Poisoning the Kad Network

被引:0
作者
Locher, Thomas [1 ]
Mysicka, David [1 ]
Schmid, Stefan [2 ]
Wattenhofer, Roger [1 ]
机构
[1] ETH, Comp Engn & Networks Lab TIK, Zurich, Switzerland
[2] TU Berlin, Deutsche Telekom Lab, Berlin, Germany
来源
DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS | 2010年 / 5935卷
基金
瑞士国家科学基金会;
关键词
ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years as, unlike the eDonkey network, it does not depend on central servers, which increases scalability and reliability. Moreover, the Kad network is more efficient than unstructured systems such as Gnutella. However, we show that today's Kad network can be attacked in several ways by carrying out several (well-known) attacks on the Kad network. The presented attacks could be used either to hamper the correct functioning of the network itself, to censor contents, or to harm other entities in the Internet not participating in the Kad network such as ordinary web servers. While there are simple heuristics to reduce the impact of some of the attacks, we believe that the presented attacks cannot be thwarted easily in any fully decentralized peer-to-peer system without some kind of a centralized certification and verification authority.
引用
收藏
页码:195 / +
页数:3
相关论文
共 50 条
  • [31] Multiscale Energy Network Tomography
    Feng, Yixiao
    Duffield, Nick
    2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [32] Sensor Network Security: A Survey
    Chen, Xiangqian
    Makki, Kia
    Yen, Kang
    Pissinou, Niki
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02): : 52 - 73
  • [33] Security on Wireless Sensor Network
    Yapar, Busranur
    Guven, Ebu Yusuf
    Aydin, Muhammed Ali
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 693 - 698
  • [34] An Overview of Network Confrontation in MANETs
    Dong, Chao
    Li, Hui
    Lu, Zhe-Ming
    Yang, Hong-Wa
    Pan, Gao-Feng
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 789 - 792
  • [35] Survey on Wireless Network Security
    Nazir, Rashid
    Laghari, Asif Ali
    Kumar, Kamlesh
    David, Shibin
    Ali, Munwar
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (03) : 1591 - 1610
  • [36] Wireless Sensor Network and Security
    Sharma, Sonia
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3301 - 3304
  • [37] An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset
    Rao, Yamarthi Narasimha
    Babu, Kunda Suresh
    SENSORS, 2023, 23 (01)
  • [38] The Blackhole Attack on Vehicular Network
    Lachheb, Achraf
    Souidi, El Mamoun
    2022 9TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS, WINCOM, 2022, : 212 - 216
  • [39] Machine Learning for Network Routing
    Gelenbe, Erol
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 3 - 3
  • [40] OPTIMIZATION OF COMPUTER NETWORK SECURITY SYSTEM BASED ON IMPROVED NEURAL NETWORK ALGORITHM AND DATA SEARCHING
    Tian, Chongfeng
    Chen, Zhihao
    Zhu, Yi
    Lu, Hongfei
    Li, Guoxiao
    Li, Rongquan
    Pan, Wei
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3979 - 3988