• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

A performance evaluation of the Kad-protocol (2006)

by René Brunner
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 11
Next 10 →

P2P Second Life: experimental validation using Kad

by Matteo Varvello, Christophe Diot, Ernst Biersack - In Infocom, Rio De Janeiro , 2009
"... Abstract—Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communication could help cut the deployment cost and increase the scalability of Social Virtual Worlds such as Second Lif ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
Abstract—Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communication could help cut the deployment cost and increase the scalability of Social Virtual Worlds such as Second Life. We design and build a communication infrastructure that distributes the management of the virtual world among user resources using a structured P2P network. Our communication infrastructure is implemented on the top of Kad, the P2P network that supports millions of eMule users. We then use avatar and object traces collected on Second Life to perform a realistic emulation of P2P Second Life over the Internet. We show that, despite using a standard P2P solution, P2P Second Life is mostly consistent, persistent and scalable. However, the latency avatars experience to recover from an inconsistent view of the virtual world can become disturbing for very large numbers of participants and objects. We analyze and discuss this limitation and give recommendation on how to design P2P Social Virtual Worlds. I.
(Show Context)

Citation Context

...eneric hash function. For convention, k (l+1) (2i+1) = H(kl i ) and k(l+1) (2i+2) = H(NOT(kl i )). All the peers agree in a unique root for the tree, e.g., k0 0, and on the hash function, e.g., H=MD4 =-=[3]-=-. The hash function distributes cell-IDs uniformly in the keyspace. In this way, any distribution of objects and cells in the SVW is mapped to a uniform distribution of cell-IDs in the key-space, achi...

Measuring the Storm Worm Network

by Sandeep Sarat, Andreas Terzis
"... The Storm worm is a botnet which appeared in the early months of 2007. Its prolific growth, the use of decentralized command and control communication based on the Overnet P2P protocol and fast-flux servers for secondary-stage binary distribution, as well as the capability to aggressively defend its ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
The Storm worm is a botnet which appeared in the early months of 2007. Its prolific growth, the use of decentralized command and control communication based on the Overnet P2P protocol and fast-flux servers for secondary-stage binary distribution, as well as the capability to aggressively defend itself, make Storm a notable species in the malware ecosystem. Despite considerable interest, Storm’s defensive capabilities and its distributed nature have complicated the accurate estimation of its size and understanding of its network behavior. In this paper, we actively probe the Storm botnet using Overnet queries to estimate its size – approximately 600,000 and 430,000 during the second and third week of October 2007, respectively. At the same time, we found several other surprising artifacts. Unlike traditional DHTs, the distribution of peer IDs is not uniform. Furthermore, we observed a small percentage of nodes which publish a large number of IDs, what we believe is an indication of index poisoning. Taken as a whole, these results provide insights which may facilitate researchers to curtail the Storm phenomenon as well as future P2P-based botnets. 1
(Show Context)

Citation Context

...T [11]. Each peer, as well as each object stored in an Overnet network, is associated with a 128-bit identifier (ID). Peer identifiers are randomly generated using the MD4 cryptographic hash function =-=[4]-=-. Routing in Overnet is based on prefix matching, whereby the distance between two IDs is equal to the XOR of the two identifiers. For example, the distance between a = 0001 and b = 1110 is d(a, b) = ...

Misusing Kademlia protocol to perform DDoS attacks

by Jie Yu, Zhoujun Li, Xiaoming Chen - in: Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA , 2008
"... Abstract—Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze th ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
Abstract—Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types: asymmetric attack, routing table reflection attack and index reflection attack. A limited real-world experiment was run on eMule and the results show that these attacks tie up bandwidth and TCP connection resources of victim. We analyze the results of our experiment in three aspects: the effect of DDoS attacks by misusing Kad in eMule, the comparison between asymmetric attack and routing table reflection attack, and the distribution of attacks. More large-scale DDoS attack can be performed by means of a little more effort. We introduce some methods to amplify the performance of attack and some strategies to evade detection. Finally, we further discuss several solutions for these DDoS attacks. Keywords- Kademlia; DDoS; P2P; Security I.
(Show Context)

Citation Context

...of P2P’s important characteristics is security. However,suntil now it is not covered in the protocols themselves but issjust covered at the application level. Finally there is a low levelsof security =-=[8]-=-, especially the DHT-based overlay protocolsssuffering from man-in-middle and Trojan attacks. Petar M. andsDavid M. proposed a new DHT protocol in 2002, called assKademlia protocol [9]. Comparing with...

WINNOWING: Protecting P2P Systems Against Pollution By Cooperative Index Filtering

by Kyuyong Shin, Douglas S. Reeves, Injong Rhee, Yoonki Song
"... Abstract—Pollution (i.e., sharing corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to polluted files) ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract—Pollution (i.e., sharing corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to polluted files) and unproductive download requests (due to bogus index records), the future success of file sharing based P2P systems is questionable unless properly addressed. In this paper, we propose a novel anti-pollution scheme called winnowing. Winnowing aims to purify the index records (i.e. the information on files or the publishers) held by each index node in the system, so that download attempts based on these index records are more likely to yield satisfactory results. To attain this goal, index nodes block bogus publish messages by verifying the publisher and the contents of the publish message upon receipt of a keyword or content publish message. Second, index nodes collect feedback from the users who have downloaded files via their index records. The collected feedback is then processed and reflected in the matching index record in a novel way. Careful consideration is given to reducing the impact of false feedback, and malicious index nodes. Publish message verification has been implemented on top of the latest eMule client and extensive data has been collected from the Kad network, using this modified client. The measurement results are summarized in this paper. The the findings from the measurement study are incorporated into our analytical model, which is used to investigate the performance of user feedback mediation. The model demonstrates the effectiveness of user feedback mediation: fast convergence to near-optimal performance and insensitivity to various pollution attacks including the attacks which attempt to bypass winnowing. I.
(Show Context)

Citation Context

...ws a Zipf distribution in most file sharing P2P systems [1] strongly indicates that users tend to select a file based on its popularity, which is also confirmed by our measurements on the Kad network =-=[14]-=- as indicated in section VI-A. This paper addresses the pollution problem in DHT-based P2P systems, with a focus on the Kad network. We propose a novel anti-pollution scheme, called winnowing. Winnowi...

Fair Quality of Experience (QoE) Measurements Related 141 of Experience in Database Systems with Networking Technologies

by Isaias Martinez-yelmo, Isaac Seoane, Carmen Guerrero - In 8th International Conference on Wired/Wireless Internet Communications, (WWIC , 2010
"... Abstract. This paper addresses the topic of Fair QoE measurements in networking. The research of new solutions in networking is oriented to improve the user experience. Any application or service can be im-proved and the deployment of new solutions is mandatory to get the user satisfaction. However, ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. This paper addresses the topic of Fair QoE measurements in networking. The research of new solutions in networking is oriented to improve the user experience. Any application or service can be im-proved and the deployment of new solutions is mandatory to get the user satisfaction. However, different solutions exist; thus, it is necessary to select the most suitable ones. Nevertheless, this selection is difficult to make since the QoE is subjective and the comparison among different technologies is not trivial. The aim of this paper is to give an overview on how to perform fair QoE measurements to facilitate the study and re-search of new networking solutions and paradigms. However, previously to address this problem, an overview about how networking affects to the QoE is provided. 1
(Show Context)

Citation Context

... piece of software that offers functionalities to the final application. Nowadays, the most common overlay networks are the peer-to-peer networks, which are being widely used for file-sharing (eMule6 =-=[35, 36]-=-, Bittorrent7 [37]), streaming8 5 http://www.ietf.org/dyn/wg/charter/ledbat-charter.html 6 http://www.emule-project.net 7 http://www.bittorrent.com/ 8 http://goalbit.sourceforge.net 5 Fair QoE Measure...

A Peer-To-Peer-based Storage Platform for Storing Session Data in Internet Access Networks

by Peter Danielis, Maik Gotzmann, Dirk Timmermann
"... Internet service providers (ISPs) have to store session data of their customers for operation, management, and control tasks. Thereby, each access node (AN) of an ISP’s access network keeps track of session data (e.g., IP addresses, MAC addresses, and lease times of IP addresses) of all connected cu ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Internet service providers (ISPs) have to store session data of their customers for operation, management, and control tasks. Thereby, each access node (AN) of an ISP’s access network keeps track of session data (e.g., IP addresses, MAC addresses, and lease times of IP addresses) of all connected customers. Session data is highly volatile due to continuous changes. It has to be stored persistently as it is required for regular data forwarding and traffic filtering. In case of an AN’s restart or crash, it needs to be reloaded. Today, session data is stored in an AN’s flash memory, which is limited in its availability and rewritability and intended for other purposes. Therefore, this paper proposes to organize ANs into a distributed hash table (DHT)-based Peer-to-Peer network to share their available RAM resources. Thereby, the DHT network serves as semi-permanent distributed memory for a structured redundant and interleaved storage of session data. In doing so, availability of session data is actually increased despite using RAM for data storage. After a restart or crash, an AN reloads session data by selectively reading required data from the DHT network. 1
(Show Context)

Citation Context

...emporary contacts and keeps efforts for the maintenance at a minimum. For the realization of PSP, the Kademlia-based Kad protocol is chosen, which has been implemented and applied in the eMule client =-=[8]-=-. 2.2 The Kademlia-based P2P Protocol Kad To each peer, which is part of the Kad network, a hash value is assigned (e.g., 16 bytes calculated by MD5). Based on its hash value, a peer occupies a place ...

Author manuscript, published in "ICN 2008, Cancun: Mexico (2008)" A Distributed and Adaptive Revocation Mechanism for P2P networks

by Thibault Cholez, Isabelle Chrisment, Olivier Festor , 2008
"... Abstract—With the increasing deployment of P2P networks, supervising the malicious behaviours of participants, which degrade the quality and performance of the overall delivered service, is a real challenge. In this paper, we propose a fully distributed and adaptive revocation mechanism based on the ..."
Abstract - Add to MetaCart
Abstract—With the increasing deployment of P2P networks, supervising the malicious behaviours of participants, which degrade the quality and performance of the overall delivered service, is a real challenge. In this paper, we propose a fully distributed and adaptive revocation mechanism based on the reputation of the peers. The originality of our approach is that the revocation is integrated in the core of the P2P protocol and does not need complex consensus and cryptographic mechanisms, hardly scalable. The reputation criteria evolve with the contribution of a peer to the network in order to highlight and help fight against selfish or malicious behaviours. The preliminary results show that the user perceived delays are not highly impacted and that our solution is resistant to reputation and revocation attacks. Index Terms—P2P networks, revocation mechanism, reputation mechanism, remote accounts, KAD I.
(Show Context)

Citation Context

...ing to scale up our testbed on EmanicsLab to measure performances and compare the results with the evaluation presented in section V. V. ANALYSIS AND DISCUSSIONS A. Performances Evaluation The thesis =-=[2]-=- has led a performance evaluation of the KAD network which allows us to discuss some a priori performance results. The average delay needed to store information in the network is about 200 seconds. Th...

Circuit and Systems

by Msc Thesis, Remco Adrianus Maria, Remco Adrianus, Maria Fens, Remco Adrianus Maria Fens
"... Communication aspects in an RF system combining radar and wireless communications ..."
Abstract - Add to MetaCart
Communication aspects in an RF system combining radar and wireless communications
(Show Context)

Citation Context

...networks, because of the use of buddies to manage the communication to nodes who reside behind a firewall or a NAT service. A detailed description of how buddy system works in the Kad DHT is given in =-=[9]-=-, while in [45] a crawling analysis of Kad network shows that the portion of nodes behind a NAT or a firewall is very significant. To avoid Man In The Middle (MITM), a mutually authenticated channel b...

SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK Abstract

by Jean-françois Lal, David Rodriguez, Christian Toinard
"... This paper proposes to address new requirements of confidentiality, integrity and availability properties fitting to peer-to-peer domains of resources. The enforcement of security properties in an open peer-topeer network remains an open problem as the literature have mainly proposed contribution on ..."
Abstract - Add to MetaCart
This paper proposes to address new requirements of confidentiality, integrity and availability properties fitting to peer-to-peer domains of resources. The enforcement of security properties in an open peer-topeer network remains an open problem as the literature have mainly proposed contribution on availability of resources and anonymity of users. That paper proposes a novel architecture that eases the administration of a peer-to-peer network. It considers a network of safe peer-to-peer clients in the sense that it is a commune client software that is shared by all the participants to cope with the sharing of various resources associated with different security requirements. However, our proposal deals with possible malicious peers that attempt to compromise the requested security properties. Despite the safety of an open peer-to-peer network cannot be formally guaranteed, since a end user has privileges on the target host, our solution provides several advanced security enforcement. First, it enables to formally define the requested security properties of the various shared resources. Second, it evaluates the trust and the reputation of the requesting peer by sending challenges that test the fairness of its peer-to-peer security policy. Moreover, it proposes an advanced Mandatory Access Control that enforces the required peer-to-peer security properties through an automatic projection of the requested properties onto SELinux policies. Thus, the SELinux system of the requesting peer is automatically configured with
(Show Context)

Citation Context

...ase the reliability of the solution as in Kazaa networks. The next generation of peer-to-peer systems are totally distributed [13]. The index of published resources is ensured by the peers themselves =-=[3, 6]-=-. This avoids the reliability problem of the older peer-to-peer systems but introduces a loss of control on the publication and the exchanges. Therefore, a strong effort has been done to hide activiti...

Responsible Editor: L. Salgarelli Keywords:

by unknown authors , 2011
"... bo ben a r t i c l e i n f o Article history: ..."
Abstract - Add to MetaCart
bo ben a r t i c l e i n f o Article history:
(Show Context)

Citation Context

..., we perform sensitivity study of AntBot against its key input parameters. (3) We implement AntBot using the actual development code of a popular P2P client, aMule, which is based on the KAD protocol =-=[4]-=-, a variant of Kademlia [20]. To evaluate performance of AntBot, we develop a distributed P2P botnet simulator that replaces system calls related to time and socket in the original aMule code with sim...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University