Back to Search
Start Over
Evaluation of Sybil Attacks Protection Schemes in KAD
- Source :
- 3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, 3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, University of Twente, Jun 2009, Enschede, Netherlands. pp.70-82, ⟨10.1007/978-3-642-02627-0_6⟩, Scalability of Networks and Services ISBN: 9783642026263, AIMS
- Publication Year :
- 2009
- Publisher :
- HAL CCSD, 2009.
-
Abstract
- The original publication is available at www.springerlink.com; International audience; In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three main mechanisms: a protection against flooding through packet tracking, an IP address limitation and a verification of identities. We evaluate their efficiency by designing and adapting an attack for several KAD clients with different levels of protection. Our results show that the new security rules mitigate the Sybil attacks previously launched. However, we prove that it is still possible to control a small part of the network despite the new inserted defenses with a distributed eclipse attack and limited resources.
- Subjects :
- KAD
DHT
Computer science
business.industry
Network packet
Sybil attack
020206 networking & telecommunications
02 engineering and technology
security
Computer security
computer.software_genre
P2P networks
Security rule
Flooding (computer networking)
Distributed hash table
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
020204 information systems
0202 electrical engineering, electronic engineering, information engineering
business
computer
Limited resources
Ip address
Computer network
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-642-02626-3
- ISBNs :
- 9783642026263
- Database :
- OpenAIRE
- Journal :
- 3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, 3rd International Conference on Autonomous Infrastructure, Management and Security-AIMS 2009, University of Twente, Jun 2009, Enschede, Netherlands. pp.70-82, ⟨10.1007/978-3-642-02627-0_6⟩, Scalability of Networks and Services ISBN: 9783642026263, AIMS
- Accession number :
- edsair.doi.dedup.....273789b6e179296fc90cad348b01ec39