Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating application for peerto- peer is file sharing. Some of the most popular peer-to-peer systems for file sharing have been Napster, FastTrack, BitTorrent, and eDonkey, each one counting a million or more users at their peak time. We got interested in KAD, since it is the only DHT that has been part of very popular peer-to-peer system with several million simultaneous users. As we have been studying KAD over the course of the last 18 months we have been both, fascinated and frightened by the possibilities KAD offers. Mounting a Sybil attack is very easy in KAD and allows to compromise the privacy of KAD users, to compromise the correct operation of the key lookup, and to mount DDOS with very little resources. In this paper, we will relate some of our findings and point out how KAD can be used and misused.
Exploiting KAD: possible uses and misuses
Computer communications review, Volume 37, N°5, October 2007
© ACM, 2007. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Computer communications review, Volume 37, N°5, October 2007 http://dx.doi.org/10.1145/1290168.1290176
PERMALINK : https://www.eurecom.fr/publication/2324