【24h】

Misusing Kademlia Protocol to Perform DDoS Attacks

机译:滥用Kademlia协议执行DDOS攻击

获取原文

摘要

Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types: asymmetric attack, routing table reflection attack and index reflection attack. A limited real-world experiment was run on eMule and the results show that these attacks tie up bandwidth and TCP connection resources of victim. We analyze the results of our experiment in three aspects: the effect of DDoS attacks by misusing Kad in eMule, the comparison between asymmetric attack and routing table reflection attack, and the distribution of attacks. More large-scale DDoS attack can be performed by means of a little more effort. We introduce some methods to amplify the performance of attack and some strategies to evade detection. Finally, we further discuss several solutions for these DDoS attacks.
机译:基于Kademlia的DHT已经部署在许多P2P应用中,并且据报道,KAD网络中有数百万同步用户。对于这种协议,明显涉及这么多的同行,必须仔细地评估其鲁棒性和安全性。在本文中,我们分析了kademlia协议并确定了几种潜在漏洞。我们将潜在攻击分类为三种类型:非对称攻击,路由表反射攻击和索引反射攻击。在emule上运行有限的真实实验,结果表明,这些攻击捆绑了受害者的带宽和TCP连接资源。我们在三个方面分析了我们实验的结果:DDOS攻击对emule中的屠宰场的影响,不对称攻击与路由表反射攻击的比较,以及攻击分配。可以通过更多的努力来执行更多大型DDOS攻击。我们介绍了一些方法,以扩大攻击性能和一些逃避检测的策略。最后,我们进一步讨论了这些DDOS攻击的几种解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号