Exploiting p2p systems for ddos attacks
N Naoumov, K Ross - Proceedings of the 1st international conference on …, 2006 - dl.acm.org
... We then examine these two poisoning attacks in Overnet, a popular DHT-based P2P
file-sharing system. By using limited poisoning attacks of short duration on Overnet's indexing
and routing tables, we create DDoS attacks against a targeted host. ...
file-sharing system. By using limited poisoning attacks of short duration on Overnet's indexing
and routing tables, we create DDoS attacks against a targeted host. ...
GridSec: trusted grid computing with security binding and self-defense against network worms and DDoS attacks
... We propose a novel architectural design of Grid security infrastructure, security binding for
enhanced Grid efficiency, distributed collaborative IDS and alert correlation, DHT-based overlay
networks for worm containment, and pushback of DDoS attacks. ...
enhanced Grid efficiency, distributed collaborative IDS and alert correlation, DHT-based overlay
networks for worm containment, and pushback of DDoS attacks. ...
DDoS attacks by subverting membership management in P2P systems
... of peer-to-peer systems make of distinct logical identifier (eg IDs in a DHT) corresponding
themworthy of study in their own right. These attacks are to the same physical identifier (eg, IP
address), typically to in contrast to the traditional botnet-based DDoS attacks handle hosts ...
themworthy of study in their own right. These attacks are to the same physical identifier (eg, IP
address), typically to in contrast to the traditional botnet-based DDoS attacks handle hosts ...
[PDF][PDF] DDoS vulnerability analysis of BitTorrent protocol
KC Sia - University of California, Los Angeles, USA, 2007 - oak.cs.ucla.edu
... the user with its source address such as the scheme used in DHT trackerless protocol. However,
both measures require Internet-wide deployment to be effective; as long as there is a portion
of the BT network contains the vulnerabilities, they can still be exploited for DDoS attack ...
both measures require Internet-wide deployment to be effective; as long as there is a portion
of the BT network contains the vulnerabilities, they can still be exploited for DDoS attack ...
Cited by 18 Related articles All 3 versions Cite SaveSaving...Error saving. Try again? More View as HTML Fewer
Misusing Kademlia protocol to perform DDoS attacks
J Yu, Z Li, X Chen - … 2008. ISPA'08. International Symposium on, 2008 - ieeexplore.ieee.org
... Bittorrent is one of the most popular P2P file-sharing applications. Kademlia protocol has been
one of the most popular DHT protocols. This paper focuses on how to exploit the vulnerabilities
of Kademlia protocol in its design and implementation to launch DDoS attacks. ...
one of the most popular DHT protocols. This paper focuses on how to exploit the vulnerabilities
of Kademlia protocol in its design and implementation to launch DDoS attacks. ...
A collaborative peer-to-peer architecture to defend against DDoS attacks
R Saad, F Nait-Abdesselam… - … Networks, 2008. LCN …, 2008 - ieeexplore.ieee.org
... Keywords: DDoS Attacks; Intrusion Detection; P2P; DHT; ... CONCLUSION AND FUTURE WORK
We proposed in this paper a modular architecture for a collaborative defense against DDoS
attacks relying on the performance and scalability of DHT algorithms. ...
We proposed in this paper a modular architecture for a collaborative defense against DDoS
attacks relying on the performance and scalability of DHT algorithms. ...
DHT-based security infrastructure for trusted internet and grid computing
... 416 K. Hwang et al. Figure 2 DHT-based security infrastructure against network worms and DDoS
attacks ... In WormShield, DHT-based overlays are used for monitoring, detection, and containment
of worm spreading as well as for defence against related DDoS flooding attacks. ...
attacks ... In WormShield, DHT-based overlays are used for monitoring, detection, and containment
of worm spreading as well as for defence against related DDoS flooding attacks. ...
Conducting routing table poisoning attack in DHT networks
H Lin, R Ma, L Guo, P Zhang… - … , Circuits and Systems ( …, 2010 - ieeexplore.ieee.org
... attack. When the Sybil nodes are distributed on a large scale in the network, they
can intercept relevant messages and proceed to monitoring DHT traffic, launching
DDoS attacks, and performing interdiction of DHT and so on. C ...
can intercept relevant messages and proceed to monitoring DHT traffic, launching
DDoS attacks, and performing interdiction of DHT and so on. C ...
[PDF][PDF] Fast Containment of Internet Worms and Tracking of DDoS Attacks with Distributed-Hashing Overlays
... A distributed hash table (DHT) based overlay system for fast worm detection with automated
signature generation and dissemination, pushing back DDoS flooding attacks with adaptive
tracking of attack-transit routers and limit malicious flows. (see http://gridsec.usc.edu/ ) ...
signature generation and dissemination, pushing back DDoS flooding attacks with adaptive
tracking of attack-transit routers and limit malicious flows. (see http://gridsec.usc.edu/ ) ...
Cited by 2 Related articles All 3 versions Cite SaveSaving...Error saving. Try again? More View as HTML Fewer
[CITATION][C] Exploring Mainline DHT: an experimental approach
IS Garcia - 2010 - Master thesis, KTH Royal Institute of …