Preventing ID Mapping Attacks on DHT Networks through Non-Voluntary Node Locating |
Lee, Cheolho
(Ajou University)
Choi, Kyunghee (Ajou University) Chung, Kihyun (Ajou University) Kim, Jongmyung (The Attached Institute of ETRI) Yun, Youngtae (The Attached Institute of ETRI) |
1 | Daniel Stutzbach and Reza Rejaie, "Understanding churn in peer-to-peer networks," in Proc. ACM SIGCOMM, 2006. |
2 | Scott A. Crosby and Dan S. Wallach, "An Analysis of BitTorrent's Two Kademlia- Based DHTs," Department of Computer Science, Rice University, Houston, TX, USA, Tech. Rep., TR-07-04, pp. 20-22, 2007. |
3 | M. Steiner and E. W. Biersack, "Crawling Azureus," Eurecom, Tech. Rep., RR-08-223, pp. 11-12, Jun. 2008. |
4 | The Pirate Bay, Jan. 2013. [Online]. Available: http://thepiratebay.org |
5 | Thibault Cholez, Isabelle Chrisment, and Olivier Festor, "Evaluation of Sybil Attacks Protection Schemes in KAD," In Proc. AIMS 2009, LNCS 5637, pp. 70-82, 2009. |
6 | RFC 5389, "Session Traversal Utilities for NAT (STUN)," IETF Network Working Group, Oct. 2008. |
7 | Jari Sundell, "libTorrent-rakShasa- 0.13.0," 2011. [Online]. Available: http://libtorrent.rakshasa.no/ |
8 | L. DAcunto, J. A. Pouwelse, H. J. Sips, "A Measurement of NAT and Firewall Characteristics in Peer-to-peer Systems," in Proc. ASCI Conference, pp. 1-5, 2009. |
9 | B. Ford, P. Srisuresh, D. Kegel, "Peer-to-peer Communication Across Network Address Translators," in Proc. USENIX Annual Technical Conference, Apr. 2005. |
10 | Stuart Cheshire, Marc Krochmal, and Kiren Sekar, "NAT Port Mapping Protocol (NAT-PMP)," IETF Internet Draft, Jun. 2005. |
11 | ISO/IEC 29341, "UPnP Device Architecture," Dec. 2008. |
12 | Ping Wang, Baber Aslam, and Cliff C. Zou, "Peer-to-Peer Botnets: The Next Generation of Botnet Attacks," in Stavroulakis, Peter; Stamp, Mark (Eds): Handbook of Information and Communication Security, Chapter 18, Springer Press, pp. 335-350, 2010. |
13 | P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the XOR metric." in Proc. Peer-to-Peer Systems, First International Workshop, IPTPS 2002, LNCS, vol. 2429. Springer, pp.53-65, Mar. 2002. |
14 | Ping Wang, Lei Wu, Baber Aslam, and Cliff C. Zou, "A Systematic Study on Peer-to-Peer Botnets," in Proc. ICCCN, pp. 1-8, Aug. 2009. |
15 | G. Starnberger, C. Kruegel, and E. Kirda, "Overbot - a botnet protocol based on kademlia," in Proc. Security and Privacy in Communication Networks (Secure- Comm '08), no. 13, Sep. 2008. |
16 | X. Sun, R. Torres, and S. G. Rao, "On the feasibility of exploiting P2P systems to launch DDoS attacks," in Proc. Peer-to-Peer Networking and Applications, pp. 36-51, 2010. |
17 | RFC 5735, "Special Use IPv4 Address," IETF Network Working Group, Jan. 2010. |
18 | Yangyang Liu and Jianping Pan, "The Impact of NAT on BitTorrent-like P2P Systems," in Proc. Peer-to-Peer Computing, pp. 241-251, 2009. |
19 | Quynh Dang, "Recommendation for Applications using Approved Hash Algorithms," NIST Special Publication 800-107 rev. 1, pp. 8-11, Aug. 2012. |
20 | John R. Douceur, "The Sybil Attack," in Pro. 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS), Mar. 2002. |
21 | Zhoujun Li and Xiaoming Chen, "Misusing Kademlia Protocol to Perform DDoS Attacks," in Pro. IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 80-86, Dec. 2008. |
22 | Moritz Steiner, Taoufik En-Najjary, and Ernst W. Biersack, "Long Term Study of Peer Behavior in the KAD DHT," IEEE/ACM Trans. Netw., vol. 17, pp. 1371-1384, Oct. 2009. DOI ScienceOn |
23 | Moritz Steiner, Taoufik En-najjary, and Ernst W. Biersack, "Exploiting KAD: possible uses and misuses," in Proc. ACM SIGCOMM Computer Communication Review, vol. 37, pp.65-70, Oct. 2007. |
24 | Thibault Cholez, Isabelle Chrisment, and Olivier Festor, "Monitoring and Controlling Content Access in KAD," in Proc. IEEE ICC, pp. 23-27, May 2010. |
25 | Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu and Ee-Chien Chang, "ID Repetition in Structured P2P Networks," The Computer Journal, vol. 54, no. 6, pp. 962-975, Mar. 2011. DOI ScienceOn |
26 | D. Cerri, A. Ghioni, S. Paraboschi, and S. Tiraboschi, "ID mapping attacks in p2p networks," in Proc. IEEE Global Communications Conference, pp. 1785-1790, 2005. |
27 | Andrew Loewenstern, "DHT Protocol," 2008. [Online]. Available: http://www.bittorrent.org/beps/bep 0005.html |
28 | Ingmar Baumgart and Sebastian Mies, "S/Kademlia: A Practicable Approach Towards Secure Key-Based Routing," in Proc. P2P-NVE 2007 in conjunction with ICPADS 2007, Hsinchu, Taiwan, vol. 2, pp. 1-8, Dec. 2007. |
29 | Arvid Norberg, "libtorrent-rasterbar- 0.15.6," 2011. [Online]. Available: http://www.rasterbar.com/products/libtorrent/ |
30 | PengWang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kue, Nicholas Hopper, and Yongdae Kim, "Attacking the Kad Network," in Proc. SecureComm, no. 23, 2008. |