Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may intentionally wish to disrupt the multicast service or cause confusions to other peers. We propose two new schemes to detect malicious peers in overlay multicast streaming. These schemes compute a level of trust for each peer in the network. Peers with a trust value below a threshold are considered to be malicious. Results from our simulations indicate that the proposed schemes can detect malicious peers with medium to high accuracy, depending on cheating patterns and malicious peer percentages.
Peer-to-Peer (P2P) live video streaming systems are known to suffer from intermediate attacks due to...
In this paper we introduce some significant improvements to a well known algorithm for multicast in ...
Multicast services raise significant operational and security challenges not only when deployed on t...
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resour...
Current peer-to-peer (P2P) streaming systems often assume that nodes are cooperative to upload and d...
Online streaming is a popular service for data-intensive applications such as video streaming. P2P-b...
We study the impact of cheating nodes in application-level multicast overlay trees. We focus on self...
Current peer-to-peer (P2P) streaming systems often assume that nodes cooperate to upload and downloa...
Abstract—Researchers show that network coding can greatly improve the quality of service in P2P live...
Network coding has been shown to be capable of greatly improving quality of service in P2P live stre...
We study the impact of cheating nodes in application-level multicast overlay trees. We focus on self...
The cooperation of end users can be exploited to boost the performance of high-bandwidth multicast. ...
AbstractEven though overlay streaming is an inherently fault tolerant and stable system architecture...
Peer to peer live streaming applications are vulnerable to malicious actions of peers that deliberat...
We present a flexible framework for throttling attackers in peer-to-peer media streaming systems. In...
Peer-to-Peer (P2P) live video streaming systems are known to suffer from intermediate attacks due to...
In this paper we introduce some significant improvements to a well known algorithm for multicast in ...
Multicast services raise significant operational and security challenges not only when deployed on t...
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resour...
Current peer-to-peer (P2P) streaming systems often assume that nodes are cooperative to upload and d...
Online streaming is a popular service for data-intensive applications such as video streaming. P2P-b...
We study the impact of cheating nodes in application-level multicast overlay trees. We focus on self...
Current peer-to-peer (P2P) streaming systems often assume that nodes cooperate to upload and downloa...
Abstract—Researchers show that network coding can greatly improve the quality of service in P2P live...
Network coding has been shown to be capable of greatly improving quality of service in P2P live stre...
We study the impact of cheating nodes in application-level multicast overlay trees. We focus on self...
The cooperation of end users can be exploited to boost the performance of high-bandwidth multicast. ...
AbstractEven though overlay streaming is an inherently fault tolerant and stable system architecture...
Peer to peer live streaming applications are vulnerable to malicious actions of peers that deliberat...
We present a flexible framework for throttling attackers in peer-to-peer media streaming systems. In...
Peer-to-Peer (P2P) live video streaming systems are known to suffer from intermediate attacks due to...
In this paper we introduce some significant improvements to a well known algorithm for multicast in ...
Multicast services raise significant operational and security challenges not only when deployed on t...