A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.

Slides:



Advertisements
Similar presentations
The Index Poisoning Attack in P2P File Sharing Systems Keith W. Ross Polytechnic University.
Advertisements

A Systematic Study of the Mobile App Ecosystem Thanasis Petsas, Antonis Papadogiannakis, Evangelos P. Markatos Michalis PolychronakisThomas Karagiannis.
Cloud Control with Distributed Rate Limiting Raghaven et all Presented by: Brian Card CS Fall Kinicki 1.
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
Kangaroo: Video Seeking in P2P Systems Xiaoyuan Yang †, Minas Gjoka ¶, Parminder Chhabra †, Athina Markopoulou ¶, Pablo Rodriguez † † Telefonica Research.
On the Economics of P2P Systems Speaker Coby Fernandess.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Experience with an Object Reputation System for Peer-to-Peer File Sharing NSDI’06(3th USENIX Symposium on Networked Systems Design & Implementation) Kevin.
Lapsy Garg. P2P Networks Gnutella Protocol Topological Scan Worms Passive Scan Worms Solutions.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 A Framework for Lazy Replication in P2P VoD Bin Cheng 1, Lex Stein 2, Hai Jin 1, Zheng Zhang 2 1 Huazhong University of Science & Technology (HUST) 2.
1 Distributed, Automatic File Description Tuning in Peer-to-Peer File-Sharing Systems Presented by: Dongmei Jia Illinois Institute of Technology April.
Peer-Assisted Content Distribution Networks: Techniques and Challenges Pei Cao Stanford University.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Service Differentiated Peer Selection An Incentive Mechanism for Peer-to-Peer Media Streaming Ahsan Habib, Member, IEEE, and John Chuang, Member, IEEE.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav D.R.Cheriton School of Computer Science University of Waterloo,
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
1 SLIC: A Selfish Link-based Incentive Mechanism for Unstructured P2P Networks Qixiang Sun Hector Garcia-Molina Stanford University.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Adaptive Content Management in Structured P2P Communities Jussi Kangasharju Keith W. Ross David A. Turner.
Internet Cache Pollution Attacks and Countermeasures Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen Electrical Engineering and Computer Science.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 / 15 Attacks on Peer-to-Peer Networks Class Presentation CIS 510 – Peer-to-Peer Networking University of Oregon Christian Beckel Department of Computer.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Understanding Pollution Dynamics in P2P File Sharing Uichin Lee, Min Choi *, Junghoo Cho M. Y. Sanadidi, Mario Gerla UCLA, KAIST * IPTPS’06.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Stacey Greenaway Managing Reputation and Trust in Peer-to-Peer Networks. CP4022 Research Topics in Networks and Distributed Systems. Assessment 2 Stacey.
Data Consistency in the Structured Peer-to-Peer Network Cheng-Ying Ou, Polly Huang Network and Systems Lab 台灣大學電機資訊學院電機所.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Web Cache Replacement Policies: Properties, Limitations and Implications Fabrício Benevenuto, Fernando Duarte, Virgílio Almeida, Jussara Almeida Computer.
1 Requirements for the Transmission of Streaming Video in Mobile Wireless Networks Vasos Vassiliou, Pavlos Antoniou, Iraklis Giannakou, and Andreas Pitsillides.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Segment-Based Proxy Caching of Multimedia Streams Authors: Kun-Lung Wu, Philip S. Yu, and Joel L. Wolf IBM T.J. Watson Research Center Proceedings of The.
11/10/20151 A Standalone Content Sharing Application for Spontaneous Communities of Mobile Handhelds Authors: Amir Krifa –
The EigenTrust Algorithm for Reputation Management in P2P Networks
Collusion-Resistance Misbehaving User Detection Schemes Speaker: Jing-Kai Lou 2015/10/131.
Department of Computer Science City University of Hong Kong Department of Computer Science City University of Hong Kong 1 Probabilistic Continuous Update.
1 Understanding Pollution Dynamics in P2P File Sharing Uichin Lee, Min Choi *, Junghoo Cho M. Y. Sanadidi, Mario Gerla UCLA, KAIST * IPTPS’06 Elaine.
MULTI-TORRENT: A PERFORMANCE STUDY Yan Yang, Alix L.H. Chow, Leana Golubchik Internet Multimedia Lab University of Southern California.
SPAM DETECTION IN P2P SYSTEMS Team Matrix Abhishek GhagDarshan Kapadia Pratik Singh.
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Wireless Peer-to-Peer Scheduling.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Examining Dynamic Trust Relationships in Autonomy-Oriented Partner Finding Department of Computer Science, HKBU, HK International WIC Institute, BJUT,
Can Change this on the Master Slide Monday, August 20, 2007Can change this on the Master Slide0 A Distributed Ranking Algorithm for the iTrust Information.
Dynamic-Content Web Caching with Cooperative Proxy Scheme Βελισκάκης Μανώλης Εθνικό Μετσόβιο Πολυτεχνείο Dept. of Electrical & Computer Engineering Knowledge.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
A Comparative Study of the DNS Design with DHT-Based Alternatives 95/08/31 Chen Chih-Ming.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Comparing Document Segmentation for Passage Retrieval in Question Answering Jorg Tiedemann University of Groningen presented by: Moy’awiah Al-Shannaq
Data Indexing in Peer- to-Peer DHT Networks Garces-Erice, P.A.Felber, E.W.Biersack, G.Urvoy-Keller, K.W.Ross ICDCS 2004.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Topics for iWORK 2005(st)
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems 7 th.IEEE International Conference on Peer-to-Peer Computing Cristiano Costa,
Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Botnet Detection by Monitoring Group Activities in DNS Traffic
Presentation transcript:

A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering National Taiwan University 1

Outline Background Problem Methodology Simulation Environment & Results Conclusion 2

P2P file sharing system with search capability Issue a query with keywords to search for a file Meta-Data (For keyword matching) Content A file in system song A Song title, length, encoding scheme of song A Overview of P2P file sharing system 3 songA Version1 (HashValue1) Peer 1 Peer 2 Version2 (HashValue2) Peer 3 Version3 (HashValue3) Peer 4 Peer 5 HashValue Hash function Different versions of song A Mp3, wma,…

How a user searches for a file 4 P2P network Query for song A Peer 1 Responses for song A SourceVersion Peer 1 Version 1 Peer 2 Version 2 :: Peer n Version m Randomly choose a source for download

Pollution in file sharing system Definition of a polluted file – Meta-data description doesn’t match its content ! Current P2P networks are full of polluted files [1] – Unintentional – Intentional Meta-Data A Content B [1] J. Liang, Y. X. R. Kumar, and K. Ross, “Pollution in p2p file sharing systems,” in Proceedings of IEEE Infocom,

Problem Pollution in P2P system results in the following problems – Reduce content availability – Increase redundant traffic There are different anti-pollution mechanisms existing – Which one is better? 6

Methodology Simulation study on anti-pollution mechanisms – Extending a P2P simulator [2] – Existing anti-pollution mechanisms Peer reputation system – Choose a reputable peer to download file – EigenTrust [3] Object reputation system – Choose a reputable version of a file to download – Credence [4] – Different pollution attacks – User behavior 7 [2] M. Schlosser and S. Kamvar, “Simulating a file-sharing p2p network,” In Proc.of SemPGRID 2003 [3] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in p2p networks”, in Proceedings of the Twelfth International World Wide Web Conference, [4] K. Walsh and E. G. Sirer, “Experience with an object reputation system for peer-topeer filesharing”, in Proceedings of Networked System Design and Implementation (NSDI), May 2006.

Rate a peer by it’s uploading history from the whole system Peer Reputation System : EigenTrust Peer i Peer j C ij = Local reputation (C ij ) Global reputation(T i ) Good file

Rate a peer by it’s uploading history from the whole system Choose a reputable peer to download T 1 =? T2T2 Peer 2 Peer 1 Peer 3 C 21 C 31 T3T3 Peer Reputation System : EigenTrust 9 Peer i Peer j C ij = Local reputation (C ij ) Global reputation(T i ) Bad file C 12 C 14 Peer 2 Peer 4 Peer 1 A peer will store a list of local reputations T 1 = C 21 * T 2 + C 31 *T 3

Calculate an object (file) reputation by weighted votes – After download  vote it as clean or polluted Query of song A Vote-gather Query of song A Object Reputation System : Credence 10 Vote database of Peer 1 Obj 3 Good Obj 4 Good Obj 5 Bad Obj 6 Bad P2P2 P1P1 P3P3 P4P4 P5P5

Calculate an object (file) reputation by weighted votes – After download  vote it as clean or polluted Choose a reputable version for download Vote p3 Version 1 Responses of song A Vote-responses of song A Version no. SourcesReceived Votes Version Reputation Version 1 P 2, P 3 Vote P2 Vote P3 Corr P1,P2 *Vote P2 + Corr P1,P3 *Vote P3 Version 2 P4P4 Vote P4 Vote P5 Corr P1,P4 *Vote P4 + Corr P1,P5 *Vote P5 Object Reputation System : Credence 11 Vote database of Peer 2 Obj 1 Bad Obj 2 Bad Obj 3 Good Obj 4 Good Vote database of Peer 3 Obj 5 Good Obj 6 Good Obj 7 Bad Obj 8 Bad Vote database of Peer 1 Obj 3 Good Obj 4 Good Obj 5 Bad Obj 6 Bad Received Responses of P 1 Positive correlation Negative correlation Version 2 P2P2 P1P1 P3P3 P4P4 P5P5 Version 1 Vote p2 Vote p4 Vote p5  random choose a source

Pollution Attacks Prevalent pollution attacks [5] – Decoy Insertion – Hash Corruption 12 A clean file of Song A Hash Corruption MAMA H1H1 Clean MAMA H1H1 Corrupted MAMA H2H2 [5] F. Benevenuto, C. Costa, M. Vasconcelos, V. Almeida, J. Almeida, and M. Mowbray, “Impact of peer incentives on the dissemination of polluted content”, in SAC ’06 Decoy Insertion

[6] U. Lee, M. Choi, J. Cho, M. Y. Sanadidi, and M. Gerla, “Understanding pollution dynamics in p2p file sharing”, in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS’06), 2006 Slackness [6] – A period of time between download completion and quality check – Bimodal distribution Awareness [6] – The probability that a user can correctly recognize a file being polluted – No clear characteristic is observed high-awareness prob. = 0.8 low-awareness prob. = 0.2 User Behavior 13

Outline Background Problem Methodology Simulation Environment & Results Conclusion 14

Simulator Description P2P Query Cycle based simulator – In a cycle, each peer issues one query and repeats downloading until satisfied Extension – Types of attacks Decoy Insertion, Hash Corruption – Anti-Pollution mechanisms EigenTrust, Credence – User behavior Slackness, awareness 15

Simulation Scenario 16 Type of Peer Malicious Always share polluted files based on different attack s NormalShare what they’ve downloaded

Simulation Setup 17 Peers [9] # of normal peers # of malicious peers # of neighbors Content Distribution [8] [9] # of Categories in the system # of Categories of each peer Files in a category and Versions of each file File size distribution 20 At least 4 Zipf distribution with α = 1 Table 1 Simulation # of cycles # of experiments [8] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in p2p networks”, in Proceedings of the Twelfth International World Wide Web Conference, [9] K. Walsh and E. G. Sirer, “Experience with an object reputation system for peer-topeer filesharing”, in Proceedings of Networked System Design and Implementation (NSDI), May [10] N. Leibowitz, M. Ripeanu, and A. Wierzbicki, “Deconstructing the Kazaa network”, Internet Applications. WIAPP Proceedings. The Third IEEE Workshop Size1KB10KB100KB1MB10MB100MB1GB Percentage1.5%1.83%26.67%10.00%35.00%15.00%10.00% Table 1. File size distribution of P2P traffic [10]

Critical Evaluation Parameters 18 Attack Fraction of high-aware peers in the network slackness Decoy-Insertion 80% 50% 20% Yes or No Hash-corruption 80% 50% 20% Yes or No Decoy-Insertion & Hash- corruption 80% 50% 20% Yes or No Evaluate different anti-pollution mechanisms under the following scenarios

Successful Downloading Rate (per cycle) Redundant Traffic (per cycle) Reduced traffic Ratio(compared to randomly selection ) Evaluation metrics 19 SymbolDescriptions MjMj Mechanism of Credence or EigentTrust n# of high-aware peers titi Trials of downloads for a peer i to get a clean file in a cycle PTPolluted traffic CTControl traffic Total successful downloads Total trials of downloads Redundant traffic generated by random selection Reduced redundant traffic by using M j

Simulation Result Compare the performance of different anti-pollution mechanisms under different scenarios – EigenTrust – Credence – Random 20

Successful Downloading Rate 21 Credence is more sensitive to the type of attacks Under Hash-Corruption attackUnder Decoy-Insertion attack Credence identifies a clean version before download EigenTrsut rates on peers, not the hashvalue Converge after 100 cycles Credence > EigenTrust EigenTrust > Credence

Observation 1 : User awareness 22 EigenTrustCredence Reasons: 1. Fewer peers share clean files 2. Less peers correctly operate the reputation system

Observation 1 : User awareness 23 EigenTrustCredence User awareness is critical on anti-pollution mechanisms Reasons: 1. Fewer peers share clean files 2. Less peers correctly operate the reputation system

Observation 2 : User slackness User slackness has negative effect on Anti-pollution mechanisms 24 Pollution held by a user longer has more chances to be download

Discussion User behavior has significant effect on anti-pollution mechanisms Credence performs better under Decoy Insertion, while Eigentrust performs better under Hash Corruption – Type of attacks can’t be predicted – Suggest a hybrid anti-pollution mechanism 25

VersionsSources Version 1 P 1, P 5, P 7,...P 124 Version 2 P 14, P 21, P 35 :: Version N P 4, P 2 Hybrid Anti-pollution Mechanism 26 Response -list Step1: Select a reputable version by object reputation mechanism Step2: Select a reputable peer by peer reputation mechanism P2P network Query for song A

Successful Downloading Rate 27 Decoy InsertionHash Corruption Ensure both a reputable version and a source  confront different types of attacks

Successful Downloading Rate 28 Decoy InsertionHash Corruption Ensure both a reputable version and a source  confront different types of attacks Hybrid mechanism performs the best under both attacks

Reduced-Traffic Ratio Hybrid mechanism generate more control traffic – Trade-off between pollution traffic & control traffic 29 The trade-off is worthwhile Decoy InsertionHash Corruption

Conclusion Both peer reputation and object reputation system are necessary User behavior has significant influence on anti-pollution mechanisms 30

Thank you! 31