Home > Research > Publications & Outputs > A Detection Mechanism for Internal Attacks on P...

Links

Text available via DOI:

View graph of relations

A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. / Ismail, H.; Roos, S.; Suri, Neeraj.
2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2018. p. 1-7.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Ismail, H, Roos, S & Suri, N 2018, A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. in 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, pp. 1-7. https://doi.org/10.1109/WoWMoM.2018.8449812

APA

Ismail, H., Roos, S., & Suri, N. (2018). A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. In 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (pp. 1-7). IEEE. https://doi.org/10.1109/WoWMoM.2018.8449812

Vancouver

Ismail H, Roos S, Suri N. A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. In 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE. 2018. p. 1-7 doi: 10.1109/WoWMoM.2018.8449812

Author

Ismail, H. ; Roos, S. ; Suri, Neeraj. / A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2018. pp. 1-7

Bibtex

@inproceedings{b47d54f2d795446c9765e2f078de7612,
title = "A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems",
abstract = "Online streaming is a popular service for data-intensive applications such as video streaming. P2P-based streaming solutions are advocated to help reduce costs for both providers and users. Yet, involving users over data dissemination entails security risks including a variety of denial-of-service attacks. While extensive research exists on mitigating varied attack types, their effectiveness is limited if the attacker can infer information about the topology such as the identity of nodes that have direct connections to the source. The attacker can then leverage the gained insights to place malicious participants in prominent positions. By dropping chunks that should be forwarded, the malicious peers degrade the performance in a stealthy way that does not raise suspicion. We first demonstrate the feasibility of conducting such attacks. Accordingly, we propose a detection mechanism that identifies the attack and removes potential malicious peers from their disruptive positions. We ascertain, theoretically and through simulations, that malicious peers cannot misuse the detection mechanism to gain influence. Our simulation-based study indicates that the proposed detection mechanism is able to detect malicious peers with up to 80-90% accuracy while inducing a small overhead of approximately 8%. {\textcopyright} 2018 IEEE.",
keywords = "Denial-of-service attack, Network security, Data dissemination, Data-intensive application, Detection mechanism, Internal attacks, Malicious participant, Malicious peer, P2p streaming systems, Security risks, Peer to peer networks",
author = "H. Ismail and S. Roos and Neeraj Suri",
year = "2018",
month = jun,
day = "12",
doi = "10.1109/WoWMoM.2018.8449812",
language = "English",
isbn = "9781538647264",
pages = "1--7",
booktitle = "2018 IEEE 19th International Symposium on {"}A World of Wireless, Mobile and Multimedia Networks{"} (WoWMoM)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

AU - Ismail, H.

AU - Roos, S.

AU - Suri, Neeraj

PY - 2018/6/12

Y1 - 2018/6/12

N2 - Online streaming is a popular service for data-intensive applications such as video streaming. P2P-based streaming solutions are advocated to help reduce costs for both providers and users. Yet, involving users over data dissemination entails security risks including a variety of denial-of-service attacks. While extensive research exists on mitigating varied attack types, their effectiveness is limited if the attacker can infer information about the topology such as the identity of nodes that have direct connections to the source. The attacker can then leverage the gained insights to place malicious participants in prominent positions. By dropping chunks that should be forwarded, the malicious peers degrade the performance in a stealthy way that does not raise suspicion. We first demonstrate the feasibility of conducting such attacks. Accordingly, we propose a detection mechanism that identifies the attack and removes potential malicious peers from their disruptive positions. We ascertain, theoretically and through simulations, that malicious peers cannot misuse the detection mechanism to gain influence. Our simulation-based study indicates that the proposed detection mechanism is able to detect malicious peers with up to 80-90% accuracy while inducing a small overhead of approximately 8%. © 2018 IEEE.

AB - Online streaming is a popular service for data-intensive applications such as video streaming. P2P-based streaming solutions are advocated to help reduce costs for both providers and users. Yet, involving users over data dissemination entails security risks including a variety of denial-of-service attacks. While extensive research exists on mitigating varied attack types, their effectiveness is limited if the attacker can infer information about the topology such as the identity of nodes that have direct connections to the source. The attacker can then leverage the gained insights to place malicious participants in prominent positions. By dropping chunks that should be forwarded, the malicious peers degrade the performance in a stealthy way that does not raise suspicion. We first demonstrate the feasibility of conducting such attacks. Accordingly, we propose a detection mechanism that identifies the attack and removes potential malicious peers from their disruptive positions. We ascertain, theoretically and through simulations, that malicious peers cannot misuse the detection mechanism to gain influence. Our simulation-based study indicates that the proposed detection mechanism is able to detect malicious peers with up to 80-90% accuracy while inducing a small overhead of approximately 8%. © 2018 IEEE.

KW - Denial-of-service attack

KW - Network security

KW - Data dissemination

KW - Data-intensive application

KW - Detection mechanism

KW - Internal attacks

KW - Malicious participant

KW - Malicious peer

KW - P2p streaming systems

KW - Security risks

KW - Peer to peer networks

U2 - 10.1109/WoWMoM.2018.8449812

DO - 10.1109/WoWMoM.2018.8449812

M3 - Conference contribution/Paper

SN - 9781538647264

SP - 1

EP - 7

BT - 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)

PB - IEEE

ER -