Netinfo Security ›› 2015, Vol. 15 ›› Issue (2): 46-50.doi: 10.3969/j.issn.1671-1122.2015.02.008

Previous Articles     Next Articles

Analysis and Experiment of Kad Network Protocol

XIONG Mei(), ZHOU An-ming   

  1. College of Electronics and Information, Sichuan University, Chengdu Sichuan 610064, China
  • Received:2014-10-28 Online:2015-02-10 Published:2015-07-05

Abstract:

As an open network protocol, Kad makes the further research and improvement of its network protocol possible. After the systematic analysis of the whole Kad’s architecture,and combined with the static testing upon the open source, we study the security of the Kad protocol’s communication from the user,s privacy, the privacy of content, the files of servers list and nodes list,noted the defects and the potential threat of the protocol. At the same time,each aspects’ studing analysis and research of the experimental data are all based on the main interface of the data communication of the Kad software. Finally, facing different threats of the protocol, we offer different solutions which are based on the design and implementation of the major abstract class, then we can not only decrease the threat to the acceptable range of users and ensure that the users have a secure network environment, but also provide the data base and experimental conclusions for Kad network security, query strategy, topology optimization and so on.

Key words: kad protocol, security and secrecy, performance, research

CLC Number: