Attacking the kad network-real world evaluation and high fidelity simulation using DVN

Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim

Research output: Contribution to journalArticle

3 Scopus citations

Abstract

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow an attacker with modest resources to cause a significant fraction of all searches to fail. We measure the cost and effectiveness of these attacks against a set of 16000 nodes connected to the operational Kad network. Using our large-scale simulator, DVN, we successfully scaled up to a 200000 node experiment. We also measure the cost of previously proposed, generic DHT attacks against the Kad network and find that our attacks are much more cost effective. Finally, we introduce and evaluate simple mechanisms to significantly increase the cost of these attacks.

Original languageEnglish (US)
Pages (from-to)1556-1575
Number of pages20
JournalSecurity and Communication Networks
Volume6
Issue number12
DOIs
StatePublished - Dec 2013

Keywords

  • Attack
  • Kad
  • P2P
  • Security
  • Simulation

Fingerprint Dive into the research topics of 'Attacking the kad network-real world evaluation and high fidelity simulation using DVN'. Together they form a unique fingerprint.

  • Cite this