Evaluation of Sybil Attacks Protection Schemes in KAD - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

Evaluation of Sybil Attacks Protection Schemes in KAD

Résumé

In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three main mechanisms: a protection against flooding through packet tracking, an IP address limitation and a verification of identities. We evaluate their efficiency by designing and adapting an attack for several KAD clients with different levels of protection. Our results show that the new security rules mitigate the Sybil attacks previously launched. However, we prove that it is still possible to control a small part of the network despite the new inserted defenses with a distributed eclipse attack and limited resources.
Fichier principal
Vignette du fichier
AIMS09-Sybil_attack_protection_KAD-Cholez.pdf (206.24 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00405381 , version 1 (20-07-2009)
inria-00405381 , version 2 (21-07-2009)

Identifiants

Citer

Thibault Cholez, Isabelle Chrisment, Olivier Festor. Evaluation of Sybil Attacks Protection Schemes in KAD. 3rd International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009, University of Twente, Jun 2009, Enschede, Netherlands. pp.70-82, ⟨10.1007/978-3-642-02627-0_6⟩. ⟨inria-00405381v2⟩
249 Consultations
788 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More