Xiaosong Lou

Learn More
Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We propose a proactive content poisoning scheme to(More)
The USC GridSec project develops distributed security infrastructure and self-defense capabilities to secure wide-area networked resource sites participating in a Grid application. We report new developments in trust modeling, security-binding methodology, and defense architecture against intrusions, worms, and flooding attacks. We propose a novel(More)
A major security threat to the normal use and legal sharing of peer-to-peer (P2P) resources is DDoS (distributed denial-of-service) attacks caused by file index poisoning. This type of attacks exploits the design vulnerability of P2P networks. By populating unprotected peers with poisoned file indexes, attacker can cause DDoS flooding attacks on arbitrary(More)
We propose an integrated copyright- protection scheme for large-scale content delivery over the Internet. We focus on using trust-enhanced peer-to- peer (P2P) networks. Our framework integrates anonymous peer authentication, content poisoning, peer collusion detection and reputation aggregation. Some of the trust and security mechanisms are newly developed(More)
Peer-to-peer (P2P) networks are vulnerable from malicious attacks by anonymous users. By populating unprotected peers with poisoned file indices, the attacker can launch a poisoning DDoS (distributed denial-of-service) attacks on any host in the network. We solve this security problem with identity-based signatures contained in file indexes to establish(More)
In Peer-to-peer (P2P) IPTV networks, jitter rate is one of the most important metrics for Quality of Service. In this paper, we develop a new approach to estimate jitter rate during playback. Unlike traditional approaches that focus on the download speed, our method relies on the distribution of peer download latencies. We demonstrated how to apply the(More)
  • 1