DocumentCode :
1928416
Title :
A First Approach to Detect Suspicious Peers in the KAD P2P Network
Author :
Cholez, Thibault ; Hénard, Christopher ; Chrisment, Isabelle ; Festor, Olivier ; Doyen, Guillaume ; Khatoun, Rida
Author_Institution :
STMR, Univ. de Technol. de Troyes, Troyes, France
fYear :
2011
fDate :
18-21 May 2011
Firstpage :
1
Lastpage :
8
Abstract :
Several large scale P2P networks are based on a distributed hash table. They all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, DDoS, pollution, etc.). However, no study so far considered the actual deployment of such attacks. We propose a first approach to detect suspicious peers in the KAD P2P network. First, we describe and evaluate our crawler which can get an accurate view of the network. Then, we analyze the distances between the peers and the contents indexed in the DHT to detect suspicious peers. Our results show that hundreds of KAD entries are clearly under attack during our measurements.
Keywords :
computer network security; cryptography; peer-to-peer computing; table lookup; KAD P2P network; distributed hash table; large scale P2P network; malicious node; network crawler; suspicious peers detection; Gold; IP networks; Peer to peer computing; Pollution; Silicon; Surveillance;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and Information Systems Security (SAR-SSI), 2011 Conference on
Conference_Location :
La Rochelle
Print_ISBN :
978-1-4577-0735-3
Type :
conf
DOI :
10.1109/SAR-SSI.2011.5931383
Filename :
5931383
Link To Document :
بازگشت