TY - GEN
T1 - Efficient blacklisting and pollution-level estimation in P2P file-sharing systems
AU - Liang, Jian
AU - Naoumov, Naoum
AU - Ross, Keith W.
PY - 2005
Y1 - 2005
N2 - P2P file-sharing systems are susceptible to pollution attacks, whereby corrupted copies of content are aggressively introduced into the system, Recent research indicates that pollution is extensive in several file sharing systems. In this paper we propose an efficient measurement methodology for identifying the sources of pollution and estimating the levels of polluted content. The methodology can be used to efficiently blacklist polluters, evaluate the success of a pollution campaign, to reduce wasted bandwidth due to the transmission of polluted content, and to remove the noise from content measurement data, The proposed methodology is efficient in that it does not involve the downloading and analysis of binary content, which would be expensive in bandwidth and in computation/human resources, The methodology is based on harvesting metadata from the file sharing system and then processing off-line the harvested meta-data. We apply the technique to the FastTrack/Kazaa file-sharing network. Analyzing the false positives and false negatives, we conclude that the methodology is efficient and accurate.
AB - P2P file-sharing systems are susceptible to pollution attacks, whereby corrupted copies of content are aggressively introduced into the system, Recent research indicates that pollution is extensive in several file sharing systems. In this paper we propose an efficient measurement methodology for identifying the sources of pollution and estimating the levels of polluted content. The methodology can be used to efficiently blacklist polluters, evaluate the success of a pollution campaign, to reduce wasted bandwidth due to the transmission of polluted content, and to remove the noise from content measurement data, The proposed methodology is efficient in that it does not involve the downloading and analysis of binary content, which would be expensive in bandwidth and in computation/human resources, The methodology is based on harvesting metadata from the file sharing system and then processing off-line the harvested meta-data. We apply the technique to the FastTrack/Kazaa file-sharing network. Analyzing the false positives and false negatives, we conclude that the methodology is efficient and accurate.
UR - http://www.scopus.com/inward/record.url?scp=33745478082&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33745478082&partnerID=8YFLogxK
U2 - 10.1007/11599593_1
DO - 10.1007/11599593_1
M3 - Conference contribution
AN - SCOPUS:33745478082
SN - 3540308849
SN - 9783540308843
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 21
BT - Technologies for Advanced Heterogeneous Networks - First Asian Internet Engineering Conference, AINTEC 2005, Proceedings
PB - Springer Verlag
T2 - 1st Asian Internet Engineering Conference, AINTEC 2005
Y2 - 13 December 2005 through 15 December 2005
ER -