DocumentCode
1622366
Title
A DDoS attack by flooding normal control messages in Kad P2P networks
Author
Koo, Hyelim ; Lee, Yeonju ; Kim, Kwangsoo ; Roh, Byeong-hee ; Lee, Cheolho
Author_Institution
Dept. of Comput. Eng., Ajou Univ., Suwon, South Korea
fYear
2012
Firstpage
213
Lastpage
216
Abstract
This paper introduces a new DDoS (Distributed Denial of Service) attack by flooding control messages from normal users in Kad network, which is DHT-based P2P network. The proposed attack can make normal nodes participated into the Kad network to act as if they were zombies to generate numerous control messages destined to a target system unintentionally. With the flooded control messages from those nodes, it can cause a DDoS effect to a certain system. We implemented the attacks by modifying the open source program called eMule client, and tested the impact of the proposed attack in our own constructed real Kad network test bed.
Keywords
peer-to-peer computing; public domain software; security of data; DDoS attack; DHT-based P2P network; Kad P2P networks; distributed denial of service; eMule client; flooded normal control messages; open source program; Computers; Peer to peer computing; Control message; DDoS attack; Kad network; Kademlia; eMule; peer-to-peer (P2P);
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology (ICACT), 2012 14th International Conference on
Conference_Location
PyeongChang
ISSN
1738-9445
Print_ISBN
978-1-4673-0150-3
Type
conf
Filename
6174645
Link To Document