@inproceedings{faf812782d634bb1bd58c4d611bb96a1,
title = "A first approach to detect suspicious peers in the KAD P2P network",
abstract = "Several large scale P2P networks are based on a distributed hash table. They all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, DDoS, pollution, etc.). However, no study so far considered the actual deployment of such attacks. We propose a first approach to detect suspicious peers in the KAD P2P network. First, we describe and evaluate our crawler which can get an accurate view of the network. Then, we analyze the distances between the peers and the contents indexed in the DHT to detect suspicious peers. Our results show that hundreds of KAD entries are clearly under attack during our measurements.",
keywords = "DHT, KAD, Sybil attack, attack detection, monitoring, security",
author = "Thibault Cholez and Christopher H{\'e}nard and Isabelle Chrisment and Olivier Festor and Guillaume Doyen and Rida Khatoun",
year = "2011",
month = aug,
day = "1",
doi = "10.1109/SAR-SSI.2011.5931383",
language = "English",
isbn = "9781457707377",
series = "2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings",
booktitle = "2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings",
note = "2011 Conference on Network and Information Systems Security, SAR-SSI 2011 ; Conference date: 18-05-2011 Through 21-05-2011",
}