scispace - formally typeset
Open AccessProceedings ArticleDOI

Real-world sybil attacks in BitTorrent mainline DHT

Reads0
Chats0
TLDR
This paper considers two kinds of attacks on a DHT, one already known attack and one new kind of an attack, and shows how they can be targeted against Mainline DHT and proposes simple countermeasures against them.
Abstract
Distributed hash tables (DHT) are a key building block for modern P2P content-distribution system, for example in implementing the distributed tracker of BitTorrent Mainline DHT. DHTs, due to their fully distributed nature, are known to be vulnerable to certain kinds of attacks and different kinds of defenses have been proposed against these attacks. In this paper, we consider two kinds of attacks on a DHT, one already known attack and one new kind of an attack, and show how they can be targeted against Mainline DHT. We complement them by an extensive measurement study using honeypots which shows that both attacks have been going on for a long time in the network and are still happening. We present numbers showing that the number of sybils in the Mainline DHT network is increasing and is currently around 300,000. We analyze the potential threats from these attacks and propose simple countermeasures against them.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Measuring large-scale distributed systems: case of BitTorrent Mainline DHT

TL;DR: This paper presents an efficient methodology for estimating the number of active users in the BitTorrent Mainline DHT based on modeling crawling inaccuracies as a Bernoulli process, which guarantees a very accurate estimation and is able to provide the estimate in about 5 seconds.
Journal ArticleDOI

Attacks and defences on intelligent connected vehicles: a survey

TL;DR: This paper identifies some major security attacks on intelligent connected vehicles and investigates and summarizes the available defences against these attacks and classify them into four categories: cryptography, network security, software vulnerability detection, and malware detection.
Proceedings ArticleDOI

The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks

TL;DR: This work identifies the dangers arising or made more severe from decentralisation, and shows how inferences from metadata might invade users' privacy, and discusses general techniques to mitigate or solve the identified issues.
Proceedings ArticleDOI

A Multi-perspective Analysis of Carrier-Grade NAT Deployment

TL;DR: In this paper, the authors present a broad and systematic study of the deployment and behavior of CGN middleboxes and develop a methodology to detect the existence of hosts behind CGNs by extracting non-routable IP addresses from peer lists.
Book ChapterDOI

Distilling the Internet's Application Mix from Packet-Sampled Traffic

TL;DR: As the Internet continues to grow both in size and in terms of the volume of traffic it carries, more and more networks in the different parts of the world are relying on an increasing number of distinct ways to exchange traffic with one another.
References
More filters
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Book ChapterDOI

Kademlia: A Peer-to-Peer Information System Based on the XOR Metric

TL;DR: In this paper, the authors describe a peer-to-peer distributed hash table with provable consistency and performance in a fault-prone environment, which routes queries and locates nodes using a novel XOR-based metric topology.
Journal ArticleDOI

SybilGuard: defending against sybil attacks via social networks

TL;DR: This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks, based on the "social network "among user identities, where an edge between two identities indicates a human-established trust relationship.
Journal ArticleDOI

Secure routing for structured peer-to-peer overlay networks

TL;DR: This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.
Proceedings ArticleDOI

Understanding churn in peer-to-peer networks

TL;DR: The understanding of churn is advanced by improving accuracy, comparing different P2P file sharingdistribution systems, and exploring new aspects of churn.