메뉴 건너뛰기




Volumn 37, Issue 5, 2007, Pages 65-69

Exploiting KAD: Possible uses and misuses

Author keywords

Distributed hash table; Peer to peer system; Sybil attack

Indexed keywords

BIT TORRENTS; DISTRIBUTED HASH TABLE; FAST TRACKS; FILE SHARING; PEER TO PEER; PEER-TO-PEER SYSTEM; PEER-TO-PEER TRAFFIC; SYBIL ATTACK;

EID: 84876244094     PISSN: 01464833     EISSN: 19435819     Source Type: Conference Proceeding    
DOI: 10.1145/1290168.1290176     Document Type: Article
Times cited : (87)

References (28)
  • 1
    • 84876208801 scopus 로고    scopus 로고
    • A-Mule. http://www.amule.org/.
  • 2
    • 60649112960 scopus 로고    scopus 로고
    • Misusing unstructured p2p systems to perform dos attacks: The network that never forgets
    • June
    • E. Athanasopoulos, K. G. Anagnostakis, and E. P. Markatos. Misusing unstructured p2p systems to perform dos attacks: The network that never forgets. In Proc. of ACNS 2006, June 2006.
    • (2006) Proc. of ACNS 2006
    • Athanasopoulos, E.1    Anagnostakis, K.G.2    Markatos, E.P.3
  • 3
    • 84876271312 scopus 로고    scopus 로고
    • CAPTCHA. http://en.wikipedia.org/wiki/CAPTCHA.
    • CAPTCHA
  • 4
    • 56749139608 scopus 로고    scopus 로고
    • Building a reliable p2p system out of unreliable p2p clients: The case of kad
    • July Submitted to Conext 2007
    • D. Carra and E. Biersack. Building a reliable p2p system out of unreliable p2p clients: The case of kad. Technical report, Institut Eurecom, July 2007. Submitted to Conext 2007.
    • (2007) Technical Report, Institut Eurecom
    • Carra, D.1    Biersack, E.2
  • 7
    • 84876268786 scopus 로고    scopus 로고
    • CoDeeN. http://codeen.cs.princeton.edu/.
  • 11
    • 84876229072 scopus 로고    scopus 로고
    • E-Mule. http://www.emule-project.net/.
  • 17
    • 84876237398 scopus 로고    scopus 로고
    • OpenDHT. http://opendht.org/.
  • 18
    • 84876248739 scopus 로고    scopus 로고
    • Overnet. http://www.overnet.org/.
  • 22
    • 34547492967 scopus 로고    scopus 로고
    • Eclipse attacks on overlay networks: Threats and defenses
    • Apr.
    • A. Singh et al. Eclipse attacks on overlay networks: Threats and defenses. In Proc. Infocom 06, Apr. 2006.
    • (2006) Proc. Infocom 06
    • Singh, A.1
  • 23
    • 7444246627 scopus 로고    scopus 로고
    • Security considerations for peer-to-peer distributed hash tables
    • Cambridge, MA, Mar.
    • E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In Proceedings of IPTPS'02, Cambridge, MA, Mar. 2002.
    • (2002) Proceedings of IPTPS'02
    • Sit, E.1    Morris, R.2
  • 27
    • 38049024292 scopus 로고    scopus 로고
    • Improving lookup performance over a widely-deployed DHT
    • Apr.
    • D. Stutzbach and R. Rejaie. Improving lookup performance over a widely-deployed DHT. In Proc. Infocom 06, Apr. 2006.
    • (2006) Proc. Infocom 06
    • Stutzbach, D.1    Rejaie, R.2
  • 28
    • 35548992569 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: Defending against sybil attacks via social networks. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.