Unlock instant, AI-driven research and patent intelligence for your innovation.

A dos attack method based on bittorrent network

A network and attacker's technology, applied in the field of network information security, can solve problems such as disconnection

Inactive Publication Date: 2011-12-28
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a P2P data transmission network, if there is no data interaction for a long time after the connection is established, the connection will be disconnected in order to optimize the data transmission of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dos attack method based on bittorrent network
  • A dos attack method based on bittorrent network
  • A dos attack method based on bittorrent network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The DoS attack based on the BitTorrent network obtains the target node information (including the IP address and the node BitTorrent client listening port number), and establishes a TCP connection with the target node. After confirming that the target node is connectable, a BitTorrent connection is established with the target node. When the system resources are sufficient, the BitTorrent protocol-based connection is continuously initiated with the target node. In order to realize the DoS attack under the BitTorrent network.

[0020] The DoS attack based on the BitTorrent network is based on the BitTorrent protocol, and the BitTorrent handshake connection is established. If the BitTorrent handshake connection fails, the TCP connection will be disconnected to save system resources. When the BitTorrent handshake is complete, send status information and complete the exchange of status information. Then the attacker sends a Keepalive, and starts a timer while waiting for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention proposes a DoS attack method based on the BitTorrent network, which mainly utilizes the BitTorrent protocol to initiate a connection to the currently active BitTorrent client and maintain the connection without file data interaction. The invention keeps the connection mainly by continuously sending the control messages Interested message and Keepalive message in the BitTorrent protocol. When a large number of connections are initiated to normal clients and these connections are maintained without file data interaction, the number of connections occupied by normal clients can be achieved to achieve a DoS attack. The invention realizes the DoS attack on the active nodes in the BitTorrent network, and reduces the ability of the active nodes to provide services in the BitTorrent network. It provides some help for the management and control of large-scale and autonomous BitTorrent networks.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a DoS attack method based on a BitTorrent network. Background technique [0002] DoS (Denial of Service) is a denial of service. A DoS attack is an attack that causes a DoS behavior, making a computer or network unable to provide normal services. The principle of DoS is simple and the effect of the attack is obvious, so it has become a popular network attack method. [0003] BitTorrent is a popular file distribution protocol in recent years. The BitTorrent network is a large-scale, self-organizing, uncontrollable distributed collaborative network built on the Internet in the form of P2P transmission based on the BitTorrent protocol. BitTorrent network, as a popular P2P file distribution network nowadays, serves as a channel for sharing files between Internet users. Due to the large-scale and uncontrollable characteristics of the BitTorrent network, the BitTorrent ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 张凤荔王勇秦志光
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA