E-mail

E-mail a Wiley Online Library Link

Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper and Yongdae Kim Attacking the kad network—real world evaluation and high fidelity simulation using DVN Security and Communication Networks 6

Article first published online: 24 DEC 2009 | DOI: 10.1002/sec.172

Thumbnail image of graphical abstract

Kad, an implementation of the Kademlia DHT protocol, is a popular file-sharing network with over 1 million concurrent users. We describe several attacks, exploiting critical design weaknesses in Kad, to allow an attacker with modest resources to cause a significant fraction of all searches to fail. We measure the cost and effectiveness of these attacks against a set of 16,000 nodes connected to the operational Kad network and in our large-scale simulator DVN with 200,000 nodes.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

Choose captcha format: Image or Audio. Click here if you need help.

SEARCH