Subscribe

Issue No.02 - March/April (2011 vol.8)

pp: 270-281

Sascha Grau , Technische Univerität Ilmenau, Ilmenau

Mathias Fischer , Technische Universität Ilmenau, Ilmenau

Michael Brinkmeier , Technische Universität Ilmenau, Ilmenau

Günter Schäfer , Technische Universität Ilmenau, Ilmenau

DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2009.51

ABSTRACT

We investigate the hardness of malicious attacks on multiple-tree topologies of push-based Peer-to-Peer streaming systems. In particular, we study the optimization problem of finding a minimum set of target nodes to achieve a certain damage objective. For this, we differentiate between three natural and increasingly complex damage types: global packet loss, service loss when using Multiple Description Coding, and service loss when using Forward Error Correction. We show that each of these attack problems is NP-hard, even for an idealized attacker with global knowledge about the topology. Despite tree-based topologies seem susceptible to such attacks, we can even prove that (under strong assumptions about NP) there is no polynomial time attacker, capable of guaranteeing a general solution quality within factors of c_1 \log (n) and c_2 2^{\log^{1-\delta } n} (with n topology nodes, \delta = 1 / \log \log^d n for d<1/2 and constants c_1, c_2), respectively. To our knowledge, these are the first lower bounds on the quality of polynomial time attacks on P2P streaming topologies. The results naturally apply to major real-world DoS attackers and show hard limits for their possibilities. In addition, they demonstrate superior stability of Forward Error Correction systems compared to Multiple Description Coding and give theoretical foundation to properties of stable topologies.

INDEX TERMS

P2P streaming, topology, attack stability, approximation, complexity theory.

CITATION

Sascha Grau, Mathias Fischer, Michael Brinkmeier, Günter Schäfer, "On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies",

*IEEE Transactions on Dependable and Secure Computing*, vol.8, no. 2, pp. 270-281, March/April 2011, doi:10.1109/TDSC.2009.51REFERENCES