Fluid modeling of pollution proliferation in P2P networks

Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith Ross, Dan Rubenstein

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsuspecting users. However, to our knowledge, there are no closed-form solutions that describe this phenomenon, nor are there models that describe how the injection of multiple versions of corrupted content impacts a clients' ability to receive a valid copy. In this paper we develop a suite of fluid models that model pollution proliferation in P2P systems. These fluid models lead to systems of non-linear differential equations. We obtain closed-form solutions for the differential equations; for the remaining models, we efficiently solve the differential equations numerically. The models capture a variety of user behaviors, including propensity for popular versions, abandonment after repeated failure to obtain a good version, freeloading, and local version blacklisting. Our analysis reveals intelligent strategies for attackers as well as strategies for clients seeking to recover non-polluted content within large-scale P2P networks.

    Original languageEnglish (US)
    Title of host publicationSIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings
    Pages335-346
    Number of pages12
    Volume34
    Edition1
    DOIs
    StatePublished - Jun 2006
    EventSIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems - Saint Malo, France
    Duration: Jun 26 2006Jun 30 2006

    Other

    OtherSIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems
    CountryFrance
    CitySaint Malo
    Period6/26/066/30/06

    Fingerprint

    Pollution
    Fluids
    Differential equations

    Keywords

    • Fluid model
    • Markov chain
    • P2P
    • Pollution attack

    ASJC Scopus subject areas

    • Hardware and Architecture

    Cite this

    Kumar, R., Yao, D. D., Bagchi, A., Ross, K., & Rubenstein, D. (2006). Fluid modeling of pollution proliferation in P2P networks. In SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings (1 ed., Vol. 34, pp. 335-346) https://doi.org/10.1145/1140103.1140316

    Fluid modeling of pollution proliferation in P2P networks. / Kumar, Rakesh; Yao, David D.; Bagchi, Amitabha; Ross, Keith; Rubenstein, Dan.

    SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings. Vol. 34 1. ed. 2006. p. 335-346.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Kumar, R, Yao, DD, Bagchi, A, Ross, K & Rubenstein, D 2006, Fluid modeling of pollution proliferation in P2P networks. in SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings. 1 edn, vol. 34, pp. 335-346, SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Saint Malo, France, 6/26/06. https://doi.org/10.1145/1140103.1140316
    Kumar R, Yao DD, Bagchi A, Ross K, Rubenstein D. Fluid modeling of pollution proliferation in P2P networks. In SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings. 1 ed. Vol. 34. 2006. p. 335-346 https://doi.org/10.1145/1140103.1140316
    Kumar, Rakesh ; Yao, David D. ; Bagchi, Amitabha ; Ross, Keith ; Rubenstein, Dan. / Fluid modeling of pollution proliferation in P2P networks. SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings. Vol. 34 1. ed. 2006. pp. 335-346
    @inproceedings{af8616a181254afb9f5cc44ee6054023,
    title = "Fluid modeling of pollution proliferation in P2P networks",
    abstract = "P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsuspecting users. However, to our knowledge, there are no closed-form solutions that describe this phenomenon, nor are there models that describe how the injection of multiple versions of corrupted content impacts a clients' ability to receive a valid copy. In this paper we develop a suite of fluid models that model pollution proliferation in P2P systems. These fluid models lead to systems of non-linear differential equations. We obtain closed-form solutions for the differential equations; for the remaining models, we efficiently solve the differential equations numerically. The models capture a variety of user behaviors, including propensity for popular versions, abandonment after repeated failure to obtain a good version, freeloading, and local version blacklisting. Our analysis reveals intelligent strategies for attackers as well as strategies for clients seeking to recover non-polluted content within large-scale P2P networks.",
    keywords = "Fluid model, Markov chain, P2P, Pollution attack",
    author = "Rakesh Kumar and Yao, {David D.} and Amitabha Bagchi and Keith Ross and Dan Rubenstein",
    year = "2006",
    month = "6",
    doi = "10.1145/1140103.1140316",
    language = "English (US)",
    isbn = "1595933204",
    volume = "34",
    pages = "335--346",
    booktitle = "SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings",
    edition = "1",

    }

    TY - GEN

    T1 - Fluid modeling of pollution proliferation in P2P networks

    AU - Kumar, Rakesh

    AU - Yao, David D.

    AU - Bagchi, Amitabha

    AU - Ross, Keith

    AU - Rubenstein, Dan

    PY - 2006/6

    Y1 - 2006/6

    N2 - P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsuspecting users. However, to our knowledge, there are no closed-form solutions that describe this phenomenon, nor are there models that describe how the injection of multiple versions of corrupted content impacts a clients' ability to receive a valid copy. In this paper we develop a suite of fluid models that model pollution proliferation in P2P systems. These fluid models lead to systems of non-linear differential equations. We obtain closed-form solutions for the differential equations; for the remaining models, we efficiently solve the differential equations numerically. The models capture a variety of user behaviors, including propensity for popular versions, abandonment after repeated failure to obtain a good version, freeloading, and local version blacklisting. Our analysis reveals intelligent strategies for attackers as well as strategies for clients seeking to recover non-polluted content within large-scale P2P networks.

    AB - P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsuspecting users. However, to our knowledge, there are no closed-form solutions that describe this phenomenon, nor are there models that describe how the injection of multiple versions of corrupted content impacts a clients' ability to receive a valid copy. In this paper we develop a suite of fluid models that model pollution proliferation in P2P systems. These fluid models lead to systems of non-linear differential equations. We obtain closed-form solutions for the differential equations; for the remaining models, we efficiently solve the differential equations numerically. The models capture a variety of user behaviors, including propensity for popular versions, abandonment after repeated failure to obtain a good version, freeloading, and local version blacklisting. Our analysis reveals intelligent strategies for attackers as well as strategies for clients seeking to recover non-polluted content within large-scale P2P networks.

    KW - Fluid model

    KW - Markov chain

    KW - P2P

    KW - Pollution attack

    UR - http://www.scopus.com/inward/record.url?scp=33750282701&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=33750282701&partnerID=8YFLogxK

    U2 - 10.1145/1140103.1140316

    DO - 10.1145/1140103.1140316

    M3 - Conference contribution

    AN - SCOPUS:33750282701

    SN - 1595933204

    SN - 9781595933201

    VL - 34

    SP - 335

    EP - 346

    BT - SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings

    ER -