Back to Search Start Over

Evaluation of Sybil Attacks Protection Schemes in KAD

Authors :
Isabelle Chrisment
Olivier Festor
Thibault Cholez
Management of dynamic networks and services (MADYNES)
INRIA Lorraine
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA)
Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique de Lorraine (INPL)-Université Nancy 2-Université Henri Poincaré - Nancy 1 (UHP)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique de Lorraine (INPL)-Université Nancy 2-Université Henri Poincaré - Nancy 1 (UHP)
University of Twente
Ramin Sadre and Aiko Pras
ANR-07-TCOM-0024,MAPE,Measurement and Analysis of Peer-to-peer Exchanges for paedocriminality fighting and traffic profiling(2007)
Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)
Source :
3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, 3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, University of Twente, Jun 2009, Enschede, Netherlands. pp.70-82, ⟨10.1007/978-3-642-02627-0_6⟩, Scalability of Networks and Services ISBN: 9783642026263, AIMS
Publication Year :
2009
Publisher :
HAL CCSD, 2009.

Abstract

The original publication is available at www.springerlink.com; International audience; In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three main mechanisms: a protection against flooding through packet tracking, an IP address limitation and a verification of identities. We evaluate their efficiency by designing and adapting an attack for several KAD clients with different levels of protection. Our results show that the new security rules mitigate the Sybil attacks previously launched. However, we prove that it is still possible to control a small part of the network despite the new inserted defenses with a distributed eclipse attack and limited resources.

Details

Language :
English
ISBN :
978-3-642-02626-3
ISBNs :
9783642026263
Database :
OpenAIRE
Journal :
3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, 3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, University of Twente, Jun 2009, Enschede, Netherlands. pp.70-82, ⟨10.1007/978-3-642-02627-0_6⟩, Scalability of Networks and Services ISBN: 9783642026263, AIMS
Accession number :
edsair.doi.dedup.....273789b6e179296fc90cad348b01ec39