Active Measurement of Routing Table in Kad

As the first DHT implemented in real applications and involving millions of simultaneous users, all aspects of Kad must be analyzed and measured carefully. This paper focuses on measuring the routing table of Kad in eMule/aMule. We present and analyze the availability and stability of routing table by crawling actively. We find the phenomenon of ID repetition in Kad that many peers use a same ID simultaneously, which will decrease the performance of routing and then reduce the availability of routing table. The connection availability of global routing table is relatively low, the average of which is about 64.9%. Connection availability influences the efficiency of searching and routing in Kad network directly.

[1]  Eddie Kohler,et al.  Small is not always beautiful , 2008, IPTPS.

[2]  Keith W. Ross,et al.  Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.

[3]  Keith W. Ross,et al.  A measurement study of attacks on BitTorrent leechers , 2008, IPTPS.

[4]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Keith W. Ross,et al.  A Measurement Study of Attacks on BitTorrent Seeds , 2011, 2011 IEEE International Conference on Communications (ICC).

[6]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[7]  Stefan Savage,et al.  Understanding Availability , 2003, IPTPS.

[8]  Xu Peng,et al.  Research on Measurement of Peer-to-Peer File Sharing System , 2006 .

[9]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[10]  Zhoujun Li,et al.  Misusing Kademlia Protocol to Perform DDoS Attacks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[11]  Taoufik En-Najjary,et al.  Actively Monitoring Peers in KAD , 2007, IPTPS.

[12]  Taoufik En-Najjary,et al.  A global view of kad , 2007, IMC '07.

[13]  Taoufik En-Najjary,et al.  Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.

[14]  Ruben Torres,et al.  DDoS Attacks by Subverting Membership Management in P2P Systems , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.