Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The impact of DHT routing geometry on resilience and proximity
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Exploiting P2P systems for DDoS attacks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Democratizing content publication with coral
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
BotTorrent: misusing BitTorrent to launch DDoS attacks
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Misusing unstructured p2p systems to perform dos attacks: the network that never forgets
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
The heisenbot uncertainty problem: challenges in separating bots from chaff
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Antisocial Networks: Turning a Social Network into a Botnet
ISC '08 Proceedings of the 11th international conference on Information Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enabling global multimedia distributed services based on hierarchical DHT overlay networks
International Journal of Internet Protocol Technology
Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Evaluation of Sybil Attacks Protection Schemes in KAD
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Long term study of peer behavior in the KAD DHT
IEEE/ACM Transactions on Networking (TON)
Avoiding eclipse attacks on kad/kademlia: an identity based approach
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Traffic localization for DHT-based BitTorrent networks
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT
Computer Communications
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Journal of Network and Computer Applications
Peer-to-Peer Information Retrieval: An Overview
ACM Transactions on Information Systems (TOIS)
Peer-assisted content distribution on a budget
Computer Networks: The International Journal of Computer and Telecommunications Networking
Network Security
eDonkey & eMule's Kad: Measurements & Attacks
Fundamenta Informaticae
Sophia: A local trust system to secure key-based routing in non-deterministic DHTs
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating application for peer-to-peer is file sharing. Some of the most popular peer-to-peer systems for file sharing have been Napster, FastTrack, BitTorrent, and eDonkey, each one counting a million or more users at their peak time. We got interested in kad since it is the only DHT that has been part of very popular peer-to-peer system with several million simultaneous users. As we have been studying kad over the course of the last 18 months we have been both, fascinated and frightened by the possibilities kad offers. Mounting a Sybil attack is very easy in kad and allows to compromise the privacy of kad users, to compromise the correct operation of the key lookup and to mount DDOS with very little resources. In this paper, we will relate some of our findings and point out how kad can be used and misused.