The pollution attack in P2P live video streaming: Measurement results and defenses

Prithula Dhungel, Xiaojun Hei, Keith W. Ross, Nitesh Saxena

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    P2P mesh-pull live video streaming applications - -such as Cool-Streaming, PPLive, and PPStream - - have become popular in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribution, degrading the quality of the rendered media at the receivers. Polluted chunks received by an unsuspecting peer not only effect that single peer, but since the peer also forwards chunks to other peers, and those peers in turn forward chunks to more peers, the polluted content can potentially spread through much of the P2P network. The contribution of this paper is twofold. First, by way of experimenting and measuring a popular P2P live video streaming system, we show that the pollution attack can be devastating. Second, we evaluate the applicability of four possible defenses to the pollution attack: blacklisting, traffic encryption, hash verification, and chunk signing. Among these, we conclude that the chunk signing solutions are most suitable.

    Original languageEnglish (US)
    Title of host publicationProceedings of the 2007 Workshop on Peer-to-Peer Streaming and IP-TV, P2P-TV'07
    Pages323-328
    Number of pages6
    DOIs
    StatePublished - 2007
    Event2007 Workshop on Peer-to-Peer Streaming and IP-TV, P2P-TV'07 - Kyoto, Japan
    Duration: Aug 27 2007Aug 31 2007

    Publication series

    NameProceedings of the 2007 Workshop on Peer-to-Peer Streaming and IP-TV, P2P-TV'07

    Other

    Other2007 Workshop on Peer-to-Peer Streaming and IP-TV, P2P-TV'07
    Country/TerritoryJapan
    CityKyoto
    Period8/27/078/31/07

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Communication

    Fingerprint

    Dive into the research topics of 'The pollution attack in P2P live video streaming: Measurement results and defenses'. Together they form a unique fingerprint.

    Cite this