A dos attack method based on bittorrent network
A network and attacker's technology, applied in the field of network information security, can solve problems such as disconnection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The DoS attack based on the BitTorrent network obtains the target node information (including the IP address and the node BitTorrent client listening port number), and establishes a TCP connection with the target node. After confirming that the target node is connectable, a BitTorrent connection is established with the target node. When the system resources are sufficient, the BitTorrent protocol-based connection is continuously initiated with the target node. In order to realize the DoS attack under the BitTorrent network.
[0020] The DoS attack based on the BitTorrent network is based on the BitTorrent protocol, and the BitTorrent handshake connection is established. If the BitTorrent handshake connection fails, the TCP connection will be disconnected to save system resources. When the BitTorrent handshake is complete, send status information and complete the exchange of status information. Then the attacker sends a Keepalive, and starts a timer while waiting for ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 