Misusing Kademlia Protocol to Perform DDoS Attacks

被引:6
|
作者
Yu, Jie [1 ]
Li, Zhoujun [2 ]
Chen, Xiaoming [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Beijing Univ, Sch Engn & Comp Sci, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
Kademlia; DDoS; P2P; Security;
D O I
10.1109/ISPA.2008.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly Involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types: asymmetric attack, routing table reflection attack and index reflection attack. A limited real-world experiment was run on eMule and the results show that these attacks tie up bandwidth and TCP connection resources of victim. We analyze the results of our experiment in three aspects: the effect of DDoS attacks by misusing Kad in eMule, the comparison between asymmetric attack and routing table reflection attack, and the distribution of attacks. More large-scale DDoS attack can be performed by means of a little more effort. We introduce some methods to amplify the performance of attack and some strategies to evade detection. Finally, we further discuss several solutions for these DDoS attacks.
引用
收藏
页码:80 / +
页数:2
相关论文
共 50 条
  • [1] Advertising DNS Protocol Use to Mitigate DDoS Attacks
    Davis, Jacob
    Deccio, Casey
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [2] Collaborative Detection of DDoS Attacks Based on Chord Protocol
    Han, Zilong
    Wang, Xiaofeng
    Wang, Fei
    Wang, Yongjun
    2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [3] Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets
    Athanasopoulos, Elias
    Anagnostakis, Kostas G.
    Markatos, Evangelos P.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 130 - 145
  • [4] Multiclassification Analysis of Volumetric, Protocol, and Application Layer DDoS Attacks
    Brown, Eric
    Fisher, John
    Hudon, Aaron
    Colston, Erick
    Lu, Wei
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 6, AINA 2024, 2024, 204 : 401 - 413
  • [5] A protocol for cluster confirmations of SDN controllers against DDoS attacks
    Iranmanesh, Amir
    Naji, Hamid Reza
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93
  • [6] The packet marking and the filtering protocol to counter against the DDoS attacks
    Park, J
    Choi, JH
    Seo, DW
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 624 - 627
  • [7] Network attack using TCP protocol for performing DoS and DDoS attacks
    Dulik, Miroslav, Jr.
    2019 COMMUNICATION AND INFORMATION TECHNOLOGIES (KIT 2019), 2019, : 139 - 144
  • [8] Preventing Sybil attacks in chord and Kademlia protocols
    Trifa, Zied
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2019, 12 (03) : 157 - 166
  • [9] An improved kademlia protocol in a VoIP system
    Wu, Xiao
    Fu, Cuiyun
    Chang, Huiyou
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 920 - 925
  • [10] Specifying and Analyzing the Kademlia Protocol in Maude
    Pita, Isabel
    Riesco, Adrian
    THEORETICAL ASPECTS OF COMPUTING - ICTAC 2015, 2015, 9399 : 524 - 541