Sciweavers

7 search results - page 1 / 2
» On the feasibility of exploiting P2P systems to launch DDoS ...
Sort
View
PPNA
2010
78views more  PPNA 2010»
13 years 3 months ago
On the feasibility of exploiting P2P systems to launch DDoS attacks
Xin Sun, Ruben Torres, Sanjay G. Rao
INFOSCALE
2006
ACM
13 years 11 months ago
Exploiting P2P systems for DDoS attacks
— When a P2P system has millions of concurrently active peers, there is the risk that it could serve as a DDoS engine for attacks against a targeted host. In this paper we descri...
Naoum Naoumov, Keith W. Ross
CN
2010
77views more  CN 2010»
13 years 3 months ago
Preventing DDoS attacks on internet servers exploiting P2P systems
Xin Sun, Ruben Torres, Sanjay G. Rao

Publication
96views
13 years 5 months ago
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BitTorrent is currently one of the most popular peer-to-peer systems. BitTorrent clients are widely spread all over the world and account for a large fraction of today’s Internet...
Karim El Defrawy, Minas Gjoka, Athina Markopoulou
CCS
2009
ACM
14 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...