200 likes | 337 Views
The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses. Prithula Dhungel Xiaojun Hei Keith W. Ross Nitesh Saxena. Polytechnic University. The Pollution Attack. Attacker joins an ongoing video channel Attacker advertises it has a large number of chunks
E N D
The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel Xiaojun Hei Keith W. Ross Nitesh Saxena Polytechnic University
The Pollution Attack • Attacker joins an ongoing video channel • Attacker advertises it has a large number of chunks • When neighbors request chunks, attacker sends bogus chunks • Receiver plays back bogus chunks • Each receiver may further forward the polluted chunks
Peer Peer request request Peer Polluter Peer Peer request Peer Peer 3
Contributions • Identified the pollution attack in P2P live video streaming applications • Verify via experimental results (in PPLive) that pollution attack can be devastating • Survey possible defenses against the attack
Pollution Experiment Figure: PPLive pollution experiment setup
Measurement Results (1) Figure: Number of peers viewing channel over experiment periods 6
Brooklyn Peer Figure: Clean and polluted chunks to/from Brooklyn peer
Hong Kong Peer Figure: Clean and polluted chunks to/from Hong Kong peer
Pollution Defense Mechanisms • Blacklisting • Traffic Encryption • Chunk Signing • Sign-All Approach • Signature-Amortization Approaches • Star Chaining • Merkle Tree • Sign-and-Correct Approach
Chunk Signing • Use PKI • Every video source has public-private key pair • Source uses private key to sign the chunks • Receiver uses public key of source to verify integrity of chunk
“Sign-All” (1) • Source • Source signs each chunk • Sends signature (“authentication information”) with corresponding chunk • Receiver • Verifies each chunk individually using authentication information and public key of source
“Sign-All” (2) Chunk processing independence Bandwidth overhead • For a stream of m chunks, m signatures For 372 kbps channel with chunk size of 4000 bytes, around 3% Computation overhead - 1 (expensive) signature operation per chunk
“Block Signing” Chunks organized into blocks Each block contains n chunks After generating n chunks, hash concatenation of all hashes, and sign result Reduces computation But can’t verify individual chunks 13
“Star Chaining” • Chunks organized into blocks • Each block contains n chunks • After generating n chunks, calculate authentication information for each chunk • Signed hash of concatenation of all chunk hashes • Along with, all hashes of other n-1 chunks • Receiver, chunk by chunk: • Applies public key to get hash of hashes • Verifies by concatenating hash of current chunk with those of the n-1 chunks, and taking hash
“Star Chaining” Computation overhead –> 1 signature per block Loss–> If some chunks are lost in block, can still decode rest Bandwidth overhead -> for block of n chunks, n-1 hashes + n signatures For channel of bitrate 372 kbps and chunk size of 4000 bytes, n = 32, about 16%
“Merkle Tree” Computation overhead –> 1 signature per block Loss–> If some chunks are lost in block, can still decode rest Bandwidth overhead -> nlog2n hashes + n signatures (about 5%)
Conclusion • The pollution attack can be devastating • Defenses: • Signature Amortization (Merkle Tree) – less computational overhead and delay at receiver but more bandwidth overhead • Sign-and-Correct – less bandwidth requirement but higher processing delay and computational requirement • Based on requirements of the application, either of the two could be used
References [1] C. K.Wong and S. S. Lam. Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw., 1999. [2] A. Lysyanskaya, R. Tamassia, and N. Triandopoulos. Multicast authentication in fully adversarial networks. In IEEE Symposium on Security and Privacy, 2004.