Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06)
DOI: 10.1109/p2p.2006.15
|View full text |Cite
|
Sign up to set email alerts
|

Defense against Intrusion in a Live Streaming Multicast System

Abstract: Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss induced by malicious behavior. We describe SecureStream, an application-level live streaming system built using a pull-based architecture that results in improved tolerance of malicious behavior. SecureStream is implemented as a layer running over Fireflies, an intrusion-tolerant membership protocol. Our paper describes the SecureStream … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…[4][5][6][7] In Chainsaw, for example, nodes notify each other of receipt of data packets, and request packets from their neighbors based on the received notifications. Practical systems based on pull-based streaming now exist in China, where they are used to disseminate television channels to thousands of users.…”
Section: -3mentioning
confidence: 99%
“…[4][5][6][7] In Chainsaw, for example, nodes notify each other of receipt of data packets, and request packets from their neighbors based on the received notifications. Practical systems based on pull-based streaming now exist in China, where they are used to disseminate television channels to thousands of users.…”
Section: -3mentioning
confidence: 99%
“…Haridasan and van Renesse argue that not all applications need anonymity and confidentiality, but the features that matter most in frequent cases, are authenticity, integrity and non-negation [5]. Still anonymity becomes a key issue of privacy protection in live video streaming systems.…”
Section: B Security Goals In Live Video Streamingmentioning
confidence: 99%
“…This attack consists on malicious users connecting to a victim and uploading junk data (DHUNGEL et al, 2008;YANG et al, 2008). Solutions based on hash functions were proposed to verify the integrity of pieces (HARIDASAN; RENESSE, 2006;MEIER;WATTENHOFER, 2008;SO;REEVES, 2011). In another work, Lehmann et al (LEHMANN et al, 2012) propose an additional reputation mechanism to isolate users who send corrupt pieces.…”
Section: General Massive Attacksmentioning
confidence: 99%