메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Attacking the Kad network

Author keywords

Attack; Kad; P2P; Security

Indexed keywords

ATTACK; CONCURRENT NODES; COST EFFECTIVE; CRITICAL DESIGN; KAD; KADEMLIA; P2P; PEER-TO-PEER FILE SHARING NETWORKS; SECURITY;

EID: 70249107546     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1460877.1460907     Document Type: Conference Paper
Times cited : (33)

References (32)
  • 1
    • 70249113281 scopus 로고    scopus 로고
    • aMule network. http://www.amule.org.
    • aMule network. http://www.amule.org.
  • 2
    • 70249118444 scopus 로고    scopus 로고
    • Azureus. http://azureus.sourceforge.net.
    • Azureus
  • 3
    • 70249142756 scopus 로고    scopus 로고
    • BitComet. http://www.bitcomet.com.
    • BitComet
  • 8
    • 84876215464 scopus 로고    scopus 로고
    • Bottorrent: Misusing BitTorrent to Launch DDoS Attacks
    • June
    • DEFRAWY, K. E., GJOKA, M., AND MARKOPOULOU, A. Bottorrent: Misusing BitTorrent to Launch DDoS Attacks. In Usenix SRUTI (June 2007).
    • (2007) Usenix SRUTI
    • DEFRAWY, K.E.1    GJOKA, M.2    MARKOPOULOU, A.3
  • 10
    • 70249099469 scopus 로고    scopus 로고
    • eDonkey network. http://www.edonkey2000.com.
    • eDonkey network. http://www.edonkey2000.com.
  • 11
    • 70249132439 scopus 로고    scopus 로고
    • eMule network. http://www.emule-project.net.
    • eMule network. http://www.emule-project.net.
  • 12
    • 84968779644 scopus 로고    scopus 로고
    • Censorship resistant peer-to-peer content addressable networks
    • FIAT, A., AND SAIA, J. Censorship resistant peer-to-peer content addressable networks. In SODA (2002).
    • (2002) SODA
    • FIAT, A.1    SAIA, J.2
  • 13
    • 70249145709 scopus 로고    scopus 로고
    • FIAT, A., SAIA, J., AND YOUNG, M. Making chord robust to byzantine attacks. In ESA (2005).
    • FIAT, A., SAIA, J., AND YOUNG, M. Making chord robust to byzantine attacks. In ESA (2005).
  • 15
    • 7444263935 scopus 로고    scopus 로고
    • Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks
    • HILDRUM, K., AND KUBIATOWICZ, J. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In DISC (2003).
    • (2003) DISC
    • HILDRUM, K.1    KUBIATOWICZ, J.2
  • 17
    • 84864562776 scopus 로고    scopus 로고
    • Atomic data access in content addressable networks
    • LYNCH, N., MALKHI, D., AND RATAJCZAK, D. Atomic data access in content addressable networks. In IPTPS (2002).
    • (2002) IPTPS
    • LYNCH, N.1    MALKHI, D.2    RATAJCZAK, D.3
  • 18
    • 70249139027 scopus 로고    scopus 로고
    • Mainline. http://www.bittorrent.com.
    • Mainline
  • 19
    • 70249115968 scopus 로고    scopus 로고
    • MARTI, S., GANESAN, P., AND GARCIA-MOLINA, H. DHT Routing Using Social Links. In P2PDB (2004).
    • MARTI, S., GANESAN, P., AND GARCIA-MOLINA, H. DHT Routing Using Social Links. In P2PDB (2004).
  • 20
    • 2442421260 scopus 로고    scopus 로고
    • Kademlia: A peer-to-peer information system based on the xor metric
    • MAYMOUNKOV, P., AND MAZÍERES, D. Kademlia: A peer-to-peer information system based on the xor metric. In IPTPS (2001).
    • (2001) IPTPS
    • MAYMOUNKOV, P.1    MAZÍERES, D.2
  • 22
    • 70249092441 scopus 로고    scopus 로고
    • Protocol Obfuscation. http://www.emule-project.net/home/perl/help.cgi?l= 1&rm=show-topic&topic-id=848.
    • Protocol Obfuscation
  • 23
    • 0012575754 scopus 로고    scopus 로고
    • Dynamically fault-tolerant content addressable networks
    • SAIA, J., FIAT, A., GRIBBLE, S., KARLIN, A., AND SAROIU, S. Dynamically fault-tolerant content addressable networks. In IPTPS (2002).
    • (2002) IPTPS
    • SAIA, J.1    FIAT, A.2    GRIBBLE, S.3    KARLIN, A.4    SAROIU, S.5
  • 24
    • 77951438838 scopus 로고    scopus 로고
    • Defending against eclipse attacks on overlay networks
    • SINGH, A., CASTRO, M., DRUSCHEL, P., AND ROWSTRON, A. Defending against eclipse attacks on overlay networks. In EW11 (2004).
    • (2004) EW11
    • SINGH, A.1    CASTRO, M.2    DRUSCHEL, P.3    ROWSTRON, A.4
  • 25
    • 34547492967 scopus 로고    scopus 로고
    • Eclipse attacks on overlay networks: Threats and defenses
    • SINGH, A., NGAN, T.-W. J., DRUSCHEL, P., AND WALLACH, D. S. Eclipse attacks on overlay networks: Threats and defenses. In Infocom (2006).
    • (2006) Infocom
    • SINGH, A.1    NGAN, T.-W.J.2    DRUSCHEL, P.3    WALLACH, D.S.4
  • 26
    • 7444246627 scopus 로고    scopus 로고
    • Security Considerations for Peer-to-Peer Distributed Hash Tables
    • SIT, E., AND MORRIS, R. Security Considerations for Peer-to-Peer Distributed Hash Tables. In IPTPS (2002).
    • (2002) IPTPS
    • SIT, E.1    MORRIS, R.2
  • 29
    • 64249116949 scopus 로고    scopus 로고
    • EURECOM+2358, Institut Eurecom
    • Analyzing peer behavior in KAD. Tech. Rep, France, Oct
    • STEINER, M., EN NAJJARY, T., AND BIERSACK, E. W. Analyzing peer behavior in KAD. Tech. Rep. EURECOM+2358, Institut Eurecom, France, Oct 2007.
    • (2007)
    • STEINER, M.1    EN NAJJARY, T.2    BIERSACK, E.W.3
  • 31
    • 38049024292 scopus 로고    scopus 로고
    • Improving lookup performance over a widely-deployed DHT
    • STUTZBACH, D., AND RVEJAIE, R. Improving lookup performance over a widely-deployed DHT. In Infocom 06 (2006).
    • (2006) Infocom 06
    • STUTZBACH, D.1    RVEJAIE, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.