Title :
Misusing Kademlia Protocol to Perform DDoS Attacks
Author :
Jie Yu ; Zhoujun Li ; Xiaoming Chen
Author_Institution :
Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Abstract :
Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types: asymmetric attack, routing table reflection attack and index reflection attack. A limited real-world experiment was run on eMule and the results show that these attacks tie up bandwidth and TCP connection resources of victim. We analyze the results of our experiment in three aspects: the effect of DDoS attacks by misusing Kad in eMule, the comparison between asymmetric attack and routing table reflection attack, and the distribution of attacks. More large-scale DDoS attack can be performed by means of a little more effort. We introduce some methods to amplify the performance of attack and some strategies to evade detection. Finally, we further discuss several solutions for these DDoS attacks.
Keywords :
cryptography; peer-to-peer computing; protocols; DDoS attacks; DHT; Kademlia protocol; asymmetric attack; distributed hash table; index reflection attack; peer to peer computing; routing table reflection attack; Application software; Computer crime; Computer networks; Computer security; Distributed computing; Large-scale systems; Peer to peer computing; Protocols; Reflection; Routing; DDoS; Kademlia; P2P; Security;
Conference_Titel :
Parallel and Distributed Processing with Applications, 2008. ISPA '08. International Symposium on
Conference_Location :
Sydney, NSW
Print_ISBN :
978-0-7695-3471-8
DOI :
10.1109/ISPA.2008.15