Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper and Yongdae Kim Attacking the kad network—real world evaluation and high fidelity simulation using DVN Security and Communication Networks 6
Kad, an implementation of the Kademlia DHT protocol, is a popular file-sharing network with over 1 million concurrent users. We describe several attacks, exploiting critical design weaknesses in Kad, to allow an attacker with modest resources to cause a significant fraction of all searches to fail. We measure the cost and effectiveness of these attacks against a set of 16,000 nodes connected to the operational Kad network and in our large-scale simulator DVN with 200,000 nodes.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf