Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks 2008
DOI: 10.1145/1460877.1460907
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the Kad network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
4

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(30 citation statements)
references
References 10 publications
0
26
0
4
Order By: Relevance
“…In detail, such type of system, may be subjected to several types of threats, such as eavesdropping, data modification, IP address spoofing, Denial-of-Service (DoS ) [31] and man-in-the-middle attacks [32], [33], [34]. However, the absence of single point of failure, and hence of elements which may become an easy target for DoS attack, makes the proposed solution sufficiently robust, because of Kademlia, due to its decentralized architecture that is the only critical component for the overall system operations, is resistant against most of the known DoS attacks.…”
Section: The Security Servicesmentioning
confidence: 99%
“…In detail, such type of system, may be subjected to several types of threats, such as eavesdropping, data modification, IP address spoofing, Denial-of-Service (DoS ) [31] and man-in-the-middle attacks [32], [33], [34]. However, the absence of single point of failure, and hence of elements which may become an easy target for DoS attack, makes the proposed solution sufficiently robust, because of Kademlia, due to its decentralized architecture that is the only critical component for the overall system operations, is resistant against most of the known DoS attacks.…”
Section: The Security Servicesmentioning
confidence: 99%
“…They showed how this attack can take the control over information stored in the DHT, compromise the privacy of users and be used to launch a DDoS attack without further effort from a single computer. On the other hand, Wang et al [20] proposed an alternative attack, called reflection attack, in which all the entries in the target's routing table contain the target's IP. They proposed an identity authentication to avoid this hijacking, currently implemented by KAD clients.…”
Section: Related Workmentioning
confidence: 99%
“…These mechanisms include flood protection, IP verification and identity verification, and make a KAD client resilient to most known-attacks, including the Sybil attack [17] and contacts overwriting [20] attacks. KAD's developers considered the network's flaws and turned it into a strong and mature P2P network.…”
Section: Related Workmentioning
confidence: 99%
“…In the original Kad protocol, lookup is parallel. However, each round of the parallel lookup uses only the best results, allowing an attacker to perform a denial of service attack by returning many non-existent nodes with IDs close to the target [39]. Torsk iterative lookup fixes this problem by maintaining distinct "best result" lists for each of the three parallel paths.…”
Section: Design Of Torskmentioning
confidence: 99%