Tussle in cyberspace: defining tomorrow's internet
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Analyzing peer-to-peer traffic across large networks
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
PlanetLab: an overlay testbed for broad-coverage services
ACM SIGCOMM Computer Communication Review
An analysis of internet content delivery systems
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
The case for a hybrid p2p search infrastructure
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Clustering in peer-to-peer file sharing workloads
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Fighting peer-to-peer SPAM and decoys with object reputation
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Fluid modeling of pollution proliferation in P2P networks
SIGMETRICS '06/Performance '06 Proceedings of the joint international conference on Measurement and modeling of computer systems
Impact of peer incentives on the dissemination of polluted content
Proceedings of the 2006 ACM symposium on Applied computing
Novel applications of information retrieval techniques to peer-to-peer file-sharing systems
P2PIR '06 Proceedings of the international workshop on Information retrieval in peer-to-peer networks
Fighting pollution dissemination in peer-to-peer networks
Proceedings of the 2007 ACM symposium on Applied computing
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Proceedings of the 2007 ACM workshop on Digital Rights Management
On Gnutella topology dynamics by studying leaf and ultra connection jointly in phase space
Computer Networks: The International Journal of Computer and Telecommunications Networking
Pollution attacks and defenses for Internet caching systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Traffic volume analysis of a nation-wide eMule community
Computer Communications
SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Towards Trust-Based Acquisition of Unverifiable Information
CIA '08 Proceedings of the 12th international workshop on Cooperative Information Agents XII
Spam characterization and detection in peer-to-peer file-sharing systems
Proceedings of the 17th ACM conference on Information and knowledge management
Cost-effective spam detection in p2p file-sharing systems
Proceedings of the 2008 ACM workshop on Large-Scale distributed systems for information retrieval
Why file sharing networks are dangerous?
Communications of the ACM - Inspiring Women in Computing
Evaluation of a comprehensive P2P video-on-demand streaming system
Computer Networks: The International Journal of Computer and Telecommunications Networking
A holistic mechanism against file pollution in peer-to-peer networks
Proceedings of the 2009 ACM symposium on Applied Computing
Trust-Aided Acquisition Of Unverifiable Information
Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence
A modeling framework of content pollution in Peer-to-Peer video streaming systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Measurement and mitigation of BitTorrent leecher attacks
Computer Communications
Controlling file distribution in Winny network through index poisoning
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
P2P attack taxonomy and relationship analysis
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Optimizing BitTorrent performance to enable real-time downloads
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Peer-to-peer vs. client/server: reliability and efficiency of a content distribution service
ITC20'07 Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Communications of the ACM
Measurement and diagnosis of address misconfigured P2P traffic
INFOCOM'10 Proceedings of the 29th conference on Information communications
A measurement study of attacks on BitTorrent leechers
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
An efficient P2P content distribution system based on altruistic demand and recoding dissemination
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on model-based diagnostics
Towards Green P2P: Understanding the Energy Consumption in P2P under Content Pollution
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Browse and discover: social file sharing in the enterprise
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Copyright protection in P2P networks by false pieces pollution
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Journal of Network and Computer Applications
Quality of data delivery in peer-to-peer video streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on P2P Streaming
Self-protection in p2p networks: choosing the right neighbourhood
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Research on the immune strategy for the polluted file propagation in structured P2P networks
Computers and Electrical Engineering
Sweetening android lemon markets: measuring and combating malware in application marketplaces
Proceedings of the third ACM conference on Data and application security and privacy
Measurement and analysis of child pornography trafficking on P2P networks
Proceedings of the 22nd international conference on World Wide Web
Hi-index | 0.02 |
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular technique consists in "poisoning" a specific item (movie, song, or software title) by injecting a massive number of decoys into the peer-to-peer network, to reduce the availability of the targeted item. In addition to poisoning, pollution, that is, the accidental injection of unusable copies of files in the network, also decreases content availability. In this paper, we attempt to provide a first step toward understanding the differences between pollution and poisoning, and their respective impact on content availability in peer-to-peer file sharing networks. To that effect, we conduct a measurement study of content availability in the four most popular peer-to-peer file sharing networks, in the absence of poisoning, and then simulate different poisoning strategies on the measured data to evaluate their potential impact. We exhibit a strong correlation between content availability and topological properties of the underlying peer-to-peer network, and show that the injection of a small number of decoys can seriously impact the users' perception of content availability.