Abstract
Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years as, unlike the eDonkey network, it does not depend on central servers, which increases scalability and reliability. Moreover, the Kad network is more efficient than unstructured systems such as Gnutella. However, we show that today’s Kad network can be attacked in several ways by carrying out several (well-known) attacks on the Kad network. The presented attacks could be used either to hamper the correct functioning of the network itself, to censor contents, or to harm other entities in the Internet not participating in the Kad network such as ordinary web servers. While there are simple heuristics to reduce the impact of some of the attacks, we believe that the presented attacks cannot be thwarted easily in any fully decentralized peer-to-peer system without some kind of a centralized certification and verification authority.
Research in part supported by the Swiss National Science Foundation (SNF).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Athanasopoulos, E., Anagnostakis, K.G., Markatos, E.P.: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 130–145. Springer, Heidelberg (2006)
Awerbuch, B., Scheideler, C.: Towards a Scalable and Robust DHT. In: Proc. SPAA (2006)
Awerbuch, B., Scheideler, C.: Towards Scalable and Robust Overlay Networks. In: Proc. 6th Int. Workshop on Peer-to-Peer Systems, IPTPS (2007)
Baruch, A., Christian, S.: Robust Random Number Generation for Peer-to-Peer Systems. Theor. Comput. Sci. 410(6-7), 453–466 (2009)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure Routing for Structured Peer-to-Peer Overlay Networks. In: Proc. OSDI (2002)
El Defrawy, K., Gjoka, M., Markopoulou, A.: BotTorrent: Misusing BitTorrent to Launch DDoS Attacks. In: Proc. 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI (2007)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Liang, J., Naoumov, N., Ross, K.W.: The Index Poisoning Attack in P2P File Sharing Systems. In: Proc. INFOCOM (2006)
Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free Riding in BitTorrent is Cheap. In: Proc. HotNets (2006)
Maymounkov, P., Mazières, D.: A Peer-to-Peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429. Springer, Heidelberg (2002)
Naoumov, N., Ross, K.: Exploiting P2P Systems for DDoS Attacks. In: Proc. 1st International Conference on Scalable Information Systems, INFOSCALE (2006)
Nielson, S.J., Crosby, S.A., Wallach, D.S.: A taxonomy of rational attacks. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 36–46. Springer, Heidelberg (2005)
Christian, S.: How to Spread Adversarial Nodes?: Rotate!. In: Proc. STOC (2005)
Singh, A., Ngan, T.-W.J., Druschel, P., Wallach, D.S.: Eclipse Attacks on Overlay Networks: Threats and Defenses. In: Proc. INFOCOM (2006)
Steiner, M., Biersack, E.W., Ennajjary, T.: Actively Monitoring Peers in the KAD. In: Proc. 6th Int. Workshop on Peer-to-Peer Systems, IPTPS (2007)
Steiner, M., En-Najjary, T., Biersack, E.W.: Exploiting KAD: Possible Uses and Misuses. SIGCOMM Comput. Commun. Rev. 37(5), 65–70 (2007)
Stutzbach, D., Rejaie, R.: Improving Lookup Performance over a Widely-Deployed DHT. In: Proc. INFOCOM (2006)
Stutzbach, D., Rejaie, R.: Understanding Churn in Peer-to-Peer Networks. In: Proc. 6th Internet Measurement Conference, IMC (2006)
Sun, X., Torres, R., Rao, S.: Preventing DDoS Attacks with P2P Systems through Robust Membership Management. Technical Report TR-ECE-07-13, Purdue University (2007)
Wallach, D.S.: A Survey of Peer-to-Peer Security Issues. In: International Symposium on Software Security (2002)
Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A first look at peer-to-peer worms: Threats and defenses. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 24–35. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Locher, T., Mysicka, D., Schmid, S., Wattenhofer, R. (2010). Poisoning the Kad Network. In: Kant, K., Pemmaraju, S.V., Sivalingam, K.M., Wu, J. (eds) Distributed Computing and Networking. ICDCN 2010. Lecture Notes in Computer Science, vol 5935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11322-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-11322-2_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11321-5
Online ISBN: 978-3-642-11322-2
eBook Packages: Computer ScienceComputer Science (R0)