Conducting and optimizing eclipse attacks in the kad peer-to-peer network

23Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented security measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required resources. © IFIP International Federation for Information Processing 2009.

Cite

CITATION STYLE

APA

Kohnen, M., Leske, M., & Rathgeb, E. P. (2009). Conducting and optimizing eclipse attacks in the kad peer-to-peer network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5550 LNCS, pp. 104–116). https://doi.org/10.1007/978-3-642-01399-7_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free