Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network

  • Authors:
  • Michael Kohnen;Mike Leske;Erwin P. Rathgeb

  • Affiliations:
  • Institute for Experimental Mathematics, University of Duisburg-Essen, Essen, 45326;Institute for Experimental Mathematics, University of Duisburg-Essen, Essen, 45326;Institute for Experimental Mathematics, University of Duisburg-Essen, Essen, 45326

  • Venue:
  • NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented security measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required resources.