Poisoning the Kad Network

被引:0
作者
Locher, Thomas [1 ]
Mysicka, David [1 ]
Schmid, Stefan [2 ]
Wattenhofer, Roger [1 ]
机构
[1] ETH, Comp Engn & Networks Lab TIK, Zurich, Switzerland
[2] TU Berlin, Deutsche Telekom Lab, Berlin, Germany
来源
DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS | 2010年 / 5935卷
基金
瑞士国家科学基金会;
关键词
ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years as, unlike the eDonkey network, it does not depend on central servers, which increases scalability and reliability. Moreover, the Kad network is more efficient than unstructured systems such as Gnutella. However, we show that today's Kad network can be attacked in several ways by carrying out several (well-known) attacks on the Kad network. The presented attacks could be used either to hamper the correct functioning of the network itself, to censor contents, or to harm other entities in the Internet not participating in the Kad network such as ordinary web servers. While there are simple heuristics to reduce the impact of some of the attacks, we believe that the presented attacks cannot be thwarted easily in any fully decentralized peer-to-peer system without some kind of a centralized certification and verification authority.
引用
收藏
页码:195 / +
页数:3
相关论文
共 50 条
  • [41] LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection
    Damasevicius, Robertas
    Venckauskas, Algimantas
    Grigaliunas, Sarunas
    Toldinas, Jevgenijus
    Morkevicius, Nerijus
    Aleliunas, Tautvydas
    Smuikys, Paulius
    ELECTRONICS, 2020, 9 (05)
  • [42] Effective defense strategies in network security using improved double dueling deep Q-network
    Zhu, Zhengwei
    Chen, Miaojie
    Zhu, Chenyang
    Zhu, Yanping
    COMPUTERS & SECURITY, 2024, 136
  • [43] ApaPRFL: Robust Privacy-Preserving Federated Learning Scheme Against Poisoning Adversaries for Intelligent Devices Using Edge Computing
    Zuo, Shaojun
    Xie, Yong
    Wu, Libing
    Wu, Jing
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 725 - 734
  • [44] SAFe-Health: Guarding federated learning-driven smart healthcare with federated defense averaging against data poisoning
    Mali, Bhabesh
    Singh, Pranav Kumar
    Mazumdar, Nabajyoti
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [45] Wireless Sensor Network Security Models
    Sovetov, B. Ya
    Tatarnikova, T. M.
    Cehanovsky, V. V.
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 595 - 598
  • [46] Ontology Based Approach for Network Security
    Arunadevi, M.
    Perumal, K. S.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 573 - 578
  • [47] Identifying a Malicious Node in a UAV Network
    Zilberman, Aviram
    Stulman, Ariel
    Dvir, Amit
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (01): : 1226 - 1240
  • [48] Defining and measuring the resilience of network services
    Wang, Kewei
    Hu, Changzhen
    Shan, Chun
    COMPUTER NETWORKS, 2025, 258
  • [49] Advanced Network and System Security Teaching
    Ogrizovic, Mihajlo
    Vuletic, Pavle
    Stanisavljevic, Zarko
    ELECTRONICS, 2025, 14 (01):
  • [50] Compressive Privacy Generative Adversarial Network
    Tseng, Bo-Wei
    Wu, Pei-Yuan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2499 - 2513