DocumentCode :
119471
Title :
An Enhanced Kad Protocol Resistant to Eclipse Attacks
Author :
Qiang Li ; Jie Yu ; Zhoujun Li
Author_Institution :
Sch. of Comput. Sci. & Eng., Beihang Univ., Beijing, China
fYear :
2014
fDate :
6-8 Aug. 2014
Firstpage :
83
Lastpage :
87
Abstract :
Kad is a P2P protocol which has about 1 million concurrent online users. The eclipse attack is one of the most severe threats in Kad. In this paper, we propose a distributed verification approach to defend against the eclipse attack in Kad. Previous works mostly concentrate on ID generation or secure routing algorithm. Our approach utilizes many benign peers to prove that the storage peer is valid. The attacker has to provide massive malicious hosts and IP addresses to break our defense. In contrast, it is hard for the attacker to get these resources. Moreover, our solution could be applied to the open-source software and centralized services are not needed in our system. Simulation results show that the attacker has to get 1000 IP addresses to launch the attack successfully.
Keywords :
peer-to-peer computing; protocols; public domain software; telecommunication network routing; ID generation; IP addresses; P2P protocol; centralized services; concurrent online users; distributed verification approach; eclipse attacks; enhanced Kad protocol; massive malicious hosts; open-source software; secure routing algorithm; storage peer; Educational institutions; IP networks; Message systems; Peer-to-peer computing; Protocols; Resists; Routing; Eclipse Attack; Kad; P2P; Witness Peer;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networking, Architecture, and Storage (NAS), 2014 9th IEEE International Conference on
Conference_Location :
Tianjin
Type :
conf
DOI :
10.1109/NAS.2014.19
Filename :
6923162
Link To Document :
بازگشت