Reverse Engineering of eMule

نویسندگان

  • David Mysicka
  • Roger Wattenhofer
چکیده

eMule is a popular peer-to-peer (p2p) client which builds upon the severbased eDonkey2000 (ed2k) platform. In newer versions of eMule, lookups can also be performed over the serverless Kad-network, an implementation of a distributed hash table (DHT) called Kademlia. Since only little is known about the techniques and algorithms used by eMule, this thesis presents an analysis of the implementation of Kademlia in eMule. This includes the structure of the routing table, the connection phase with bootstrapping, searching and publishing in Kademlia, the behavior of the client if network address translation (NAT) or a firewall is used and an analysis of all message types used in Kademlia. The algorithms found are compared to the version described in the Kademlia paper. Additionally, a successful attack is presented, that removes an arbitrary keyword from the Kademlia network, using a modified version of the client.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2p Traffic Measurements on the Emule System

P2P systems are designed for the sharing of computer resources by direct exchange and they are characterized by their ability to adapt to failures and accommodate transient populations of peers while maintaining acceptable connectivity and performance. This paper examines the peer-to-peer file sharing infrastructure by focusing on a content delivery system: the eMule application based on the eD...

متن کامل

Cluster Analysis and Research of the Resource in KAD

With the development of P2P file sharing in recent years, KAD network has been widely used. Although there are a large amount of resources in KAD, few of them can meet the users’ demands. In order to find useful rescources in KAD, We need a systematic analysis of its characteristics. Firstly, describe the file score qualitatively, and cluster the resources according to the file size and the fil...

متن کامل

The eDonkey File-Sharing Network

The eDonkey 2000 file-sharing network is one of the most successful peerto-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are connected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer ...

متن کامل

Adaptive Content Poisoning To Prevent Illegal File Distribution in P2P Networks

Digital content owners have attempted to use content poisoning to disrupt illegal distribution of copyrighted files in peer-to-peer (P2P) systems. This paper provides an analytical model to quantify the impact of content poisoning. Tradeoffs between content poisoning and download efficiency are revealed. In particular, we apply this poisoning model to transform and evaluate three popular P2P ne...

متن کامل

On the Impact of P2P Incentive Mechanisms on User Behavior

In this paper we report on the results of a largescale measurement study of two popular peer-to-peer systems, namely BitTorrent and eMule, that use practical and lightweight incentive mechanisms to encourage cooperation between users. We focus on identifying the strategic behavior of users in response to those incentive mechanisms. Our results illustrate a gap between what system designers and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006