Monitoring and Controlling Content Access in KAD

We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.

[1]  Taoufik En-Najjary,et al.  Exploiting KAD: possible uses and misuses , 2007, CCRV.

[2]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[3]  Hao Ma,et al.  Crawling the eDonkey Network , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[4]  Michael Kohnen,et al.  Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network , 2009, Networking.

[5]  Keith W. Ross,et al.  The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Taoufik En-Najjary,et al.  A global view of kad , 2007, IMC '07.

[7]  Daniel Stutzbach,et al.  Capturing Accurate Snapshots of the Gnutella Network , 2006, INFOCOM.

[8]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[9]  Olivier Festor,et al.  Evaluation of Sybil Attacks Protection Schemes in KAD , 2009, AIMS.

[10]  Daniel Stutzbach,et al.  Large-scale monitoring of DHT traffic , 2009, IPTPS.

[11]  Matthieu Latapy,et al.  Measurement of eDonkey activity with distributed honeypots , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[12]  Taekyong Nam,et al.  P2P Honeypot to Prevent Illegal or Harmful Contents From Spreading in P2P network , 2007, The 9th International Conference on Advanced Communication Technology.