Collaboration

Attacking the Kad Network-Real World Evaluation and High Fidelity Simulation Using DVN

Free registration required

Executive Summary

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. The authors describe several attacks that exploit critical design weaknesses in Kad to allow an attacker with modest resources to cause a significant fraction of all searches to fail. They measure the cost and effectiveness of these attacks against a set of 16 000 nodes connected to the operational Kad network. Using the large-scale simulator, DVN, they successfully scaled up to a 200 000 node experiment.

  • Format: PDF
  • Size: 528.4 KB