DOI QR코드

DOI QR Code

A Measurement Study of User Behavior and File Pollution in DHT-based P2P Networks

DHT 기반의 P2P 네트워크에서 사용자 행동양식 및 파일 오염에 관한 측정 연구

  • Shin, Kyu-Yong (Dept. of Electrical Engineering and Information Science, Korea Military Academy) ;
  • Yoo, Jin-Cheol (Dept. of Electrical Engineering and Information Science, Korea Military Academy) ;
  • Lee, Jong-Deog (Dept. of Electrical Engineering and Information Science, Korea Military Academy)
  • 신규용 (육군사관학교 전자정보학과) ;
  • 유진철 (육군사관학교 전자정보학과) ;
  • 이종덕 (육군사관학교 전자정보학과)
  • Received : 2010.10.25
  • Accepted : 2010.12.06
  • Published : 2011.03.31

Abstract

File pollution (i.e., sharing of corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems in use today. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to corrupted files) and unproductive download trials (due to bogus index records), the viability of P2P systems (and similar distributed information-sharing applications) is questionable unless properly addressed. Thus, developing effective anti-pollution mechanisms is an immediate problem in this literature. This paper provides useful information and deep insight with future researchers who want to design an effective anti-pollution mechanism throughout an extensive measurement study of user behavior and file pollution in a representative DHT-based P2P system, the Kad network.

부패한 파일을 공유하거나, 인덱스 정보에 잘못된 인덱스 레코드를 삽입하는 등의 파일 오염문제는 대다수의 파일 공유 P2P 시스템들의 실질적인 문제가 되어 왔다. 이러한 파일 오염은 사용자들로 하여금 다운받아도 전혀 득이 되지 않는 오염된 파일들을 다운받도록 하거나, 존재하지 않는 파일들에 대한 비생산적인 다운로드 시도를 유도한다. 파일 오염은 네트워크 자원을 낭비할 뿐만 아니라, 사용자들의 활발한 참여를 제한하기 때문에 적절하게 대처하지 못한다면 향후 파일 공유 P2P 시스템 (혹은 비슷한 분산 환경 정보 공유 어플리케이션)의 성공을 기약하기 힘들다. 따라서 효과적인 오염방지 메커니즘의 개발이 시급하다. 본 논문은 대표적인 DHT (distributed hash table) 기반 P2P 시스템인 Kad 네트워크에서 사용자 행동양식 및 파일 오염에 대한 측정 연구를 통해 향후 효과적인 파일 오염방지 메커니즘을 개발하고자 하는 연구자들에게 실질적으로 활용 가능한 정보를 제공한다.

Keywords

References

  1. N. Christin, A. S.Weigend, and J. Chuang, "Content vailability, pollution and poisoning in file sharing peer-to-peer networks," in ACM EC'05, pp. 68-77, 2005.
  2. J. Liang, R. Kumar, Y. Xi, and K. W. Ross, "Pollution in p2p file sharing systems," in IEEE INFOCOM'05, Miami, FL, 2005.
  3. J. Liang, N. Naoumov, and K.W. Ross, "The index poisoning attack in p2p file sharing systems," in IEEE INFOCOM'06, 2006.
  4. emule morph, http://emulemorph.sourceforge.net
  5. R. Brunner, "A performance evaluation of the kad-protocol," Master's thesis, University of Mannheim, Sophia-Antipolis, France, 2006.
  6. eMule Project, http://www.emule-project.net.
  7. aMule Forum, http://forum.amule.org/.
  8. P. Maymounkov, and D. MaziItes, "Kademlia: A peer-to-peer information system based on the xor metric", in IPTPS'02, pp. 53-65, 2002
  9. D. Stutzbach, and R. Rejaie, "Improving lookup performance over a widely deployed dht," in IEEE INFOCOM''06, pp. 1-12, 2006.
  10. M. Steiner, T. En-Najjary, and E. W. Biersack, "Exploiting kad: Possible uses and misuses," in ACM SIGCOMM Computer Communication Review 37, 65-70, 2007
  11. P. Dhungel, X. Hei, K. W. Ross, and N. Saxena, "The pollution attack in p2p live video streaming: measurement results and defenses," in the workshop on Peer-to-Peer streaming and IP-TV, Japan, 2007.
  12. U. Lee, M. Choi, J. Cho, M. Y. Sanadidi, and M. Gerla, "Understanding pollution dynamics in p2p file sharing," in IPTPS'06, Santa Babara, USA, 2006.
  13. MD4, http://en.wikipedia.org/wiki/MD4.
  14. Top 10 songs, http://top10songs.com/ (June 2008).
  15. K. Shin, D. S. Reeves, I. Rhee, and Y. Song, "Winnowing : Protecting p2p systems against pollution by cooperative index filtering," Tech. Rep. TR-2009-2, North Carolina State University, 2009.
  16. C. Costa, V. Soares, J. Almeida, and V. Almeida, "Fighting pollution dissemination in peer-to-peer networks," in ACM SAC''07, Seoul, Korea, pp. 1586-1590, 2007.
  17. J. R. Douceur, "The sybil attack," in IPTPS'02, Cambridge, MA, 2002.
  18. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer file sharing systems," in ACM SIGMETRICS''05, Ban, Alberta, Canada, pp. 38-49, 2005.
  19. R. Kumar, D. D. Yao, A. Bagchi, K. W. Ross, and D. Rubenstein, "Fluid modeling of pollution proliferation in p2p networks," ACM SIGMETRICS Performance Evaluation Review, 335-346, 2006.
  20. S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, "The eigentrust algorithm for reputation management in p2p networks", in the Twelfth International World Wide Web Conference, pp. 640-651, 2003.
  21. K. Walsh, and E. G. Sirer, "Experience with an object reputation system for peer-to-peer file sharing," in USENIX NSDI''06, San Jose, CA, 2006.
  22. C. Costa, and J. Almeida, "Reputation systems for fighting pollution in peer-to-peer file sharing systems," in IEEE P2P'07, 2007.
  23. E. Zhai, R. Chen, Z. Cai, L. Zhang, E. K. Lua, H. Sun, S. Qing, L. Tang, and Z. Chen, "Sorcery: Could we make p2p content sharing systems robust to deceivers?", in the 9th International Conference on Peer-to-Peer Computing, 2009.
  24. N. Curtis, R. Safavi-Naini, and W. Susilo, "X2rep : Enhanced trust semantics for the xrep protocol", in ACNS''04, 2004.