首页> 外文会议>Scalability of networks and services >Evaluation of Sybil Attacks Protection Schemes in KAD
【24h】

Evaluation of Sybil Attacks Protection Schemes in KAD

机译:KAD的Sybil攻击防护方案评估

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three main mechanisms: a protection against flooding through packet tracking, an IP address limitation and a verification of identities. We evaluate their efficiency by designing and adapting an attack for several KAD clients with different levels of protection. Our results show that the new security rules mitigate the Sybil attacks previously launched. However, we prove that it is still possible to control a small part of the network despite the new inserted defenses with a distributed eclipse attack and limited resources.
机译:在本文中,我们评估了为抵御广泛部署的分布式哈希表KAD中的Sybil攻击而进入近期客户的保护机制。我们研究了三种主要机制:通过数据包跟踪防止洪泛,IP地址限制和身份验证。我们通过为具有不同保护级别的多个KAD客户端设计和调整攻击来评估其效率。我们的结果表明,新的安全规则减轻了先前发起的Sybil攻击。但是,我们证明,尽管新引入的防御措施具有分布式的日食攻击和有限的资源,但仍然可以控制网络的一小部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号