Open Access Open Access  Restricted Access Subscription Access

A Novel Approach for Mitigating Distributed Denial of Service Attacks Drawn on Bit-torrent Protocol in Computer Networks


Affiliations
1 Thiagarajar School of Management, Madurai, Tamilnadu, Bhartathiar University, Coimbatore – 641 046
2 Department of Computer Applications, Sri Venkateswara College of Computer Applications and Management, Coimbatore-641105, India
 

The objective of the paper is to propose and describe a possible defense mechanism that can be taken up to prevent exploitation of Bit torrent in a peer-to-peer network.

Keywords

Bit Torrent, Torrent, Lechers, Seeds, Tracker
User

  • Castro M, Druschel P, Ganesh A, Rowstron A and Wallach DS (2002) Security for structured peer-topeer overlay networks. In OSDI.
  • Daswani N and Garcia-MolinaH (2002) Query-flood DoS attacks in Gnutella. CCS 2002.
  • Naoum Naoumov and Keith Ross (2006) Exploiting P2P systems for DDoS Attacks. INFOSCALE '06. Proce. First Intl. Conf. Scalable Info. Sys., May 29- June 1, Hong Kong © .
  • Giuli TJ, Maniatis, Roussopoulos M, Baker M, Rosenthal DS and Roussopoulos M (2005) Attrition defenses for a peer-to-peer digital preservation system. Proc. USENIX Technical Conf.

Abstract Views: 482

PDF Views: 104




  • A Novel Approach for Mitigating Distributed Denial of Service Attacks Drawn on Bit-torrent Protocol in Computer Networks

Abstract Views: 482  |  PDF Views: 104

Authors

S. S. Nagamuthu Krishnan
Thiagarajar School of Management, Madurai, Tamilnadu, Bhartathiar University, Coimbatore – 641 046
V. Saravanan
Department of Computer Applications, Sri Venkateswara College of Computer Applications and Management, Coimbatore-641105, India

Abstract


The objective of the paper is to propose and describe a possible defense mechanism that can be taken up to prevent exploitation of Bit torrent in a peer-to-peer network.

Keywords


Bit Torrent, Torrent, Lechers, Seeds, Tracker

References





DOI: https://doi.org/10.17485/ijst%2F2012%2Fv5i7%2F30501