Using Bittorent protocol to launch DDoS attacks (PDF)
(Sprache: Englisch)
Essay from the year 2012 in the subject Computer Science - IT-Security, , language: English, abstract: In a nutshell what the researcher hopes to achieve by this project is to develop a practical solution to control Distributed Denial of Service (DDoS)...
sofort als Download lieferbar
eBook (pdf)
Fr. 4.00
inkl. MwSt.
- Kreditkarte, Paypal, Rechnung
- Kostenloser tolino webreader
Produktdetails
Produktinformationen zu „Using Bittorent protocol to launch DDoS attacks (PDF)“
Essay from the year 2012 in the subject Computer Science - IT-Security, , language: English, abstract: In a nutshell what the researcher hopes to achieve by this project is to develop a practical solution to control Distributed Denial of Service (DDoS) attacks launched using BitTorrent protocol by tweaking the source code of an existing open source BitTorrent client.
Even though BitTorrent is a useful protocol, it could be misused to launch DDoS attacks. Since the number who uses BitTorrent protocol is high, by launching a DDoS the victim's machine could be crippled. Hence as a remedy to the issue this report is formulated so that it discusses how the attacks are done and how it could be prevented.
For a simple analogical demonstration of what this attack does, take a look at figure 1 where computer A cannot fulfill the requests of a legit user computer B. this is what DDoS attack does. After enhancing the security architecture of BitTorrent client this problem would not occur hence it is improved to control these attacks.
Even though BitTorrent is a useful protocol, it could be misused to launch DDoS attacks. Since the number who uses BitTorrent protocol is high, by launching a DDoS the victim's machine could be crippled. Hence as a remedy to the issue this report is formulated so that it discusses how the attacks are done and how it could be prevented.
For a simple analogical demonstration of what this attack does, take a look at figure 1 where computer A cannot fulfill the requests of a legit user computer B. this is what DDoS attack does. After enhancing the security architecture of BitTorrent client this problem would not occur hence it is improved to control these attacks.
Bibliographische Angaben
- Autor: Ashan Maduranga
- 2015, 1. Auflage, 9 Seiten, Englisch
- Verlag: GRIN Verlag
- ISBN-10: 3656894620
- ISBN-13: 9783656894629
- Erscheinungsdatum: 10.02.2015
Abhängig von Bildschirmgrösse und eingestellter Schriftgrösse kann die Seitenzahl auf Ihrem Lesegerät variieren.
eBook Informationen
- Dateiformat: PDF
- Grösse: 0.78 MB
- Ohne Kopierschutz
- Vorlesefunktion
Sprache:
Englisch
Kommentar zu "Using Bittorent protocol to launch DDoS attacks"
0 Gebrauchte Artikel zu „Using Bittorent protocol to launch DDoS attacks“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Using Bittorent protocol to launch DDoS attacks".
Kommentar verfassen