https://www.usenix.org/system/files/conference/woot15/woot15-paper-adamsky.pdf https://www.researchgate.net/publication/224362886_Misusing_Kademlia_Protocol_to_Perform_DDoS_Attacks