• DocumentCode
    1622366
  • Title

    A DDoS attack by flooding normal control messages in Kad P2P networks

  • Author

    Koo, Hyelim ; Lee, Yeonju ; Kim, Kwangsoo ; Roh, Byeong-hee ; Lee, Cheolho

  • Author_Institution
    Dept. of Comput. Eng., Ajou Univ., Suwon, South Korea
  • fYear
    2012
  • Firstpage
    213
  • Lastpage
    216
  • Abstract
    This paper introduces a new DDoS (Distributed Denial of Service) attack by flooding control messages from normal users in Kad network, which is DHT-based P2P network. The proposed attack can make normal nodes participated into the Kad network to act as if they were zombies to generate numerous control messages destined to a target system unintentionally. With the flooded control messages from those nodes, it can cause a DDoS effect to a certain system. We implemented the attacks by modifying the open source program called eMule client, and tested the impact of the proposed attack in our own constructed real Kad network test bed.
  • Keywords
    peer-to-peer computing; public domain software; security of data; DDoS attack; DHT-based P2P network; Kad P2P networks; distributed denial of service; eMule client; flooded normal control messages; open source program; Computers; Peer to peer computing; Control message; DDoS attack; Kad network; Kademlia; eMule; peer-to-peer (P2P);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Communication Technology (ICACT), 2012 14th International Conference on
  • Conference_Location
    PyeongChang
  • ISSN
    1738-9445
  • Print_ISBN
    978-1-4673-0150-3
  • Type

    conf

  • Filename
    6174645