{"title":"Kad P2P网络中的文件请求重定向DDoS攻击","authors":"Yeonju Lee, Kwangsoo Kim, B. Roh","doi":"10.1109/CyberC.2012.91","DOIUrl":null,"url":null,"abstract":"In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed a new DDoS attack caused by changing source IP address in response message of source search. In the proposed attack, there are two types of attackers, which change their KadID as KeywordID for keyword search and File Hash for source search as well. When a normal user selects the keyword and file as target, the user generates unintentionally traffics to a victim. To verify the effectiveness of our attack and its dangerousness, we test our scheme in Kad network. Our results show the potential risk of DDoS attack caused by the weakness of the Kad network.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"DDoS Attack by File Request Redirection in Kad P2P Network\",\"authors\":\"Yeonju Lee, Kwangsoo Kim, B. Roh\",\"doi\":\"10.1109/CyberC.2012.91\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed a new DDoS attack caused by changing source IP address in response message of source search. In the proposed attack, there are two types of attackers, which change their KadID as KeywordID for keyword search and File Hash for source search as well. When a normal user selects the keyword and file as target, the user generates unintentionally traffics to a victim. To verify the effectiveness of our attack and its dangerousness, we test our scheme in Kad network. Our results show the potential risk of DDoS attack caused by the weakness of the Kad network.\",\"PeriodicalId\":416468,\"journal\":{\"name\":\"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CyberC.2012.91\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberC.2012.91","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DDoS Attack by File Request Redirection in Kad P2P Network
In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed a new DDoS attack caused by changing source IP address in response message of source search. In the proposed attack, there are two types of attackers, which change their KadID as KeywordID for keyword search and File Hash for source search as well. When a normal user selects the keyword and file as target, the user generates unintentionally traffics to a victim. To verify the effectiveness of our attack and its dangerousness, we test our scheme in Kad network. Our results show the potential risk of DDoS attack caused by the weakness of the Kad network.