5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Research Article

A mesh check scheme against P2P live streaming attacks

Download557 downloads
  • @INPROCEEDINGS{10.4108/ICST.QSHINE2008.3853,
        author={Jinkang Jia and Changjia Chen},
        title={A mesh check scheme against P2P live streaming attacks},
        proceedings={5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness},
        publisher={ICST},
        proceedings_a={QSHINE},
        year={2010},
        month={5},
        keywords={P2P live streaming pollution},
        doi={10.4108/ICST.QSHINE2008.3853}
    }
    
  • Jinkang Jia
    Changjia Chen
    Year: 2010
    A mesh check scheme against P2P live streaming attacks
    QSHINE
    ICST
    DOI: 10.4108/ICST.QSHINE2008.3853
Jinkang Jia1,*, Changjia Chen1,*
  • 1: School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing,100044,P.R.China
*Contact email: jinkangjia@yahoo.com.cn, changjiachen@sina.com.cn

Abstract

With the wide spread of P2P streaming systems, there appear some hackers who try to pollute the system by inserting fake data chunks into the system. These "dirty" chunks will then be propagated to many normal peers, which will result in the failure of the whole system. Considering the playback quality and the burden of the client, most systems nowadays don't adopt any measures to protect the video content, such as encryption, CRC, or other methods.

We think it's more important to eliminate the polluters actively than to prevent the peers from polluted passively. In the paper, we propose a new scheme which tries to leverage the P2P nature of the system. We piggyback some "check" bytes in the data chunks exchanged between different peers. On one hand, these "bytes" can verify the authenticity of the data chunks, which prevent the diffusion of the polluted chunks. On the other hand, they can also help to detect and identify the "polluters" of the system. By simulation, the effects of our schemes are evaluated and the results are very inspiring. We think this light-weight solution against the streaming attacks is promising and can be deployed in real world.