Reverse Engineering of eMule
نویسندگان
چکیده
eMule is a popular peer-to-peer (p2p) client which builds upon the severbased eDonkey2000 (ed2k) platform. In newer versions of eMule, lookups can also be performed over the serverless Kad-network, an implementation of a distributed hash table (DHT) called Kademlia. Since only little is known about the techniques and algorithms used by eMule, this thesis presents an analysis of the implementation of Kademlia in eMule. This includes the structure of the routing table, the connection phase with bootstrapping, searching and publishing in Kademlia, the behavior of the client if network address translation (NAT) or a firewall is used and an analysis of all message types used in Kademlia. The algorithms found are compared to the version described in the Kademlia paper. Additionally, a successful attack is presented, that removes an arbitrary keyword from the Kademlia network, using a modified version of the client.
منابع مشابه
P2p Traffic Measurements on the Emule System
P2P systems are designed for the sharing of computer resources by direct exchange and they are characterized by their ability to adapt to failures and accommodate transient populations of peers while maintaining acceptable connectivity and performance. This paper examines the peer-to-peer file sharing infrastructure by focusing on a content delivery system: the eMule application based on the eD...
متن کاملCluster Analysis and Research of the Resource in KAD
With the development of P2P file sharing in recent years, KAD network has been widely used. Although there are a large amount of resources in KAD, few of them can meet the users’ demands. In order to find useful rescources in KAD, We need a systematic analysis of its characteristics. Firstly, describe the file score qualitatively, and cluster the resources according to the file size and the fil...
متن کاملThe eDonkey File-Sharing Network
The eDonkey 2000 file-sharing network is one of the most successful peerto-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are connected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer ...
متن کاملAdaptive Content Poisoning To Prevent Illegal File Distribution in P2P Networks
Digital content owners have attempted to use content poisoning to disrupt illegal distribution of copyrighted files in peer-to-peer (P2P) systems. This paper provides an analytical model to quantify the impact of content poisoning. Tradeoffs between content poisoning and download efficiency are revealed. In particular, we apply this poisoning model to transform and evaluate three popular P2P ne...
متن کاملOn the Impact of P2P Incentive Mechanisms on User Behavior
In this paper we report on the results of a largescale measurement study of two popular peer-to-peer systems, namely BitTorrent and eMule, that use practical and lightweight incentive mechanisms to encourage cooperation between users. We focus on identifying the strategic behavior of users in response to those incentive mechanisms. Our results illustrate a gap between what system designers and ...
متن کامل