Using Bittorent protocol to launch DDoS attacks

In a nutshell what the researcher hopes to achieve by this project is to develop a
practical solution to control Distributed Denial of Service (DDoS) attacks
launched using BitTorrent protocol by tweaking the source code of an existing
open ...

DOWNLOAD NOW »

Author: Ashan Maduranga

Publisher: GRIN Verlag

ISBN: 9783656894629

Category: Computers

Page: 9

View: 902

Essay from the year 2012 in the subject Computer Science - IT-Security, , language: English, abstract: In a nutshell what the researcher hopes to achieve by this project is to develop a practical solution to control Distributed Denial of Service (DDoS) attacks launched using BitTorrent protocol by tweaking the source code of an existing open source BitTorrent client. Even though BitTorrent is a useful protocol, it could be misused to launch DDoS attacks. Since the number who uses BitTorrent protocol is high, by launching a DDoS the victim’s machine could be crippled. Hence as a remedy to the issue this report is formulated so that it discusses how the attacks are done and how it could be prevented. For a simple analogical demonstration of what this attack does, take a look at figure 1 where computer A cannot fulfill the requests of a legit user computer B. this is what DDoS attack does. After enhancing the security architecture of BitTorrent client this problem would not occur hence it is improved to control these attacks.

Web Technologies and Applications

3.3.2 Attack on Any Nodes The reflection method could be used to launch attacks
against any nodes on the Internet, with the premise that a wide disparity ...
Paxson [24] discussed different protocol vulnerabilities which could lead to
reflection attacks in 2001. ... [29] also carried out DDoS attack using BitTorrent
network.

DOWNLOAD NOW »

Author: Weihong Han

Publisher: Springer

ISBN: 9783319111193

Category: Computers

Page: 404

View: 678

This book constitutes the refereed proceedings of the workshops held at the 16th Asia-Pacific Web Conference, APWeb 2014, in Changsha, China, in September 2014. The 34 full papers were carefully reviewed and selected from 59 submissions. This volume presents the papers that have been accepted for the following workshops: First International Workshop on Social Network Analysis, SNA 2014; First International Workshop on Network and Information Security, NIS 2014; First International Workshop on Internet of Things Search, IoTS 2014. The papers cover various issues in social network analysis, security and information retrieval against the heterogeneous big data.

Recent Advances in Intrusion Detection

During our trace collection for BitTorrent protocol, we used multiple torrent files
for transferring data from/to multiple geographical locations for ... The DoS attacks
was launched on two servers under our administration with public IP addresses.

DOWNLOAD NOW »

Author: Somesh Jha

Publisher: Springer

ISBN: 9783642155123

Category: Computers

Page: 524

View: 576

Annotation This book constitutes the refereed proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, held in Ottawa, Canada, in September 2010. The 24 revised full papers presented together with 15 revised poster papers were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections on network protection, high performance, malware detection and defence, evaluation, forensics, anomaly detection as well as web security.

Network Magazine

BitTorrent Jibes With Caching ID Thieves Target Smaller Phish In 2004 ,
marquee names such as Citibank and eBay were popular ... The same principle
was employed by Jibe , an ill - fated dotcom - era content delivery service , but
unlike Jibe , BitTorrent is an open protocol . ... over the protocol so that millions of
users don't cause an accidental Distributed Denial of Service ( DDoS ) attack
when trying to ...

DOWNLOAD NOW »

Author:

Publisher:

ISBN: UCSD:31822033921875

Category: Computer networks

Page:

View: 563

Botnets

In this specific case, the variant also came with an ability to launch HTTP Get
flood denial-of-service (DoS) attacks from the ... Hajime uses a distributed peer-to
-peer protocol implemented on top of BitTorrent using daily rotating info hashes
and ...

DOWNLOAD NOW »

Author: Georgios Kambourakis

Publisher: CRC Press

ISBN: 9781000649932

Category: Computers

Page: 408

View: 540

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

ICT Systems Security and Privacy Protection

Distributed protocols are promising for voting since they allow to reduce the
reliance on trust and open new prospects for verification. ... A distributed,
Kademlia-based voting protocol to rank the quality of BitTorrent content has been
proposed [10]. ... However, they assume trust in the authorities and the
aggregation is generally centralized, rendering the protocols vulnerable to DDoS
attacks and data ...

DOWNLOAD NOW »

Author: Sabrina De Capitani di Vimercati

Publisher: Springer

ISBN: 9783319584690

Category: Computers

Page: 586

View: 349

This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.