![]() ![]() Index poisoning of a torrent file is a type of DDoS attack that uses the BitTorrent protocol. Distributed DoS (DDoS) attack is more effective because the attack originates from multiple sources, is more difficult to block, and is more effective in data load. When successful, Denial-of-Service (DoS) attacks may stop legitimate users from accessing a specific network resource such as a web server. In this paper, we analyze a torrent index poisoning DDoS to a higher education institution, the impact on the network systems and servers, and the mitigation measures implemented. The use of reverse proxy servers can block this type of request from reaching the web server, preventing the severity and impact on the service of the DDoS. The antivirus and other tools cannot detect the altered torrent file, making the BitTorrent client target the webserver. These web flooding attacks originate from BitTorrent-based file-sharing communities, where the participants using the BitTorrent applications cannot detect their involvement. A Distributed Denial-of-Service (DDoS) attack using torrent poisoning, more specifically using index poisoning, is one of the most effective and disruptive types of attacks. There are several variations of this kind of attack, and torrent index poisoning is one. The participants in this attack are usually compromised/infected computers controlled by the attackers. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |