Title
Evaluation of Sybil Attacks Protection Schemes in KAD
Abstract
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three main mechanisms: a protection against flooding through packet tracking, an IP address limitation and a verification of identities. We evaluate their efficiency by designing and adapting an attack for several KAD clients with different levels of protection. Our results show that the new security rules mitigate the Sybil attacks previously launched. However, we prove that it is still possible to control a small part of the network despite the new inserted defenses with a distributed eclipse attack and limited resources.
Year
DOI
Venue
2009
10.1007/978-3-642-02627-0_6
AIMS
Keywords
Field
DocType
sybil attacks protection schemes,new security rule,different level,ip address limitation,hash table,limited resource,packet tracking,kad client,sybil attack,protection mechanism,main mechanism,distributed hash table
Ip address,Computer security,Computer science,Network packet,Computer network,Sybil attack,Eclipse,Distributed hash table
Conference
Volume
ISSN
Citations 
5637
0302-9743
14
PageRank 
References 
Authors
0.71
9
3
Name
Order
Citations
PageRank
Thibault Cholez110011.89
Isabelle Chrisment222525.75
Olivier Festor366585.40