Abstract
The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented security measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required resources.
Chapter PDF
Similar content being viewed by others
References
ipoque GmbH: ipoque Internet Study (2007), http://www.ipoque.com/resources/internet-studies/internet-study-2007/
Haßlinger, G.: ISP Platforms Under a Heavy Peer-to-Peer Workload. In: Steinmetz, R., Wehrle, K. (eds.) Peer-to-Peer Systems and Applications. LNCS, vol. 3485, pp. 369–381. Springer, Heidelberg (2005)
Skype website: http://www.skype.com/
Joost website: http://www.joost.com/
Microsoft Groove website: http://www.microsoft.com/groove/
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1–9 (2008)
Steiner, M., En-Najjary, T., Biersack, E.W.: Exploiting KAD: possible Uses and Misuses. SIGCOMM Computer Communication Review 37(5) (2007)
Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)
eMule website: http://www.emule-project.net/
aMule website: http://www.amule.org/
MLDonkey website: http://www.mldonkey.org/
Brunner, R.: A performance evaluation of the Kad-protocol. Master’s thesis, University of Mannheim and Institut Eurécom, Sophia-Antipolis, France (2006)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Computer Communication Review Online, Editorial Zone of [7]: http://ccr.sigcomm.org/online/?q=node/288
MorphXT website: http://www.emule-mods.de/?mods=morphxt/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kohnen, M., Leske, M., Rathgeb, E.P. (2009). Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network. In: Fratta, L., Schulzrinne, H., Takahashi, Y., Spaniol, O. (eds) NETWORKING 2009. NETWORKING 2009. Lecture Notes in Computer Science, vol 5550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01399-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-01399-7_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01398-0
Online ISBN: 978-3-642-01399-7
eBook Packages: Computer ScienceComputer Science (R0)