TY - GEN
T1 - Fluid modeling of pollution proliferation in P2P networks
AU - Kumar, Rakesh
AU - Yao, David D.
AU - Bagchi, Amitabha
AU - Ross, Keith W.
AU - Rubenstein, Dan
PY - 2006/6
Y1 - 2006/6
N2 - P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsuspecting users. However, to our knowledge, there are no closed-form solutions that describe this phenomenon, nor are there models that describe how the injection of multiple versions of corrupted content impacts a clients' ability to receive a valid copy. In this paper we develop a suite of fluid models that model pollution proliferation in P2P systems. These fluid models lead to systems of non-linear differential equations. We obtain closed-form solutions for the differential equations; for the remaining models, we efficiently solve the differential equations numerically. The models capture a variety of user behaviors, including propensity for popular versions, abandonment after repeated failure to obtain a good version, freeloading, and local version blacklisting. Our analysis reveals intelligent strategies for attackers as well as strategies for clients seeking to recover non-polluted content within large-scale P2P networks.
AB - P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsuspecting users. However, to our knowledge, there are no closed-form solutions that describe this phenomenon, nor are there models that describe how the injection of multiple versions of corrupted content impacts a clients' ability to receive a valid copy. In this paper we develop a suite of fluid models that model pollution proliferation in P2P systems. These fluid models lead to systems of non-linear differential equations. We obtain closed-form solutions for the differential equations; for the remaining models, we efficiently solve the differential equations numerically. The models capture a variety of user behaviors, including propensity for popular versions, abandonment after repeated failure to obtain a good version, freeloading, and local version blacklisting. Our analysis reveals intelligent strategies for attackers as well as strategies for clients seeking to recover non-polluted content within large-scale P2P networks.
KW - Fluid model
KW - Markov chain
KW - P2P
KW - Pollution attack
UR - http://www.scopus.com/inward/record.url?scp=33750282701&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33750282701&partnerID=8YFLogxK
U2 - 10.1145/1140103.1140316
DO - 10.1145/1140103.1140316
M3 - Conference contribution
AN - SCOPUS:33750282701
SN - 1595933204
SN - 9781595933201
T3 - Performance Evaluation Review
SP - 335
EP - 346
BT - SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings
T2 - SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems
Y2 - 26 June 2006 through 30 June 2006
ER -