Multicast routing in datagram internetworks and extended LANs
ACM Transactions on Computer Systems (TOCS)
A case for end system multicast (keynote address)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Bullet: high bandwidth data dissemination using an overlay mesh
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
SplitStream: high-bandwidth multicast in cooperative environments
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Resilient Peer-to-Peer Streaming
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
EquiCast: scalable multicast with selfish users
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Defense against Intrusion in a Live Streaming Multicast System
P2P '06 Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing
High-bandwidth mesh-based overlay multicast in heterogeneous environments
AAA-IDEA '06 Proceedings of the 2nd international workshop on Advanced architectures and algorithms for internet delivery and applications
Early experience with an internet broadcast system based on overlay multicast
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Overcast: reliable multicasting with on overlay network
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
The pollution attack in P2P live video streaming: measurement results and defenses
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
ACM Transactions on Information and System Security (TISSEC)
One hop reputations for peer to peer file sharing workloads
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Challenges, design and analysis of a large-scale p2p-vod system
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Observing slow crustal movement in residential user traffic
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
ISP Friend or Foe? Making P2P Live Streaming ISP-Aware
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
UUSee: large-scale operational on-demand streaming with random network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
Chameleon: adaptive peer-to-peer streaming with network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
Contracts: practical contribution incentives for P2P live streaming
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
FlightPath: obedience vs. choice in cooperative services
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
The impact of heterogeneous bandwidth constraints on DHT-Based multicast protocols
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Chainsaw: eliminating trees from overlay multicast
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
A Measurement Study of a Large-Scale P2P IPTV System
IEEE Transactions on Multimedia
PULSE: An Adaptive, Incentive-Based, Unstructured P2P Live Streaming System
IEEE Transactions on Multimedia
An Empirical Study of the Coolstreaming+ System
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
While mesh-based approaches have emerged as the dominant architecture for P2P streaming, the performance of these approaches under malicious participants has received little attention. In this paper, we provide a taxonomy of the implicit commitments made by nodes when peering with others. We show that when these commitments are not enforced explicitly, they can be exploited by malicious nodes to conduct attacks that degrade the data delivery service. We consider mesh-based specific P2P attacks where malicious nodes deliberately become neighbors of a large number of nodes and do not upload data to them, or malicious nodes deliberately delay packets till they are not useful anymore for the application. We focus on these attacks given the limited attention paid to them, and the significant impact they can have on overall data delivery. We present mechanisms that can enhance the resilience of mesh-based streaming against such attacks. A key part of our solution is a novel reputation scheme that combines feedback from both the control and data planes of the overlay. We evaluate our design with real-world experiments on the PlanetLab testbed and show that our design is effective. Even when there are 30% attackers, nodes receive 92% of the data with our schemes, however without our schemes they only receive 10% of the data.