Skip to main content

Pollution Attacks Detection in the P2PSP Live Streaming System

  • Conference paper
  • First Online:
International Joint Conference (CISIS 2015)

Abstract

This work studies the pollution attack: a challenging security-related problem in peer-to-peer streaming platforms. Different variations of this attack and its combinations are addressed. In order to mitigate such attacks, two different strategies have been proposed in the context of the P2PSP live streaming system, a peer-to-peer streaming platform with free access (i.e. it is not necessary to provide an identification and only endpoints are stored). The first prevention strategy is based on the existence of anonymous trusted peers that detect and report attackers, which are finally expelled. The second strategy increases the security level in the overlay at the cost of a higher computation and communication overhead. Both strategies are analyzed theoretically for several attack configurations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellovin, S.M.: Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Commun. Rev. 19(2), 32–48 (1989)

    Article  Google Scholar 

  2. Conner, W., Nahrstedt, K.: Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: Proceedings of the 4th on Middleware Doctoral Symposium, p. 13. ACM (2007)

    Google Scholar 

  3. Conrad, M.: Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. In: Proceedings of the 2006 ACM CoNEXT Conference, CoNEXT ’06, pp. 30:1–30:2. ACM, New York, NY, USA (2006)

    Google Scholar 

  4. Dai, W.: Speed Comparison of Popular Crypto Algorithms. http://www.cryptopp.com/benchmarks.html

  5. Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IP-TV, pp. 323–328. ACM (2007)

    Google Scholar 

  6. Gouda, M.G.: Keynote talk: communication without repudiation: the unanswered question. In: Networked Systems, pp. 1–8. Springer (2014)

    Google Scholar 

  7. Hu, Bo., Zhao, H.V.: Pollution-resistant peer-to-peer live streaming using trust management. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp. 3057–3060, Nov 2009

    Google Scholar 

  8. Xin, K., Wu, Y.: A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput. Netw. 72, 62–73 (2014)

    Google Scholar 

  9. Lin, W.S., Zhao, H.V., Liu, K.J.R.: Attack-resistant collaboration in wireless video streaming social networks. In: 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–4. IEEE (2010)

    Google Scholar 

  10. Cigno, R.L., Russo, A., Carra, D.: On some fundamental properties of P2P push/pull protocols. In: ICCE 2008 Second International Conference on Communications and Electronics, pp. 67–73. IEEE (2008)

    Google Scholar 

  11. Magharei, N., Rejaie, R.: Understanding mesh-based peer-to-peer streaming. In: Proceedings of the 2006 international Workshop on Network and Operating Systems Support for Digital Audio and Video, p. 10. ACM (2006)

    Google Scholar 

  12. Marti, S., Garcia-Molina, H.: Identity crisis: anonymity vs reputation in P2P systems. In: Proceedings of Third International Conference on Peer-to-Peer Computing, (P2P 2003). pp. 134–141. IEEE (2003)

    Google Scholar 

  13. Medina-López, C., García-Ortiz, J.P., Naranjo, J.A.M., Casado, L.G., González-Ruiz, V.: IPTV using P2PSP and HTML5+WebRTC. In: The Fourth W3C Web and TV Workshop. Munich, Germany, March 2014

    Google Scholar 

  14. Medina-López, C., Naranjo, J.A.M., García-Ortiz, J.P., Casado, L.G., González-Ruiz, V.: Execution of the P2PSP protocol in parallel environments. In: Guillermo Botella y Alberto A. Del Barrio Garcia, editor, Actas XXIV Jornadas de Paralelismo (http://www.congresocedi.es/images/site/actas/ActasParalelismo.pdf), pp. 216–221. Madrid, Septiembre 2013

  15. Liu, Y., Yang, S., Guo, L., Chen, W., Guo, L.: A distributed trust-based reputation model in p2p system. In: 2007 Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, vol. 1, pp. 294–299, July 2007

    Google Scholar 

  16. Salama, P., Shroff, N.B., Coyle, E.J., Delp, E.J.: Error concealment techniques for encoded video streams. In: International Conference on Image Processing, vol. 1, pp. 9–9. IEEE Computer Society (1995)

    Google Scholar 

  17. P2PSP Team. Peer to Peer Straightforward Protocol. http://p2psp.org/en/p2psp-protocol

  18. Vieira, A.B., Campos, S., Almeida, J.: Fighting attacks in P2P live streaming. simpler is better. In: IEEE INFOCOM Workshops 2009, pp. 1–2. IEEE (2009)

    Google Scholar 

Download references

Acknowledgments

This work has been funded by grants from the Spanish Ministry (TIN2012-37483) and Junta de Andalucía (P11-TIC-7176), in part financed by the European Regional Development Fund (ERDF).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cristóbal Medina-López .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Medina-López, C., Casado, L.G., González-Ruiz, V. (2015). Pollution Attacks Detection in the P2PSP Live Streaming System. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics