A holistic mechanism against file pollution in peer-to-peer networks
Proceedings of the 2009 ACM symposium on Applied Computing
A unified security backplane for trust and reputation systems in decentralized networks
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Fighting attacks in P2P live streaming: simpler is better
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Towards a robust pollution control mechanism for P2P file sharing systems
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Journal of Network and Computer Applications
Research on the immune strategy for the polluted file propagation in structured P2P networks
Computers and Electrical Engineering
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Content pollution is a de facto problem in several currently popular Peer-to-Peer file sharing systems. Previously proposed strategies to fight content pollution include a peer reputation system named Scrubber as well as the alternative Credence object reputation system. This paper builds on previous work into three directions. First, it evaluates the cost-effectiveness of Scrubber and Credence in reducing pollution dissemination when polluters make use of collusion and Sybil attacks. Second, it modifies the Scrubber system to increase its effectiveness, in particular under collusion. Finally, it proposes a hybrid peer and object reputation system that combines the benefits of both strategies. We performed an extensive evaluation of all three systems, for various configurations and pollution mechanisms, as well as collusion and Sybil attacks. Our results show that the new hybrid system is much more effective and robust to malicious actions than any individual strategy, even in very uncooperative and unreliable peer communities.