Misusing Kademlia Protocol to Perform DDoS Attacks

被引:6
|
作者
Yu, Jie [1 ]
Li, Zhoujun [2 ]
Chen, Xiaoming [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Beijing Univ, Sch Engn & Comp Sci, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
Kademlia; DDoS; P2P; Security;
D O I
10.1109/ISPA.2008.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly Involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types: asymmetric attack, routing table reflection attack and index reflection attack. A limited real-world experiment was run on eMule and the results show that these attacks tie up bandwidth and TCP connection resources of victim. We analyze the results of our experiment in three aspects: the effect of DDoS attacks by misusing Kad in eMule, the comparison between asymmetric attack and routing table reflection attack, and the distribution of attacks. More large-scale DDoS attack can be performed by means of a little more effort. We introduce some methods to amplify the performance of attack and some strategies to evade detection. Finally, we further discuss several solutions for these DDoS attacks.
引用
收藏
页码:80 / +
页数:2
相关论文
共 50 条
  • [41] Simulation of Internet DDoS attacks and defense
    Kotenko, Igor
    Ulanov, Alexander
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 327 - 342
  • [42] SOS: An architecture for mitigating DDoS attacks
    Keromytis, AD
    Misra, V
    Rubenstein, D
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (01) : 176 - 188
  • [43] Matrix profile for DDoS attacks detection
    Alotaibi, Faisal
    Lisitsa, Alexei
    PROCEEDINGS OF THE 2021 16TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2021, : 357 - 361
  • [44] DDoS attacks - A cyberthreat and possible solutions
    Kumar, Ajay
    ISACA Journal, 2013, 4 : 43 - 46
  • [45] Botnet in DDoS Attacks: Trends and Challenges
    Hoque, Nazrul
    Bhattacharyya, Dhruba K.
    Kalita, Jugal K.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2242 - 2270
  • [46] A queue model to detect DDos attacks
    Hao, S
    Song, H
    Jiang, WB
    Dai, YQ
    2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 106 - 112
  • [47] DDoS attacks in WSNs: detection and countermeasures
    Abidoye, Ademola P.
    Obagbuwa, Ibidun C.
    IET WIRELESS SENSOR SYSTEMS, 2018, 8 (02) : 52 - 59
  • [48] Prevention of DDoS Attacks in Cloud Environment
    Manoja, I.
    Sk, Nazma Sultana
    Rani, Deevi Radha
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), 2017, : 235 - 239
  • [49] Simulation and Analysis of Quiet DDOS Attacks
    Zhang, Jing
    Liu, Bo
    Hu, Huaping
    Chen, Lin
    Wang, Tianzuo
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 71 - 81
  • [50] Detection and Prevention of DDoS Attacks on the IoT
    Lee, Shu-Hung
    Shiue, Yeong-Long
    Cheng, Chia-Hsin
    Li, Yi-Hong
    Huang, Yung-Fa
    APPLIED SCIENCES-BASEL, 2022, 12 (23):