Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems
نویسندگان
چکیده
P2P file-sharing systems are susceptible to pollution attacks, whereby corrupted copies of content are aggressively introduced into the system. Recent research indicates that pollution is extensive in several file sharing systems. In this paper we propose an efficient measurement methodology for identifying the sources of pollution and estimating the levels of polluted content. The methodology can be used to efficiently blacklist polluters, evaluate the success of a pollution campaign, to reduce wasted bandwidth due to the transmission of polluted content, and to remove the noise from content measurement data. The proposed methodology is efficient in that it does not involve the downloading and analysis of binary content, which would be expensive in bandwidth and in computation/human resources. The methodology is based on harvesting metadata from the file sharing system and then processing off-line the harvested meta-data. We apply the technique to the FastTrack/Kazaa file-sharing network. Analyzing the false positives and false negatives, we conclude that the methodology is efficient and accurate.
منابع مشابه
Blacklisting Polluters and Determining Polluted Content in P2P File Sharing Systems
Many P2P file sharing systems are subject to the pollution attack, whereby corrupted copies of popular titles are aggressively introduced into the system. In this paper we explore defenses to the pollution attack. Specifically, we develop efficient mechanisms to determine (i) the IP ranges responsible for introducing polluted content (that is, the blacklist set); and (ii) the pollution levels o...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملUnderstanding Pollution Dynamics in P2P File Sharing
Pollution in P2P file sharing occurs when a large number of decoy files are injected into the P2P system. Since peers “serve” each other in the P2P file sharing system, it is obvious that pollution dynamics are closely related to user behavior. Therefore, we first conduct a human subject study to investigate user behavior. We identify the factors that are key to model user behavior, e.g., coope...
متن کاملThwarting P2P Pollution Using Object Reputation
This paper describes Credence, a distributed object reputation management scheme for combating content pollution in peer-to-peer filesharing systems. Credence enables honest peers to assess the authenticity of online content by securely tabulating and managing endorsements from other peers. Credence employs a novel voter correlation scheme to weight peer opinions, which gives rise to favorable ...
متن کاملSecuring Peer-to-Peer Content Sharing Systems through Detecting Pollution Behaviors
Peer-to-Peer (P2P) content sharing systems have experienced an explosive growth, and now dominate large fractions of both the Internet users and traffic volume. However, due to the self-organization and self-maintenance nature of P2P overlay networks, these systems are vulnerable to the content pollution, where attackers aggressively inject a large quantity of polluted content into the systems....
متن کامل