Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-t5tsf Total loading time: 0 Render date: 2024-11-05T09:44:05.342Z Has data issue: false hasContentIssue false

11 - Cheating behavior in colluder social networks

from Part IV - Misbehaving user identification

Published online by Cambridge University Press:  28 April 2011

H. Vicky Zhao
Affiliation:
University of Alberta
W. Sabrina Lin
Affiliation:
University of Maryland, College Park
K. J. Ray Liu
Affiliation:
University of Maryland, College Park
Get access

Summary

Until now we have discussed cooperation stimulation and how side information changes the behavior dynamics in various types of media-sharing social networks. For colluder social networks, as discussed in Chapters 5 and 8, before collusion, colluders need to reach an agreement regarding the fair distribution of the risk of being detected and the reward from illegal usage of multimedia. Chapters 5 and 8 analyze how colluders bargain with one another to achieve fairness of collusion, assuming all colluders report their private information (their received fingerprinted copies) honestly.

In reality, some colluders might break their fair-play agreement. They still wish to participate in and receive reward from collusion, but they do not want to take any risk of being detected by the digital rights enforcer. To achieve this goal, they may lie to other attackers about their fingerprinted copies. For example, they may process their fingerprinted signals before multiuser collusion and use the processed copies instead of the originally received ones during collusion. The cheating colluders' goal is to minimize their own risk while still receiving reward from collusion. Therefore, they select the most effective precollusion processing strategy to reduce their risk.

Precollusion processing reduces the cheating colluders' risk, and makes other attackers have a higher probability than the cheating colluders of being detected. It is obviously a selfish behavior. In some scenarios, precollusion processing can also increase other attackers' probability of being detected; this is not only selfish, but also malicious.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×