An Enhanced Kad Protocol Resistant to Eclipse Attacks

Qiang Li, Jie Yu, Zhoujun Li
{"title":"An Enhanced Kad Protocol Resistant to Eclipse Attacks","authors":"Qiang Li, Jie Yu, Zhoujun Li","doi":"10.1109/NAS.2014.19","DOIUrl":null,"url":null,"abstract":"Kad is a P2P protocol which has about 1 million concurrent online users. The eclipse attack is one of the most severe threats in Kad. In this paper, we propose a distributed verification approach to defend against the eclipse attack in Kad. Previous works mostly concentrate on ID generation or secure routing algorithm. Our approach utilizes many benign peers to prove that the storage peer is valid. The attacker has to provide massive malicious hosts and IP addresses to break our defense. In contrast, it is hard for the attacker to get these resources. Moreover, our solution could be applied to the open-source software and centralized services are not needed in our system. Simulation results show that the attacker has to get 1000 IP addresses to launch the attack successfully.","PeriodicalId":186621,"journal":{"name":"2014 9th IEEE International Conference on Networking, Architecture, and Storage","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 9th IEEE International Conference on Networking, Architecture, and Storage","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAS.2014.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Kad is a P2P protocol which has about 1 million concurrent online users. The eclipse attack is one of the most severe threats in Kad. In this paper, we propose a distributed verification approach to defend against the eclipse attack in Kad. Previous works mostly concentrate on ID generation or secure routing algorithm. Our approach utilizes many benign peers to prove that the storage peer is valid. The attacker has to provide massive malicious hosts and IP addresses to break our defense. In contrast, it is hard for the attacker to get these resources. Moreover, our solution could be applied to the open-source software and centralized services are not needed in our system. Simulation results show that the attacker has to get 1000 IP addresses to launch the attack successfully.
抗Eclipse攻击的增强Kad协议
Kad是一个P2P协议,拥有大约100万并发在线用户。日食袭击是卡德最严重的威胁之一。在本文中,我们提出了一种分布式验证方法来防御Kad中的eclipse攻击。以往的工作主要集中在ID生成或安全路由算法上。我们的方法利用许多良性对等体来证明存储对等体是有效的。攻击者必须提供大量的恶意主机和IP地址来打破我们的防御。相反,攻击者很难获得这些资源。此外,我们的解决方案可以应用于开源软件,我们的系统不需要集中服务。仿真结果表明,攻击者需要获得1000个IP地址才能成功发起攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信