Changes between Version 18 and Version 19 of NetDB/NextBackend


Ignore:
Timestamp:
Jun 2, 2013 10:19:15 AM (6 years ago)
Author:
hottuna
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • NetDB/NextBackend

    v18 v19  
    2828
    2929=== Kademlia Sybil Defence ===
     30Sybil attacks are based in the idea of creating a large number of participating nodes. The Sybil attack
     31does not damage the DHT by itself, but can be used as a vector to artificially create a major-
     32ity of colluding malicious nodes in the overlay.
    3033
    31 
     34|| '''Name''' || '''Source''' || '''Description''' ||
    3235
    3336
    3437=== Kademlia Eclipse Defence ===
     38Eclipse attacks are attacks on the routing / routing tables.
    3539
    36 || '''Name''' || '''Source''' || '''Why''' || '''Description''' ||
    37 || Recursive & random lookups || R5N[4]|| Provide eclipse resistance || Before initiating a recursive kad lookup, do a random walk in the network graph to determine the start of the recursive kad lookup. ||
    38 || Control in/out-degrees || [5][1] || Provide eclipse resistance || Control of the in-degree and out-degree of nodes via anonymous auditing. At the cost of slower avg. lookups. ||
     40|| '''Name''' || '''Source''' || '''Description''' ||
     41|| Random lookups || R5N[4]||  Before initiating a recursive kad lookup, do a random walk in the network graph to determine the start of the kad lookup. ||
     42|| Control in/out-degrees || [5][1] || Control of the in-degree and out-degree of nodes via anonymous auditing. At the cost of slower avg. lookups. ||
    3943
     44
     45=== Kademlia Storage Defence ===
     46Storage attacks are attacks which attempt to provide bogus responses to queries.
     47
     48|| '''Name''' || '''Source''' || '''Description''' ||
     49|| Recursive lookups || R5N[4]|| By making each node in a FIND_VALUE request forward the query recursively and return the answer a reliability metric of nodes can be obtained. ||
    4050
    4151[[BR]][[BR]]