model to transform and evaluate three popular P2P ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005