Passer à la navigation principale Passer à la recherche Passer au contenu principal

A first approach to detect suspicious peers in the KAD P2P network

  • Thibault Cholez
  • , Christopher Hénard
  • , Isabelle Chrisment
  • , Olivier Festor
  • , Guillaume Doyen
  • , Rida Khatoun

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

Several large scale P2P networks are based on a distributed hash table. They all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, DDoS, pollution, etc.). However, no study so far considered the actual deployment of such attacks. We propose a first approach to detect suspicious peers in the KAD P2P network. First, we describe and evaluate our crawler which can get an accurate view of the network. Then, we analyze the distances between the peers and the contents indexed in the DHT to detect suspicious peers. Our results show that hundreds of KAD entries are clearly under attack during our measurements.

langue originaleAnglais
titre2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings
Les DOIs
étatPublié - 1 août 2011
Modification externeOui
Evénement2011 Conference on Network and Information Systems Security, SAR-SSI 2011 - Ile de Re, La Rochelle, France
Durée: 18 mai 201121 mai 2011

Série de publications

Nom2011 Conference on Network and Information Systems Security, SAR-SSI 2011, Proceedings

Une conférence

Une conférence2011 Conference on Network and Information Systems Security, SAR-SSI 2011
Pays/TerritoireFrance
La villeIle de Re, La Rochelle
période18/05/1121/05/11

Empreinte digitale

Examiner les sujets de recherche de « A first approach to detect suspicious peers in the KAD P2P network ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation