Turning P2P Networks into DDoS Engines: A Survey
Publish place: Journal of Computer and Robotics، Vol: 3، Issue: 2
Publish Year: 1388
Type: Journal paper
Language: English
View: 518
This Paper With 12 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
JR_JCR-3-2_001
Index date: 13 January 2018
Turning P2P Networks into DDoS Engines: A Survey abstract
Recently, Peer-to-Peer (P2P) networks contribute to a large fraction of the Internet backbone traffic. Consequently, misusing such networks for malicious purposes is a potential side effect. In this review article, we investigate different techniques of misusing P2P overlay networks to launch large-scale next-generation Distributed Denial of Service (DDoS) attacks. In particular, we investigate representative systems of the structured (Overnet), unstructured (Gnutella) and hybrid (BitTorrent) P2P overlay networks. Real world experiments indicate the high performance, difficulty in detection and tracking, and the low cost of launching such attacks.
Turning P2P Networks into DDoS Engines: A Survey Keywords:
Turning P2P Networks into DDoS Engines: A Survey authors
Hamid Farhadi
School of Science and Eng., Sharif University of Technology (International Campus), Kish, Iran
Behzad Akbari
Department of Electrical and Computer Eng., Tarbiat Modares University, Tehran, Iran
Shahab Rajaee
School of Science and Eng., Sharif University of Technology (International Campus), Kish, Iran
Mohammad Farahani
School of Science and Eng., Sharif University of Technology (International Campus), Kish, Iran