Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.3.131

A Measurement Study of User Behavior and File Pollution in DHT-based P2P Networks  

Shin, Kyu-Yong (Dept. of Electrical Engineering and Information Science, Korea Military Academy)
Yoo, Jin-Cheol (Dept. of Electrical Engineering and Information Science, Korea Military Academy)
Lee, Jong-Deog (Dept. of Electrical Engineering and Information Science, Korea Military Academy)
Abstract
File pollution (i.e., sharing of corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems in use today. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to corrupted files) and unproductive download trials (due to bogus index records), the viability of P2P systems (and similar distributed information-sharing applications) is questionable unless properly addressed. Thus, developing effective anti-pollution mechanisms is an immediate problem in this literature. This paper provides useful information and deep insight with future researchers who want to design an effective anti-pollution mechanism throughout an extensive measurement study of user behavior and file pollution in a representative DHT-based P2P system, the Kad network.
Keywords
Peer-to-Peer; File Sharing; Distributed System; File Pollution; Anti-pollution;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Steiner, T. En-Najjary, and E. W. Biersack, "Exploiting kad: Possible uses and misuses," in ACM SIGCOMM Computer Communication Review 37, 65-70, 2007
2 P. Dhungel, X. Hei, K. W. Ross, and N. Saxena, "The pollution attack in p2p live video streaming: measurement results and defenses," in the workshop on Peer-to-Peer streaming and IP-TV, Japan, 2007.
3 U. Lee, M. Choi, J. Cho, M. Y. Sanadidi, and M. Gerla, "Understanding pollution dynamics in p2p file sharing," in IPTPS'06, Santa Babara, USA, 2006.
4 MD4, http://en.wikipedia.org/wiki/MD4.
5 Top 10 songs, http://top10songs.com/ (June 2008).
6 K. Shin, D. S. Reeves, I. Rhee, and Y. Song, "Winnowing : Protecting p2p systems against pollution by cooperative index filtering," Tech. Rep. TR-2009-2, North Carolina State University, 2009.
7 C. Costa, V. Soares, J. Almeida, and V. Almeida, "Fighting pollution dissemination in peer-to-peer networks," in ACM SAC''07, Seoul, Korea, pp. 1586-1590, 2007.
8 J. R. Douceur, "The sybil attack," in IPTPS'02, Cambridge, MA, 2002.
9 D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer file sharing systems," in ACM SIGMETRICS''05, Ban, Alberta, Canada, pp. 38-49, 2005.
10 R. Kumar, D. D. Yao, A. Bagchi, K. W. Ross, and D. Rubenstein, "Fluid modeling of pollution proliferation in p2p networks," ACM SIGMETRICS Performance Evaluation Review, 335-346, 2006.
11 S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, "The eigentrust algorithm for reputation management in p2p networks", in the Twelfth International World Wide Web Conference, pp. 640-651, 2003.
12 K. Walsh, and E. G. Sirer, "Experience with an object reputation system for peer-to-peer file sharing," in USENIX NSDI''06, San Jose, CA, 2006.
13 N. Christin, A. S.Weigend, and J. Chuang, "Content vailability, pollution and poisoning in file sharing peer-to-peer networks," in ACM EC'05, pp. 68-77, 2005.
14 J. Liang, R. Kumar, Y. Xi, and K. W. Ross, "Pollution in p2p file sharing systems," in IEEE INFOCOM'05, Miami, FL, 2005.
15 eMule Project, http://www.emule-project.net.
16 J. Liang, N. Naoumov, and K.W. Ross, "The index poisoning attack in p2p file sharing systems," in IEEE INFOCOM'06, 2006.
17 emule morph, http://emulemorph.sourceforge.net
18 R. Brunner, "A performance evaluation of the kad-protocol," Master's thesis, University of Mannheim, Sophia-Antipolis, France, 2006.
19 aMule Forum, http://forum.amule.org/.
20 P. Maymounkov, and D. MaziItes, "Kademlia: A peer-to-peer information system based on the xor metric", in IPTPS'02, pp. 53-65, 2002
21 D. Stutzbach, and R. Rejaie, "Improving lookup performance over a widely deployed dht," in IEEE INFOCOM''06, pp. 1-12, 2006.
22 N. Curtis, R. Safavi-Naini, and W. Susilo, "X2rep : Enhanced trust semantics for the xrep protocol", in ACNS''04, 2004.
23 C. Costa, and J. Almeida, "Reputation systems for fighting pollution in peer-to-peer file sharing systems," in IEEE P2P'07, 2007.
24 E. Zhai, R. Chen, Z. Cai, L. Zhang, E. K. Lua, H. Sun, S. Qing, L. Tang, and Z. Chen, "Sorcery: Could we make p2p content sharing systems robust to deceivers?", in the 9th International Conference on Peer-to-Peer Computing, 2009.