Towards securing data delivery in peer-to-peer streaming

Jeff Seibert, Xin Sun, C. Nita-Rotaru, Sanjay G. Rao
{"title":"Towards securing data delivery in peer-to-peer streaming","authors":"Jeff Seibert, Xin Sun, C. Nita-Rotaru, Sanjay G. Rao","doi":"10.1109/COMSNETS.2010.5431991","DOIUrl":null,"url":null,"abstract":"The goal of enabling ubiquitous video broadcasting on the Internet has been a long cherished vision in the networking community. Prior efforts aimed at achieving this goal based on the IP Multicast architecture have been unsuccessful. In recent years, peer-to-peer (P2P) streaming has emerged as a promising alternative technology, which has matured to the point that there are several commercial offerings available to users. While these developments are encouraging, P2P streaming systems are susceptible to attacks by malicious participants, and their viability depends on how effectively they can perform under such attacks. In this paper, we explore this issue in the context of mesh-based designs, which have emerged as the dominant architecture for P2P streaming. We provide a taxonomy of the implicit commitments made by nodes when peering with others. We show that when these commitments are not enforced explicitly, they can be exploited by malicious nodes to conduct attacks that degrade the data delivery service. We consider an important class of attacks where malicious nodes deliberately become neighbors of a large number of nodes and do not upload data to them. We focus on these attacks given the limited attention paid to them, and the significant impact they can have on overall data delivery. We present mechanisms that can enhance the resilience of mesh-based streaming against such attacks. A key part of the solution is a novel reputation scheme that combines feedback from both the control and data planes of the overlay. We evaluate our design with real-world experiments on the PlanetLab testbed and show that our design is effective. Even when there are 30% attackers, nodes can receive 92% of the data with our schemes compared to 10% of the data without our schemes. Overall these results indicate the feasibility of enabling effective P2P streaming even under the presence of malicious participants.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"142 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS.2010.5431991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

The goal of enabling ubiquitous video broadcasting on the Internet has been a long cherished vision in the networking community. Prior efforts aimed at achieving this goal based on the IP Multicast architecture have been unsuccessful. In recent years, peer-to-peer (P2P) streaming has emerged as a promising alternative technology, which has matured to the point that there are several commercial offerings available to users. While these developments are encouraging, P2P streaming systems are susceptible to attacks by malicious participants, and their viability depends on how effectively they can perform under such attacks. In this paper, we explore this issue in the context of mesh-based designs, which have emerged as the dominant architecture for P2P streaming. We provide a taxonomy of the implicit commitments made by nodes when peering with others. We show that when these commitments are not enforced explicitly, they can be exploited by malicious nodes to conduct attacks that degrade the data delivery service. We consider an important class of attacks where malicious nodes deliberately become neighbors of a large number of nodes and do not upload data to them. We focus on these attacks given the limited attention paid to them, and the significant impact they can have on overall data delivery. We present mechanisms that can enhance the resilience of mesh-based streaming against such attacks. A key part of the solution is a novel reputation scheme that combines feedback from both the control and data planes of the overlay. We evaluate our design with real-world experiments on the PlanetLab testbed and show that our design is effective. Even when there are 30% attackers, nodes can receive 92% of the data with our schemes compared to 10% of the data without our schemes. Overall these results indicate the feasibility of enabling effective P2P streaming even under the presence of malicious participants.
在点对点流媒体中确保数据传输的安全性
在互联网上实现无处不在的视频广播的目标一直是网络社区长期珍视的愿景。先前基于IP多播体系结构实现这一目标的努力都没有成功。近年来,点对点(P2P)流媒体已经成为一种很有前途的替代技术,它已经成熟到有几个可供用户使用的商业产品。虽然这些发展令人鼓舞,但P2P流媒体系统很容易受到恶意参与者的攻击,它们的生存能力取决于它们在这种攻击下的执行效率。在本文中,我们在基于网格的设计的背景下探讨了这个问题,网格设计已经成为P2P流媒体的主要架构。我们提供了节点在与其他节点对等时所做的隐式承诺的分类。我们表明,当这些承诺没有明确执行时,恶意节点可以利用它们进行攻击,从而降低数据传递服务的质量。我们考虑了一类重要的攻击,其中恶意节点故意成为大量节点的邻居,并且不向它们上传数据。鉴于人们对这些攻击的关注有限,以及它们对整体数据传递的重大影响,我们将重点关注这些攻击。我们提出了可以增强基于网格的流抵御此类攻击的弹性的机制。该解决方案的关键部分是一种新的声誉方案,该方案结合了覆盖层的控制平面和数据平面的反馈。我们用PlanetLab测试平台上的实际实验来评估我们的设计,并表明我们的设计是有效的。即使有30%的攻击者,使用我们的方案的节点可以接收92%的数据,而没有我们的方案的节点只能接收10%的数据。总的来说,这些结果表明,即使在恶意参与者存在的情况下,也可以实现有效的P2P流。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信