Poisoning the Kad Network

被引:0
|
作者
Locher, Thomas [1 ]
Mysicka, David [1 ]
Schmid, Stefan [2 ]
Wattenhofer, Roger [1 ]
机构
[1] ETH, Comp Engn & Networks Lab TIK, Zurich, Switzerland
[2] TU Berlin, Deutsche Telekom Lab, Berlin, Germany
来源
DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS | 2010年 / 5935卷
基金
瑞士国家科学基金会;
关键词
ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years as, unlike the eDonkey network, it does not depend on central servers, which increases scalability and reliability. Moreover, the Kad network is more efficient than unstructured systems such as Gnutella. However, we show that today's Kad network can be attacked in several ways by carrying out several (well-known) attacks on the Kad network. The presented attacks could be used either to hamper the correct functioning of the network itself, to censor contents, or to harm other entities in the Internet not participating in the Kad network such as ordinary web servers. While there are simple heuristics to reduce the impact of some of the attacks, we believe that the presented attacks cannot be thwarted easily in any fully decentralized peer-to-peer system without some kind of a centralized certification and verification authority.
引用
收藏
页码:195 / +
页数:3
相关论文
共 50 条
  • [1] Lookup Performance Deficiencies in the KAD Network
    Yunzhao Li
    Hong Liu
    Don Guenbacher
    Caterina Scoglio
    Mobile Networks and Applications, 2014, 19 : 649 - 659
  • [2] Lookup Performance Deficiencies in the KAD Network
    Li, Yunzhao
    Liu, Hong
    Guenbacher, Don
    Scoglio, Caterina
    MOBILE NETWORKS & APPLICATIONS, 2014, 19 (05): : 649 - 659
  • [3] A-Kad: an anonymous P2P protocol based on Kad network
    Ni, YongQing
    Nyang, DaeHun
    Wang, Xu
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 978 - 983
  • [4] Social Network Analysis on KAD and Its Application
    Liu, Xiangtao
    Li, Yang
    Li, Zhezhong
    Cheng, Xueqi
    WEB TECHNOLOGIES AND APPLICATIONS, 2011, 6612 : 327 - 332
  • [5] Understanding Lookup Performance Deficiencies in the KAD Network
    Li, Yunzhao
    Gruenbacher, Don
    Scoglio, Caterina
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 462 - 470
  • [6] Sybil group attack detection in Kad network
    Li, Zhoujun, 1614, Science Press (51):
  • [7] A KAD Network Evolution Model Based on Node Behavior
    Wang Jian
    Feng Weisen
    CHINA COMMUNICATIONS, 2014, 11 (10) : 67 - 73
  • [8] Certificate Revocation List Distribution System for the KAD Network
    Caubet, Juan
    Ganan, Carlos
    Esparza, Oscar
    Munoz, Jose L.
    Mata-Diaz, Jorge
    Alins, Juanjo
    COMPUTER JOURNAL, 2014, 57 (02): : 273 - 280
  • [9] The study of the dynamic model on KAD network information spreading
    Wang, Ru
    Cai, Wandong
    Shen, Bo
    TELECOMMUNICATION SYSTEMS, 2016, 63 (03) : 371 - 379
  • [10] The study of the dynamic model on KAD network information spreading
    Ru Wang
    Wandong Cai
    Bo Shen
    Telecommunication Systems, 2016, 63 : 371 - 379