PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

eDonkey & eMule's Kad: Measurements & Attacks

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This article reports on the results of our measurement study of the Kad network. Although several fully decentralized peer-to-peer systems have been proposed in the literature, most existing systems still employ a centralized architecture. The Kad network is a notable exception. Since the demise of the Overnet network, the Kad network has become the most popular peer-topeer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years due to the system’s scalability and reliability. The contribution of the article is twofold. First, we compare the two networks accessed by eMule: the centralized paradigmof the eDonkey network and the structured, distributed approach pursued by the Kad network. We re-engineer the eDonkey server software and integrate two modified servers into the eDonkey network in order to monitor traffic. Additionally, we implement a Kad client exploiting a design weakness to spy on the traffic at arbitrary locations in the ID space. The collected data provides insights into the spacial and temporal distributions of the peers’ activity. Moreover, it allows us to study the searched content. The article also discusses problems related to the collection of such data sets and investigates techniques to verify the representativeness of the measured data. Second, this article shows that today’s Kad network can be attacked in several ways. Our simple attacks could be used either to hamper the correct functioning of the network itself, to censor content, or to harm other entities in the Internet not participating in the Kad network, such as ordinary web servers. While there are heuristics to improve the robustness of Kad, we believe that the attacks cannot be thwarted easily in a fully decentralized peer-to-peer system, i.e., without some kind of a centralized certification and verification authority. This result may be relevant in the context of the current debate on the design of a clean-slate network architecture for the Internet which is based on concepts known from the peer-to-peer paradigm.
Wydawca
Rocznik
Strony
383--403
Opis fizyczny
Bibliogr. 31 poz., tab., wykr.
Twórcy
autor
autor
Bibliografia
  • [1] E. Adar and B. A. Huberman. Free Riding on Gnutella. First Monday, 5(10), 2000.
  • [2] E. Athanasopoulos, K. G. Anagnostakis, and E. P. Markatos. Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In Proc. 4th International Conference on Applied Cryptography and Network Security (ACNS), 2006.
  • [3] B. Awerbuch and C. Scheideler. Towards a Scalable and Robust DHT. In Proc. 18th Annual ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pages 318-327, 2006.
  • [4] B. Awerbuch and C. Scheideler. Towards Scalable and Robust Overlay Networks. In Proc. 6th IPTPS, 2007.
  • [5] B. Awerbuch and C. Scheideler. Robust Random Number Generation for Peer-to-Peer Systems. Theor. Comput. Sci., 410(6-7):453-466, 2009.
  • [6] D. Carra and E. W. Biersack. Building a Reliable P2P System out of Unreliable P2P Clients: The Case of KAD. In Proc. ACM CoNEXT, 2007.
  • [7] M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S.Wallach. Secure Routing for Structured Peer-to-Peer Overlay Networks. In Proc. 5th Symposium on Operating Systems Design and Implementation (OSDI), pages 299-314, 2002.
  • [8] K. E. Defrawy,M. Gjoka, and A.Markopoulou. BotTorrent: Misusing BitTorrent to Launch DDoS Attacks. In Proc. 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2007.
  • [9] J. R. Douceur. The Sybil Attack. In Proc. 1st IPTPS, 2002.
  • [10] S. Guha, N. Daswani, and R. Jain. An Experimental Study of the Skype Peer-to-Peer VoIP System. In Proc. 5th International Workshop on Peer-to-Peer Systems, 2006.
  • [11] A. Haeberlen, A. Mislove, A. Post, and P. Druschel. Fallacies in Evaluating Decentralized Systems. In Proc. 5th International Workshop on Peer-to-Peer Systems, 2006.
  • [12] J. Liang, N. Naoumov, and K. W. Ross. The Index Poisoning Attack in P2P File Sharing Systems. In Proc. 25th Annual IEEE Conference on Computer Communications (INFOCOM), 2006.
  • [13] T. Locher, P. Moor, S. Schmid, and R. Wattenhofer. Free Riding in BitTorrent is Cheap. In Proc. 5th Workshop on Hot Topics in Networks (HotNets), 2006.
  • [14] T. Locher, D. Mysicka, S. Schmid, and R. Wattenhofer. Invited Paper: A Peer Activity Study in eDonkey & Kad. In Proc. International Workshop on Dynamic Networks: Algorithms and Security (DYNAS), 2009.
  • [15] T. Locher, D. Mysicka, S. Schmid, and R. Wattenhofer. Poisoning the Kad Network. In Proc. 11th International Conference on Distributed Computing and Networking (ICDCN), 2010.
  • [16] P. Maymounkov and D. Mazi`eres. A Peer-to-Peer Information System Based on the XOR Metric. In Proc. 1st IPTPS, 2002.
  • [17] N. Naoumov and K. Ross. Exploiting P2P Systems for DDoS Attacks. In Proc. 1st International Conference on Scalable Information Systems (INFOSCALE), 2006.
  • [18] S. J. Nielson, S. A. Crosby, and D. S.Wallach. A Taxonomy of Rational Attacks. In Proc. 4th IPTPS, 2005.
  • [19] S. Saroiu, P. K. Gummadi, and S. D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems. In Proc. of Multimedia Computing and Networking (MMCN), 2002.
  • [20] C. Scheideler. How to Spread Adversarial Nodes?: Rotate! In Proc. 37th Annual ACM Symposium on Theory of Computing (STOC), pages 704-713, 2005.
  • [21] A. Singh, T.-W. J. Ngan, P. Druschel, and D. S. Wallach. Eclipse Attacks on Overlay Networks: Threats and Defenses. In Proc. 25th Annual IEEE Conference on Computer Communications (INFOCOM), 2006.
  • [22] M. Steiner. Private Communication.
  • [23] M. Steiner, E. W. Biersack, and T. En-Najjary. Actively Monitoring Peers in the KAD. In Proc. 6th IPTPS, 2007.
  • [24] M. Steiner, D. Carra, and E.W. Biersack. Faster Content Access in KAD. In Proc. 8th IEEE Conference on Peer-to-Peer Computing (P2P), 2008.
  • [25] M. Steiner, T. En-Najjary, and E. W. Biersack. Exploiting KAD: Possible Uses and Misuses. In Computer Communication Review 37(5), 2007.
  • [26] M. Steiner, T. En-Najjary, and E. W. Biersack. A Global View of KAD. In Proc. 7th ACM IMC, 2007.
  • [27] D. Stutzbach and R. Rejaie. Understanding Churn in Peer-to-Peer Networks. In Proc. 6th IMC, 2006.
  • [28] D. Stutzbach and R. Rejaie. Improving Lookup Performance over a Widely-Deployed DHT. In Proc. 25th IEEE INFOCOM, 2006.
  • [29] X. Sun, R. Torres, and S. Rao. Preventing DDoS Attacks with P2P Systems through Robust Membership Management. Technical Report TR-ECE-07-13, Purdue University, 2007.
  • [30] D. S. Wallach. A Survey of Peer-to-Peer Security Issues. In Proc. International Symposium on Software Security, 2002.
  • [31] L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M. Costa, and S. Chien. A First Look at Peer-to-Peer Worms: Threats and Defenses. In Proc. 4th IPTPS, 2005.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0019-0010
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.