Misusing Kademlia Protocol to Perform DDoS Attacks

被引:6
|
作者
Yu, Jie [1 ]
Li, Zhoujun [2 ]
Chen, Xiaoming [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Beijing Univ, Sch Engn & Comp Sci, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
Kademlia; DDoS; P2P; Security;
D O I
10.1109/ISPA.2008.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly Involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types: asymmetric attack, routing table reflection attack and index reflection attack. A limited real-world experiment was run on eMule and the results show that these attacks tie up bandwidth and TCP connection resources of victim. We analyze the results of our experiment in three aspects: the effect of DDoS attacks by misusing Kad in eMule, the comparison between asymmetric attack and routing table reflection attack, and the distribution of attacks. More large-scale DDoS attack can be performed by means of a little more effort. We introduce some methods to amplify the performance of attack and some strategies to evade detection. Finally, we further discuss several solutions for these DDoS attacks.
引用
收藏
页码:80 / +
页数:2
相关论文
共 50 条
  • [21] Solutions for DDoS Attacks on Cloud
    Bhardwaj, Akashdeep
    Subrahmanyam, G. V. B.
    Avasthi, Vinay
    Sastry, Hanumat G.
    2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016, : 163 - 167
  • [22] Extenuate DDoS Attacks in Cloud
    Kiranmai, B.
    Damodaram, A.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 235 - 238
  • [23] Statistical Properties of DDoS Attacks
    Erhan, Derya
    Anarim, Emin
    2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019), 2019, : 1238 - 1242
  • [24] DDoS Attacks Detection with AutoEncoder
    Yang, Kun
    Zhang, Junjie
    Xu, Yang
    Chao, Jonathan
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [25] Avoiding Eclipse attacks on Kad/Kademlia: an identity based approach
    Fantacci, Romano
    Maccari, Leonardo
    Rosi, Matteo
    Chisci, Luigi
    Aiello, Luca Maria
    Milanesio, Marco
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 983 - +
  • [26] DDoS family: A novel perspective for massive types of DDoS attacks
    Zhao, Ziming
    Li, Zhaoxuan
    Zhou, Zhihao
    Yu, Jiongchi
    Song, Zhuoxue
    Xie, Xiaofei
    Zhang, Fan
    Zhang, Rui
    COMPUTERS & SECURITY, 2024, 138
  • [27] DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks
    Kopp, Daniel
    Dietzel, Christoph
    Hohlfeld, Oliver
    PASSIVE AND ACTIVE MEASUREMENT, PAM 2021, 2021, 12671 : 284 - 301
  • [28] Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment
    Girma, Anteneh
    Garuba, Moses
    Li, Jiang
    Liu, Chunmei
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 212 - 217
  • [29] Effect of DDoS Attacks on Traffic Features
    Erhan, Derya
    Anarim, Emin
    Kurt, Gunes Karabulut
    Kosar, Rabun
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [30] DDoS attacks in Industrial IoT: A survey
    Chaudhary, Shubhankar
    Mishra, Pramod Kumar
    COMPUTER NETWORKS, 2023, 236