A first approach to detect suspicious peers in the KAD P2P network

Thibault Cholez, Christopher Hénard, Isabelle Chrisment, Olivier Festor, Guillaume Doyen, Rida Khatoun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Several large scale P2P networks are based on a distributed hash table. They all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, DDoS, pollution, etc.). However, no study so far considered the actual deployment of such attacks. We propose a first approach to detect suspicious peers in the KAD P2P network. First, we describe and evaluate our crawler which can get an accurate view of the network. Then, we analyze the distances between the peers and the contents indexed in the DHT to detect suspicious peers. Our results show that hundreds of KAD entries are clearly under attack during our measurements.

Original languageEnglish
Title of host publication2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings
DOIs
Publication statusPublished - 1 Aug 2011
Externally publishedYes
Event2011 Conference on Network and Information Systems Security, SAR-SSI 2011 - Ile de Re, La Rochelle, France
Duration: 18 May 201121 May 2011

Publication series

Name2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings

Conference

Conference2011 Conference on Network and Information Systems Security, SAR-SSI 2011
Country/TerritoryFrance
CityIle de Re, La Rochelle
Period18/05/1121/05/11

Keywords

  • DHT
  • KAD
  • Sybil attack
  • attack detection
  • monitoring
  • security

Fingerprint

Dive into the research topics of 'A first approach to detect suspicious peers in the KAD P2P network'. Together they form a unique fingerprint.

Cite this