Abstract
Distributed Denial of Service (DDoS) attack is a serious threat to the Internet communications especially to P2P streaming system. P2P streaming system is vulnerable to DDoS attacks due to its high bandwidth demand and strict time requirement. In this paper, we propose a distributed framework to defense DDoS attack based on Credit Model(CM) which takes the responsibility to identify malicious nodes and categorize nodes into different credit level. We also introduce a Message Rate Controlling Model (MRCM)to control the message rate of a node according to its credit level. Combining CM and MRCS together, our framework can improve the resistibility against DDoS for P2P streaming system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Dumitriu, D., Knightly, E., Kuzmanovic, A., Stoica, I., Zwanenepoel, W.: Denial of Service in Peer to Peer File sharing Systems. In: International Conference on Measurement and Modeling of Computer Systems - Proceedings, pp. 38–49 (2005)
Liang, J., Kumar, R., Xi, Y., Ross, K.: Pollution in P2P File Sharing Systems. In: Proc. of IEEE INFOCOM 2005, Miami, FL, USA (March 2005)
Nicolosi, A., Mazieres, D.: Secure Acknowledgment of multicast messages in open peer-to-peer networks. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 259–268. Springer, Heidelberg (2005)
Wang, W., Xiong, Y., Zhang, Q., Sugih, J.: Ripple-stream: Safeguarding P2P streaming against DoS attacks. In: 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 Proceedings, vol. 2006, pp. 1417–1420 (2006)
William, C., Klara, N., Indranil, G.: Preventing DoS attacks in peer-to-peer media streaming systems. In: Proceedings of SPIE-IS and T Electronic Imaging, p. 607610D (2006)
Cao, F., Bryan, D., Lowekamp, B.: Providing secure services in peer-to-peer communications networks with central security servers. In: Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services, AICT/ICIW 2006, p. 105 (2006)
Wang, H., Zhu, Y., Hu, Y.: An efficient and secure peer-to-peer overlay network. In: Proceedings of The IEEE Conference on Local Computer Networks - 30th Anniversary, LCN 2005, pp. 764–771 (2005)
Sorge, C., Zitterbart, M.: A reputation-based system for confidentiality modeling in Peer-to-Peer networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 367–381. Springer, Heidelberg (2006)
Yu, B., Singh, M.P., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: 2004 IEEE 1st Symposium on Multi-Agent Security and Survivability, pp. 1–10 (2004)
Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, J., Li, Y., Huang, B., Ming, J. (2008). Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-69295-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69294-2
Online ISBN: 978-3-540-69295-9
eBook Packages: Computer ScienceComputer Science (R0)