Title :
Measuring “Sybil attacks” in Kademlia-based networks
Author :
Liu, Xiangtao ; Cai, Kai ; Li, Yang
Author_Institution :
Inst. of Comput. Technol., Beijing, China
Abstract :
In today´s Internet, many peer-to-peer (P2P) applications deploy their distributed networks based on Kademlia, a robust distributed hash table (DHT) protocol. Since Kademlia has no mechanism to defend ID fraud, Sybil attack becomes a great threat on these P2P networks. However, to our best knowledge, Sybil attacks in real Kademlia-based networks has never been measured. In this paper, based on our own measurement tool, Rainbow, we measure Sybil attacks in Kademlia-based networks BTDHT and KAD. A number of characteristics of Sybil attacks are revealed. We believe that our measurement results may be useful for developing better countermeasures to deal with Sybil attacks in Kademlia-based networks.
Keywords :
Internet; computer network security; peer-to-peer computing; protocols; DHT; ID fraud; Internet; Kademlia based networks; P2P networks; Sybil attack measurement; distributed hash table; distributed networks; peer-to-peer applications; Computers; Conferences; Decision support systems; IP networks; Internet; Measurement; Peer to peer computing; Kademlia; Sybil attack; measurement; peer-to-peer;
Conference_Titel :
Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on
Conference_Location :
Sharm El-Sheikh
Print_ISBN :
978-1-4577-0475-8
Electronic_ISBN :
2161-5322
DOI :
10.1109/AICCSA.2011.6126586