CN102299895A - DoS (Denial of Service) attack method based on BitTorrent network - Google Patents

DoS (Denial of Service) attack method based on BitTorrent network Download PDF

Info

Publication number
CN102299895A
CN102299895A CN2010102071747A CN201010207174A CN102299895A CN 102299895 A CN102299895 A CN 102299895A CN 2010102071747 A CN2010102071747 A CN 2010102071747A CN 201010207174 A CN201010207174 A CN 201010207174A CN 102299895 A CN102299895 A CN 102299895A
Authority
CN
China
Prior art keywords
bittorrent
assailant
message
client
dos attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102071747A
Other languages
Chinese (zh)
Inventor
张凤荔
王勇
秦志光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN2010102071747A priority Critical patent/CN102299895A/en
Publication of CN102299895A publication Critical patent/CN102299895A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a DoS (Denial of Service) attack method based on a BitTorrent network, and the method is mainly characterized in that connections are initiated for a current alive BitTorrent client by using a BitTorrent protocol, and are kept under the condition of no file data interaction. In the invention, the connections are kept mainly through continuously sending control messages of an Interested message and a Keepalive message in the BitTorrent protocol. When a large quantity of connections are initiated to a normal client and are kept under the condition of no file data interaction, the DoS attack is realized through occupying connections of the normal client. According to the invention, the DoS attack on alive nodes in the BitTorrent network is realized, thereby reducing the capacity of providing services by the alive nodes in the BitTorrent network. The invention provides certain assistance for the large-scale and autonomous control on the BitTorrent network.

Description

A kind of DoS attack method based on the BitTorrent network
Technical field
The present invention relates to filed of network information security, be specifically related to a kind of DoS attack method based on the BitTorrent network.
Background technology
DoS (Denial of Service) is denial of service, and DoS attack is the attack that causes the DoS behavior, makes computer or network that normal service can't be provided.The DoS principle is simple and attack effect that cause is obvious, thereby becomes a kind of popular network attack mode.
BitTorrent is the file distributing agreement of a hot topic in recent years.The BitTorrent network is based on the transmission manner of BitTorrent agreement with P2P, builds on extensive, the self-organizing on the Internet, uncontrollable distributed collaborative network.The conduct of BitTorrent network is popular P2P file distributing network at present, as the channel of sharing mutually of file between Internet user.Because extensive, uncontrollable characteristic of BitTorrent network makes the BitTorrent network bring certain negative effect to society, as: file dispute over copyright, file secret protection etc.
The important supplier that live-vertex is served as the BitTorrent network in the BitTorrent network, thereby to reduce the ability that the BitTorrent network provides file-sharing service, must provide service ability to be controlled to live-vertex in the BitTorrent network.Because the BitTorrent network transmits data in the P2P mode, and can be divided into 2 classes at DoS attack with the node of P2P transmission means:
(1) bandwidth is attacked (Bandwidth Attack)
User among the normal Internet, network uplink and downlink bandwidth are limited.This type of attacks main structure assailant, and destination node is initiated to connect and download, and consumes the upstream bandwidth of destination node.Make the bandwidth of normal node request target node reduce, thereby reach the ability that destination node provides service that reduces.
(2) connect attack (Connection Attack)
As the normal users of transmitting data in the P2P mode, because the finiteness of system resource (port number, hard disk size etc.) is conditional to the number of users that request connects as P2P software.Connect attacking mainly is to the taking of the available linking number of destination node P2P software, to such an extent as to the linking number of normal node reduce, thereby reduce the ability that destination node provides normal service.
It is that downlink bandwidth to consume the assailant is a cost that bandwidth is attacked, and for the BitTorrent network of a large amount of live-vertexs, to these live-vertexs of management and control, it will be huge that bandwidth is attacked needed bandwidth.Cause easily simultaneously that the instantaneous flow of Internet increases, cause the shake of network traffics, may influence other non-destination node users among the Internet.Comparatively speaking, connect to attack and to use the very little network bandwidth, take a large amount of connection of destination node, realize reducing the ability that destination node provides service.
By contrast, in the network based on the P2P data transfer mode, realize control, connect the reduction that service ability is provided of attacking realizing with less bandwidth to destination node to live-vertex.Yet, in network,, do not have the down mutual of data in long-time, for this connection of transfer of data of optimizing network will disconnect if after connect setting up with the P2P data transfer mode.If not having to keep this connection under the situation of great amount of data transmission, then need to send some specific message and inform the other side, this connection remains active.
Summary of the invention
This invention has proposed a kind of DoS attack scheme based on the BitTorrent network.This scheme has mainly proposed a kind of BitTorrent of utilization agreement, and maintenance is connected with normal BitTorrent client.Scheme has realized under the situation of not carrying out normal file data transmission, sends the message maintenance of some BitTorrent agreement regulations and being connected of normal client.
Traditional DoS attack is a purpose with the system resource that consumes main frame, the main resource that consumes the BitTorrent client of this invention.The main linking number of realizing consuming the BitTorrent client, thus make the BitTorrent client provide the ability of service to reduce, the service ability that provides of live-vertex in the BitTorrent network is provided to a certain extent.
The technical scheme that this invention is adopted is: with normal BitTorrent network in node finish TCP shake hands be connected after, initiate BitTorrent connections of shaking hands, foundation is based on the connection of BitTorrent agreement.This invention DoS attack not only is based upon in the TCP connection, and is based upon on the BitTorrent network, uses the BitTorrent agreement to keep the connection of foundation.After the download state of statement self, Interested message and Keepalive message in the timed sending BitTorrent agreement keep this connection to be not easy to be disconnected by normal users.
Interested message and Keepalive message are as control messages in the BitTorrent agreement, and file data is not mutual.It is to inform the recipient that Interested message mainly acts on, and the recipient has the needed file data blocks of transmit leg, and transmit leg wishes to propose download request.It is not have in both sides' certain hour under the situation of interacting message that Keepalive message mainly acts on, and normal client can send this message, and the recipient is the same transmit leg Keepalive message of replying after receiving this message, informs to keep this connection.
This invention can make the interior for a long time maintenance of being connected of foundation, and the linking number that strengthens foundation can reach and align proper the taking of connection often in regular guest family.
Description of drawings
Fig. 1 is the DoS attack network topological diagram based on the BitTorrent network;
Fig. 2 is based on the whole attack strategies of the DoS of BitTorrent network;
Fig. 3 is the DoS attack flow chart based on the BitTorrent network;
Embodiment
Obtain destination node information (comprise IP address and Node B itTorrent client listening port number) based on the DoS attack of BitTorrent network, set up TCP with destination node and be connected.After confirming that destination node can connect, set up BitTorrent with destination node and be connected.When system resource is enough, constantly initiate being connected based on the BitTorrent agreement with destination node.To realize the DoS attack under the BitTorrent network.
Based on the BitTorrent agreement, set up the BitTorrent connection of shaking hands based on the DoS attack of BitTorrent network.Get nowhere if BitTorrent shakes hands to connect, will disconnect TCP and connect with conserve system resources.When finish BitTorrent shake hands finish after, the exchange of send state information and completion status information.The assailant sends Keepalive subsequently, and the opening timing device is waited for reception message simultaneously.After timing arrived, the assailant sent Interested message and at inferior startup timer.If the assailant receives the BitTorrent message of client, the assailant need handle the message that receives.If the assailant receives Keepalive message, the assailant replys Keepalive message at once.If the assailant receives other message, the assailant will not give a response.Timer time arrives after the assailant sends Interested message, and then sends Keepalive message, and starts timed sending Interested message.As shown in Figure 2.
DoS attack based on the BitTorrent network is to be based upon on the basis of BitTorrent agreement, and in the BitTorrent agreement, and Keepalive message is used to inform that both sides should connect whether keeps.After sending Interested message, the file that has transmit leg to need in expression the other side's the file content.Transmit leg may be replied Unchoke or Choke message, and whether expression allows the other side to propose download request.If the assailant receives Unchoke or Choke message does not process, destination node will not have corresponding action yet, just keep this connection.

Claims (8)

1. DoS attack method based on the BitTorrent network, in the BitTorrent network, take the connection of BitTorrent client, reach the reduction that the clothes ability is provided by the attack node, it is characterized in that: in the BitTorrent network, take the linking number of normal BitTorrent client.
2. DoS attack method as claimed in claim 1, it is characterized in that not carrying out under the mutual situation of file data, maintenance is connected with client, and the assailant only sends corresponding BitTorrent protocol message to destination node, and does not carry out normal file data request.
3. DoS attack method as claimed in claim 2 is characterized in that utilizing the control messages Ihterested message in the BitTorrent agreement to keep being connected with the long-time of normal client with Keepalive message; After setting up based on the connection of BitTorrent agreement, the assailant keeps with Interested message and is connected by regularly sending Keepalive message in turn, handles the message that the normal client that receives sends.
4. DoS attack method as claimed in claim 3, it is characterized in that setting up based on after being connected and finishing file status information mutual of BitTorrent agreement when assailant and destination node, when the assailant received the BitTorrent message of destination node transmission, the assailant need handle the BitTorrent message that receives; If receive Keepalive message, the assailant will reply Keepalive message immediately; If the assailant receives other BitTorrent message, the assailant will respond.
5. DoS attack method as claimed in claim 1 is characterized in that the assailant initiates a large amount of connections based on the BitTorrent agreement to destination node, causes target node b itTorrent client will be subjected to a large amount of connections from the assailant.
6. DoS attack method as claimed in claim 5, it is characterized in that after assailant and destination node are set up TCP and be connected, if the failure of BitTorrent handshake procedure promptly fails to set up the connection based on the BitTorrent agreement, the assailant will disconnect this TCP and connect to save system resource.
7. DoS attack method as claimed in claim 5, it is characterized in that when linking number that assailant and destination node are set up exceed that the assailant sets be connected restriction the time, the assailant will no longer connect; Assailant's linking number of keeping of inquiry regularly simultaneously, if when linking number is lower than the connection restriction of setting, the assailant will send connection request once more.
8. DoS attack method as claimed in claim 7, the connection that it is characterized in that the acquiescence acceptance of normal BitTorrent client limits the linking number that can set up less than a normal system, thereby initiate a large amount of connections to normal client based on the BitTorrent agreement by the assailant, make that normal client keeps being connected with a large amount of of assailant, take normal client connection realization DoS attack thereby reach.
CN2010102071747A 2010-06-23 2010-06-23 DoS (Denial of Service) attack method based on BitTorrent network Pending CN102299895A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102071747A CN102299895A (en) 2010-06-23 2010-06-23 DoS (Denial of Service) attack method based on BitTorrent network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102071747A CN102299895A (en) 2010-06-23 2010-06-23 DoS (Denial of Service) attack method based on BitTorrent network

Publications (1)

Publication Number Publication Date
CN102299895A true CN102299895A (en) 2011-12-28

Family

ID=45360078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102071747A Pending CN102299895A (en) 2010-06-23 2010-06-23 DoS (Denial of Service) attack method based on BitTorrent network

Country Status (1)

Country Link
CN (1) CN102299895A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394202A (en) * 2014-11-13 2015-03-04 西安交通大学 A node vitality quantifying method in a mobile social network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394202A (en) * 2014-11-13 2015-03-04 西安交通大学 A node vitality quantifying method in a mobile social network
CN104394202B (en) * 2014-11-13 2018-01-05 西安交通大学 A kind of node liveness quantization method in mobile community network

Similar Documents

Publication Publication Date Title
Loreto et al. Known issues and best practices for the use of long polling and streaming in bidirectional http
EP2645636B1 (en) Home gateway, cloud server, and method for communication therebetween
JP5678198B2 (en) Mobile Internet service realization method, gateway, proxy and system
US20080008170A1 (en) Communication system, communication method, and program
WO2013097401A1 (en) Method, gateway and communication system for browser client directly communicating with back-end server
EP2856698B1 (en) Network presence offload
WO2006133651A1 (en) Communication method between communication devices and communication apparatus
WO2019128647A1 (en) Message transmission method and device, storage medium and electronic device
KR20080019717A (en) System and method for establishing peer to peer connections between pcs and smart phones using networks with obstacles
KR20080107989A (en) Method and system for managing resource consumption by transport control protocol connections
CN105262836A (en) Information push method of server and push information reception method of client
WO2019071681A1 (en) P2p-based remote wakeup system and method
WO2011015020A1 (en) File transmission method, system and client
Jin et al. Reducing cellular signaling traffic for heartbeat messages via energy-efficient D2D forwarding
US20170279922A1 (en) Scaling persistent connections for cloud computing
US8520694B1 (en) Mobile handset power conservation using connection-release buffering
WO2013120325A1 (en) Browser-to-browser direct communication method, device and communication system
CN105453509A (en) Use of a datagram-based protocol to communicate with a VPN server
Lim C2CFTP: direct and indirect file transfer protocols between clients in client-server architecture
JP2014023150A (en) Multicast transmission using unicast protocol
CN102984814A (en) Large-scale GPRS (general packet radio service) terminal device networking method
WO2009011968A1 (en) Endpoint discriminator in network transport protocol startup packets
CN102299895A (en) DoS (Denial of Service) attack method based on BitTorrent network
CN107820218A (en) The establishing method and equipment of message transmissions mode
Raj et al. Energy adaptive mechanism for P2P file sharing protocols

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20111228