Misusing Kademlia Protocol to Perform DDoS Attacks

被引:6
|
作者
Yu, Jie [1 ]
Li, Zhoujun [2 ]
Chen, Xiaoming [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Beijing Univ, Sch Engn & Comp Sci, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
Kademlia; DDoS; P2P; Security;
D O I
10.1109/ISPA.2008.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly Involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types: asymmetric attack, routing table reflection attack and index reflection attack. A limited real-world experiment was run on eMule and the results show that these attacks tie up bandwidth and TCP connection resources of victim. We analyze the results of our experiment in three aspects: the effect of DDoS attacks by misusing Kad in eMule, the comparison between asymmetric attack and routing table reflection attack, and the distribution of attacks. More large-scale DDoS attack can be performed by means of a little more effort. We introduce some methods to amplify the performance of attack and some strategies to evade detection. Finally, we further discuss several solutions for these DDoS attacks.
引用
收藏
页码:80 / +
页数:2
相关论文
共 50 条
  • [31] Cooperative defence against DDoS attacks
    Zhang, GS
    Parashar, M
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2006, 38 (01): : 69 - 84
  • [32] Hybrid Traceback Scheme for DDoS Attacks
    Vipul
    Ranga, Virender
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 131 - 138
  • [33] Unified defense against DDoS attacks
    Muthuprasanna, M.
    Manimaran, C.
    Wang, Z.
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 1047 - +
  • [34] Detecting DDoS Attacks in IoT Environment
    Labiod, Yasmine
    Korba, Abdelaziz Amara
    Ghoualmi-Zine, Nacira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (02) : 145 - 180
  • [35] Systematic Analysis of DDoS Attacks in Blockchain
    Sheikh, Mohamad Arsalan
    Khan, Gul Zameen
    Hussain, Farookh Khadeer
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 132 - +
  • [36] Mitigation of DDoS Attacks in Cloud Computing
    Daffu, Preeti
    Kaur, Amanpreet
    2016 5TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMBEDDED SYSTEMS (WECON), 2016, : 209 - 213
  • [37] Dispersing Asymmetric DDoS Attacks with SplitStack
    Chen, Ang
    Sriraman, Akshay
    Vaidya, Tavish
    Zhang, Yuankai
    Haeberlen, Andreas
    Loo, Boon Thau
    Linh Thi Xuan Phan
    Sherr, Micah
    Shields, Clay
    Zhou, Wenchao
    PROCEEDINGS OF THE 15TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS '16), 2016, : 197 - 203
  • [38] Cooperative mechanism against DDoS attacks
    Zhang, GS
    Parashar, M
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 86 - 96
  • [39] Reactive Network Monitor for DDoS Attacks
    Varalakshmi, P.
    Narayanan, P. Karthik
    Hariharan, M.
    Nagaraj, P.
    Amritha, K.
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 349 - 355
  • [40] On the effectiveness of DDoS attacks on statistical filtering
    Li, QM
    Chang, EC
    Chan, MC
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1373 - 1383