Poisoning the Kad Network

被引:0
|
作者
Locher, Thomas [1 ]
Mysicka, David [1 ]
Schmid, Stefan [2 ]
Wattenhofer, Roger [1 ]
机构
[1] ETH, Comp Engn & Networks Lab TIK, Zurich, Switzerland
[2] TU Berlin, Deutsche Telekom Lab, Berlin, Germany
来源
DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS | 2010年 / 5935卷
基金
瑞士国家科学基金会;
关键词
ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years as, unlike the eDonkey network, it does not depend on central servers, which increases scalability and reliability. Moreover, the Kad network is more efficient than unstructured systems such as Gnutella. However, we show that today's Kad network can be attacked in several ways by carrying out several (well-known) attacks on the Kad network. The presented attacks could be used either to hamper the correct functioning of the network itself, to censor contents, or to harm other entities in the Internet not participating in the Kad network such as ordinary web servers. While there are simple heuristics to reduce the impact of some of the attacks, we believe that the presented attacks cannot be thwarted easily in any fully decentralized peer-to-peer system without some kind of a centralized certification and verification authority.
引用
收藏
页码:195 / +
页数:3
相关论文
共 50 条
  • [21] Improving lookup reliability in Kad
    Liu, Bingshuang
    Wei, Tao
    Zhang, Chao
    Li, Jun
    Zhang, Jianyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (01) : 156 - 170
  • [22] THE LETTER OF THE LAW - ROOME,KAD
    LEVENTER, J
    UNIVERSITY OF DETROIT JOURNAL OF URBAN LAW, 1980, 57 (02): : 459 - 467
  • [23] '2 Kings' - German - Smelik,KAD
    Vogels, WA
    CATHOLIC BIBLICAL QUARTERLY, 1996, 58 (04): : 725 - 726
  • [24] Poisoning Network Flow Classifiers
    Severi, Giorgio
    Boboila, Simona
    Oprea, Alina
    Holodnak, John
    Kratkiewicz, Kendra
    Matterer, Jason
    39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 337 - 351
  • [25] 'LETTER OF THE LAW' - ROOME,KAD
    FADIMAN, A
    SATURDAY REVIEW, 1979, 6 (19) : 49 - 49
  • [26] THE LETTER OF THE LAW - ROOME,KAD
    STARK, SD
    AMERICAN BAR ASSOCIATION JOURNAL, 1981, 67 (MAY): : 602 - &
  • [27] THE LETTER OF THE LAW - ROOME,KAD
    不详
    EMORY LAW JOURNAL, 1980, 29 (02) : 597 - 598
  • [28] Faster Content Access in KAD
    Steiner, Moritz
    Carra, Damiano
    Biersack, Ernst W.
    P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 195 - 204
  • [29] Adaptive Load Balancing in KAD
    Carra, Damiano
    Steiner, Moritz
    Michiardi, Pietro
    2011 IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2011, : 92 - 101
  • [30] I kad budes velik
    Matkovic-Vlasic, Ljiljana
    NOVA PRISUTNOST, 2016, 14 (01):