Open Access
Subscription Access
A Novel Approach for Mitigating Distributed Denial of Service Attacks Drawn on Bit-torrent Protocol in Computer Networks
The objective of the paper is to propose and describe a possible defense mechanism that can be taken up to prevent exploitation of Bit torrent in a peer-to-peer network.
Keywords
Bit Torrent, Torrent, Lechers, Seeds, Tracker
User
Information
- Castro M, Druschel P, Ganesh A, Rowstron A and Wallach DS (2002) Security for structured peer-topeer overlay networks. In OSDI.
- Daswani N and Garcia-MolinaH (2002) Query-flood DoS attacks in Gnutella. CCS 2002.
- Naoum Naoumov and Keith Ross (2006) Exploiting P2P systems for DDoS Attacks. INFOSCALE '06. Proce. First Intl. Conf. Scalable Info. Sys., May 29- June 1, Hong Kong © .
- Giuli TJ, Maniatis, Roussopoulos M, Baker M, Rosenthal DS and Roussopoulos M (2005) Attrition defenses for a peer-to-peer digital preservation system. Proc. USENIX Technical Conf.
Abstract Views: 482
PDF Views: 104