{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:46Z","timestamp":1750307566216,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003452","name":"Innovation and Technology Commmission","doi-asserted-by":"publisher","award":["ITS\/013\/08"],"award-info":[{"award-number":["ITS\/013\/08"]}],"id":[{"id":"10.13039\/501100003452","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong","doi-asserted-by":"publisher","award":["611107"],"award-info":[{"award-number":["611107"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000923","name":"Silicon Valley Community Foundation","doi-asserted-by":"publisher","award":["SVCF08\/09.EG01"],"award-info":[{"award-number":["SVCF08\/09.EG01"]}],"id":[{"id":"10.13039\/100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2010,3]]},"abstract":"<jats:p>Current peer-to-peer (P2P) streaming systems often assume that nodes cooperate to upload and download data. However, in the open environment of the Internet, this is not necessarily true and there exist malicious nodes in the system. In this article, we study malicious actions of nodes that can be detected through peer-based monitoring. We require each node to monitor the data received and to periodically send monitoring messages about its neighbors to some trustworthy nodes. To efficiently store and search messages among multiple trustworthy nodes, we organize trustworthy nodes into a threaded binary tree. Trustworthy nodes also dynamically redistribute monitoring messages among themselves to achieve load balancing. Our simulation results show that this scheme can efficiently detect malicious nodes with high accuracy, and that the dynamic redistribution method can achieve good load balancing among trustworthy nodes.<\/jats:p>","DOI":"10.1145\/1671962.1671965","type":"journal-article","created":{"date-parts":[[2010,3,19]],"date-time":"2010-03-19T19:22:47Z","timestamp":1269026567000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring"],"prefix":"10.1145","volume":"6","author":[{"given":"Xing","family":"Jin","sequence":"first","affiliation":[{"name":"Oracle USA, Inc."}]},{"given":"S.-H. Gary","family":"Chan","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2010,3,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Adar E. and Huberman B. A. 2000. Free riding on Gnutella. Tech. rep. HP. http:\/\/www.hpl.hp.com\/research\/idl\/papers\/gnutella\/gnutella.pdf.  Adar E. and Huberman B. A. 2000. Free riding on Gnutella. Tech. rep. HP. http:\/\/www.hpl.hp.com\/research\/idl\/papers\/gnutella\/gnutella.pdf.","DOI":"10.5210\/fm.v5i10.792"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633045"},{"volume-title":"Poblano: A distributed trust model for peer-to-peer networks. Tech. rep. SUN Microsystems.","year":"2001","author":"Chen R.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803066"},{"key":"e_1_2_1_6_1","unstructured":"Cormen T. H. Leiserson C. E. Rivest R. L. and Stein C. 2001. Introduction to Algorithms. MIT Press.   Cormen T. H. Leiserson C. E. Rivest R. L. and Stein C. 2001. Introduction to Algorithms. MIT Press."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511496"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586138"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52331"},{"volume-title":"Proceedings of the IEEE International Communications Conference (ICC). 1467--1472","author":"Do T.","key":"e_1_2_1_10_1"},{"volume-title":"Proceedings of the International Conference on Database and Expert Systems (DEXA).","author":"Dragovic B.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775195"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.870724"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2007.907451"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012980307500"},{"volume-title":"Proceedings of the USINEX Symposium on Operating Systems Design and Implementation (OSDI). 197--212","year":"2000","author":"Jannotti J.","key":"e_1_2_1_16_1"},{"volume-title":"Proceedings of the IEEE International Conference on Multimedia and Expo (ICME). 1537--1540","author":"Jin X.","key":"e_1_2_1_17_1"},{"volume-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM).","author":"Jin X.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.70"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_21_1","unstructured":"KaZaa. http:\/\/www.kazaa.com.  KaZaa. http:\/\/www.kazaa.com."},{"key":"e_1_2_1_22_1","unstructured":"Knuth D. E. 1998. The Art of Programming Volume 3: Sorting and Searching 2nd Ed. Addison-Wesley.   Knuth D. E. 1998. The Art of Programming Volume 3: Sorting and Searching 2nd Ed. Addison-Wesley."},{"volume-title":"Proceedings of the Workshop on Economics of Peer-to-Peer Systems (P2PECON).","author":"Lai K.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-006-0013-7"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.025"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_4"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_21"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.012"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133613"},{"volume-title":"Proceedings of the IEEE Conference on Peer to Peer Computing (P2P). 142--149","author":"Singh A.","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","unstructured":"SSL. Introduction to SSL http:\/\/docs.sun.com\/source\/816-6156-10\/contents.htm.  SSL. Introduction to SSL http:\/\/docs.sun.com\/source\/816-6156-10\/contents.htm."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"volume-title":"Proceedings of the IEEE International Workshop on Quality of Service (IWQoS). 41--50","author":"Tan G.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.374426"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818803"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 1366--1375","author":"Zhang B.","key":"e_1_2_1_39_1"},{"volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 2102--2111","author":"Zhang X.","key":"e_1_2_1_40_1"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1671962.1671965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1671962.1671965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:40:53Z","timestamp":1750250453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1671962.1671965"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["10.1145\/1671962.1671965"],"URL":"https:\/\/doi.org\/10.1145\/1671962.1671965","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2010,3]]},"assertion":[{"value":"2008-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-03-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}