Download now Free registration required
The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. The authors describe several attacks that exploit critical design weaknesses in Kad to allow an attacker with modest resources to cause a significant fraction of all searches to fail. They measure the cost and effectiveness of these attacks against a set of 16 000 nodes connected to the operational Kad network. Using the large-scale simulator, DVN, they successfully scaled up to a 200 000 node experiment.
- Format: PDF
- Size: 528.4 KB