A Distributed Denial-of-Service(DDoS) Attack using BitTorrent Peer-to-Peer(P2P) Network

نویسنده

  • Giovanni Branca
چکیده

Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centralized-server modifies can redirect peer connections toward a target machine on a specific port. Main attack’s aim is exhausting machine resources, causing denial-of-service. However, are not generated big traffic peaks: are only setted big number of connections which are maintained alive until timeout. In this paper are analysed distributed denial-of-service attacks realized with a p2p file-sharing network by unconscious peers and possible methods of defence with their advantages and disadvantages. Popularity and constant growth of p2p networks mixed with serious difficulties to detect malevolent connections make these attacks very attackers attractive and so very worrying.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DDoS Vulnerability Analysis of Bittorrent Protocol

Bittorrent (BT) traffic had been reported to contribute to 30% of the Internet traffic nowadays and the number of participants have been growing rapidly. For such a protocol that significantly involved in the Internet traffic, the robustness and security must be evaluated carefully. In this paper, we analyze the BT protocol and identify several potential vulnerabilities available for malicious ...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Improving Resilience against DDoS Attack in Unstructured P2P Networks

In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of mali...

متن کامل

Prevention of Index-Poisoning DDoS Attacks in Peer-to-Peer File-Sharing Networks

A major security threat to the normal use and legal sharing of peer-to-peer (P2P) resources is DDoS (distributed denial-of-service) attacks caused by file index poisoning. This type of attacks exploits the design vulnerability of P2P networks. By populating unprotected peers with poisoned file indexes, attacker can cause DDoS flooding attacks on arbitrary hosts, even outside of the P2P network....

متن کامل

Analysing the Security of Incentive Schemes in P2P-based File-sharing Systems

For Peer-to-Peer (P2P) file-sharing services cooperation is essential. However, peers behave rationally and try to maximise their benefits, while minimising their effort. To increase system performance incentive schemes are used to enforce cooperation. Nonetheless, so called free-riders and malicious peers try to attack these incentive schemes. In this paper we will first explain two popular P2...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008