2013
DOI: 10.1002/sec.172
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the kad network—real world evaluation and high fidelity simulation using DVN

Abstract: SummaryThe Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow an attacker with modest resources to cause a significant fraction of all searches to fail. We measure the cost and effectiveness of these attacks against a set of 16 000 nodes connected to the operational Kad network. Using our large-scale simulator, DVN,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 24 publications
(25 reference statements)
0
4
0
Order By: Relevance
“…The security Kademlia [7] and its inspired implementations have been studied extensively [10], [19]- [21]. Steiner et al [19] explore the space of possible attacks and implications whereas subsequent works focus on optimizations of these attacks [10], [21] and circumventing implemented countermeasures [20]. Most approaches require the ability to arbitrarily choose node IDs.…”
Section: B Attacks On Kademlia-based Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The security Kademlia [7] and its inspired implementations have been studied extensively [10], [19]- [21]. Steiner et al [19] explore the space of possible attacks and implications whereas subsequent works focus on optimizations of these attacks [10], [21] and circumventing implemented countermeasures [20]. Most approaches require the ability to arbitrarily choose node IDs.…”
Section: B Attacks On Kademlia-based Networkmentioning
confidence: 99%
“…Most approaches require the ability to arbitrarily choose node IDs. Similar to our false friend attack where we insert carefully selected node IDs into the victim's discovery table, [21] present a low-resource approach to poison routing entries in the KAD network. Given multiple attacking nodes, the ID space is partitioned and routing entries hijacked by spoofing messages.…”
Section: B Attacks On Kademlia-based Networkmentioning
confidence: 99%
“…We should have full control of these two aspects in a simulator: we have considered the few available KAD simulators [34] [35], and none of them provides such control. For this reason we decided to implement a custom event-driven simulator [36].…”
Section: Simulator Description and Settingsmentioning
confidence: 99%
“…We should have full control on these two aspects in a simulator: we have considered the few available KAD simulators [12] [19] and none of them provides such control. For this reason we decided to implement a custom event driven simulator [7].…”
Section: A Simulator Description and Settingsmentioning
confidence: 99%