SPoIM: A close look at pollution attacks in P2P live streaming

SPoIM: A close look at pollution attacks in P2P live streaming Peer-to-Peer (P2P) live streaming traffic has been growing at a phenomenal rate over the past few years. When the original streaming content is mixed with bogus data, the corresponding P2P streamingnetwork is being subjected to a “pollution attack.” As the content is shared by peers, the bogus data can be spread widely in minutes. In this paper, we study the impact of a pollution attack in popularstreaming models, under various network settings and configurations. The study was conducted in SPoIM, our emulation of real-world P2P streaming systems under pollution attacks, through which we observed that the feasibility of the attack is sensitive to the speed at which an attacker can modify content. Our experimental results showed that different streaming approaches are more vulnerable in one network configuration than the others, and that the impact and effectiveness of the attack is not dependent on the network size, but does highly depend on the network stability and the bandwidth availability of the polluters and the source. Based the experimental results, we suggested possible improvements in streaming models to defend themselves against the pollution attack. Finally, we examined possible defense mechanisms and demonstrated the effectiveness of a reputation-based defense mechanism against a typical pollution attack.