Exploiting p2p systems for ddos attacks

N Naoumov, K Ross - Proceedings of the 1st international conference on …, 2006 - dl.acm.org
... We then examine these two poisoning attacks in Overnet, a popular DHT-based P2P
file-sharing system. By using limited poisoning attacks of short duration on Overnet's indexing
and routing tables, we create DDoS attacks against a targeted host. ...

GridSec: trusted grid computing with security binding and self-defense against network worms and DDoS attacks

K Hwang, YK Kwok, S Song, MCY Chen… - … Science–ICCS 2005, 2005 - Springer
... We propose a novel architectural design of Grid security infrastructure, security binding for
enhanced Grid efficiency, distributed collaborative IDS and alert correlation, DHT-based overlay
networks for worm containment, and pushback of DDoS attacks. ...

DDoS attacks by subverting membership management in P2P systems

X Sun, R Torres, S Rao - … . NPSec 2007. 3rd IEEE Workshop on, 2007 - ieeexplore.ieee.org
... of peer-to-peer systems make of distinct logical identifier (eg IDs in a DHT) corresponding
themworthy of study in their own right. These attacks are to the same physical identifier (eg, IP
address), typically to in contrast to the traditional botnet-based DDoS attacks handle hosts ...

[PDF][PDF] DDoS vulnerability analysis of BitTorrent protocol

KC Sia - University of California, Los Angeles, USA, 2007 - oak.cs.ucla.edu
... the user with its source address such as the scheme used in DHT trackerless protocol. However,
both measures require Internet-wide deployment to be effective; as long as there is a portion
of the BT network contains the vulnerabilities, they can still be exploited for DDoS attack ...

Misusing Kademlia protocol to perform DDoS attacks

J Yu, Z Li, X Chen - … 2008. ISPA'08. International Symposium on, 2008 - ieeexplore.ieee.org
... Bittorrent is one of the most popular P2P file-sharing applications. Kademlia protocol has been
one of the most popular DHT protocols. This paper focuses on how to exploit the vulnerabilities
of Kademlia protocol in its design and implementation to launch DDoS attacks. ...

A collaborative peer-to-peer architecture to defend against DDoS attacks

R Saad, F Nait-Abdesselam… - … Networks, 2008. LCN …, 2008 - ieeexplore.ieee.org
... Keywords: DDoS Attacks; Intrusion Detection; P2P; DHT; ... CONCLUSION AND FUTURE WORK
We proposed in this paper a modular architecture for a collaborative defense against DDoS
attacks relying on the performance and scalability of DHT algorithms. ...

DHT-based security infrastructure for trusted internet and grid computing

K Hwang, M Cai, YK Kwok, S Song, Y Chen… - International journal of …, 2006 - Inderscience
... 416 K. Hwang et al. Figure 2 DHT-based security infrastructure against network worms and DDoS
attacks ... In WormShield, DHT-based overlays are used for monitoring, detection, and containment
of worm spreading as well as for defence against related DDoS flooding attacks. ...

Conducting routing table poisoning attack in DHT networks

H Lin, R Ma, L Guo, P Zhang… - … , Circuits and Systems ( …, 2010 - ieeexplore.ieee.org
... attack. When the Sybil nodes are distributed on a large scale in the network, they
can intercept relevant messages and proceed to monitoring DHT traffic, launching
DDoS attacks, and performing interdiction of DHT and so on. C ...

[PDF][PDF] Fast Containment of Internet Worms and Tracking of DDoS Attacks with Distributed-Hashing Overlays

M Cai, K Hwang, YK Kwok, S Song, Y Chen - Nov/Dec, 2005 - gridsec.usc.edu
... A distributed hash table (DHT) based overlay system for fast worm detection with automated
signature generation and dissemination, pushing back DDoS flooding attacks with adaptive
tracking of attack-transit routers and limit malicious flows. (see http://gridsec.usc.edu/ ) ...

[CITATION][C] Exploring Mainline DHT: an experimental approach

IS Garcia - 2010 - Master thesis, KTH Royal Institute of …

Create alert