Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structure, which allows decentralized operation and makes it easy for new users to join and participate in the system. However, the lack of structure can also be abused by malicious users. We explore one such attack, that enables malicious users to use unstructured P2P systems to perform Denial of Service (DoS) attacks to third parties. Specifically, we show that a malicious node can coerce a large number of peers to perform requests to a target host that may not even be part of the P2P network, including downloading unwanted files from a target Web Server. This is a classic form of denial-of-service which also has two interesting characteristics: (a) it is hard to identify the originator of the attack, (b) it is even harder to stop the attack. The second property comes from the fact that certain unstructured P2P systems seem to have a kind of “memory”, retaining knowledge about (potentially false) queries for many days. In this paper we present real-world experiments of Gnutella-based DoS attacks to Web Servers. We explore the magnitude of the problem and present a solution to protect innocent victims against this attack.
KeywordsMalicious Node Port Number Request Rate Malicious Peer Query Packet
Unable to display preview. Download preview PDF.
- 1.Anonymously Launching a DDoS Attack via the Gnutella Network, http://www.auscert.org.au/render.html?it=2404
- 2.Apache web server, http://www.apache.org/
- 3.Debian gnu/linux os, http://www.debian.org/
- 4.Gtk-gnutella servent, http://gtk-gnutella.sourceforge.net
- 5.Daswani, N., Garcia-Molina, H.: Query-flood dos attacks in gnutella networks. In: ACM Conference on Computer and Communications Security (2002)Google Scholar
- 6.Mishra, M.: Cascade: an attack resistant peer-to-peer system. In: The 3rd New York Metro Area Networking Workshop (2003)Google Scholar
- 9.Sun, Q., Garcia-Molina, H.: Slic: A selfish link-based incentive mechanism for unstructured peer-to-peer networks. In: ICDCS 204: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), Washington, DC, USA, pp. 506–515. IEEE Computer Society Press, Los Alamitos (2004)CrossRefGoogle Scholar
- 10.Zeinalipour-Yazti, D.: Exploiting the security weaknesses of the gnutella protocol. Technical Report CS260-2, Department of Computer Science, University of California (2001)Google Scholar