
Research Article
A mesh check scheme against P2P live streaming attacks
@INPROCEEDINGS{10.4108/ICST.QSHINE2008.3853, author={Jinkang Jia and Changjia Chen}, title={A mesh check scheme against P2P live streaming attacks}, proceedings={5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness}, publisher={ICST}, proceedings_a={QSHINE}, year={2010}, month={5}, keywords={P2P live streaming pollution}, doi={10.4108/ICST.QSHINE2008.3853} }
- Jinkang Jia
Changjia Chen
Year: 2010
A mesh check scheme against P2P live streaming attacks
QSHINE
ICST
DOI: 10.4108/ICST.QSHINE2008.3853
Abstract
With the wide spread of P2P streaming systems, there appear some hackers who try to pollute the system by inserting fake data chunks into the system. These "dirty" chunks will then be propagated to many normal peers, which will result in the failure of the whole system. Considering the playback quality and the burden of the client, most systems nowadays don't adopt any measures to protect the video content, such as encryption, CRC, or other methods.
We think it's more important to eliminate the polluters actively than to prevent the peers from polluted passively. In the paper, we propose a new scheme which tries to leverage the P2P nature of the system. We piggyback some "check" bytes in the data chunks exchanged between different peers. On one hand, these "bytes" can verify the authenticity of the data chunks, which prevent the diffusion of the polluted chunks. On the other hand, they can also help to detect and identify the "polluters" of the system. By simulation, the effects of our schemes are evaluated and the results are very inspiring. We think this light-weight solution against the streaming attacks is promising and can be deployed in real world.