首页> 外文OA文献 >Simple countermeasures to mitigate the effect of pollution attack in network coding-based peer-to-peer live streaming
【2h】

Simple countermeasures to mitigate the effect of pollution attack in network coding-based peer-to-peer live streaming

机译:在基于网络编码的对等实时流中减轻污染攻击影响的简单对策

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Network coding (NC)-based peer-to-peer (P2P) streaming represents an effective solution to aggregate user capacities and to increase system throughput in live multimedia streaming. Nonetheless, such systems are vulnerable to pollution attacks where a handful of malicious peers can disrupt the communication by transmitting just a few bogus packets which are then recombined and relayed by unaware honest nodes, further spreading the pollution over the network. Whereas previous research focused on malicious nodes identification schemes and pollution-resilient coding, in this paper we show pollution countermeasures which make a standard NC scheme resilient to pollution attacks. Thanks to a simple yet effective analytical model of a reference node collecting packets by malicious and honest neighbors, we demonstrate that: i) packets received earlier are less likely to be polluted, and ii) short generations increase the likelihood to recover a clean generation. Therefore, we propose a recombination scheme where nodes draw packets to be recombined according to their age in the input queue, paired with a decoding scheme able to detect the reception of polluted packets early in the decoding process and short generations. The effectiveness of our approach is experimentally evaluated in a real system we developed and deployed on hundreds to thousands of peers. Experimental evidence shows that, thanks to our simple countermeasures, the effect of a pollution attack is almost canceled and the video quality experienced by the peers is comparable to pre-attack levels.
机译:基于网络编码(NC)的对等(P2P)流表示一种有效的解决方案,可以聚合用户容量并提高实时多媒体流中的系统吞吐量。但是,这样的系统容易受到污染攻击,在这种攻击中,少数恶意对等体可以通过仅传输几个伪造的数据包来破坏通信,然后再由不知道的诚实节点重新组合和中继这些数据包,从而进一步在网络上传播污染。尽管先前的研究集中在恶意节点识别方案和防污染编码上,但在本文中,我们展示了使标准NC方案能够抵抗污染攻击的污染对策。感谢参考节点收集恶意和诚实邻居发送的数据包的简单而有效的分析模型,我们证明:i)较早收到的数据包受污染的可能性较小,并且ii)短生成增加了恢复干净生成的可能性。因此,我们提出了一种重组方案,在该方案中,节点根据输入队列中的年龄绘制要重组的数据包,并与能够在解码过程的早期和较短的生成时间内检测到受污染的数据包的解码方案配对。我们在开发的真实系统中通过实验评估了我们方法的有效性,并将其部署在数百至数千个对等节点上。实验证据表明,由于我们采取了简单的对策,因此几乎消除了污染攻击的影响,并且同行所体验的视频质量与攻击前的水平相当。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号