DRDOS attacks through BitTorrent

DRDOS (Distributed Reflective Denial of Service). Mr. Florian Adamsky from the University of London published a research paper detailing the family of protocols used by BitTorrent και μπορούν να καταχραστούν για τη διεξ DRDOS attacks.

hacker DRDOS

Most of us have a basic idea of ​​what a DDOS attack is, but the DRDOS attack is a bit different.

While in a DDOS attack a ελέγχει μια σειρά από zombie υπολογιστές που δημιουργούν υπερβολική κυκλοφορία σε έναν στόχο με αποτέλεσμα ο στόχος να "μπουκώσει" και να μην είναι πια προσβάσιμος από τρίτους, σε μια DRDOS, ο επιτιθέμενος δημιουργεί κυκλοφορία σε ένα νόμιμο εξοπλισμό δικτύου (ονομάζεται κάτοπτρο), από το οποίο στη συνέχεια αναμεταδίδει την κυκλοφορία στο θύμα.

The traffic sent to the mirror is forged and contains the victim's IP address as the origin of the packet, and when the mirror (or if you want the reflector) follows the general rules of Internet protocols and tries to create a connection, it does so with IP of the victim instead of the attacker.

Also, beyond the mission of a catwalk, the attackers have devised ways to use the mirror to boost traffic.

The protocols widely used in DRDOS is TCP, DNS, and NTP. THE research study by Mr. Adamsky shows how too many protocols can be used by the BitTorrent family in DRDOS attacks, even with the ability to boost traffic.

According to Mr. Adamsky, the BitTorrent protocols that are affected are: UTP (Micro Transport Protocol), Distributed Hash Table (DHT), and Message Stream Encryption (MSE). These are the protocols used in BitTorrent, uTorrent and Vuze applications.

In addition, the BTSync synchronization protocol used with the BitTorrent Sync file sharing application is also vulnerable.

"Τα πειράματά μας δείχνουν ότι το BitTorrent έχει ένα παράγοντα ενίσχυσης του bandwidth (BAF = bandwidth amplification factor) 50 φορές μεγαλύτερη και στην περίπτωση του BTSync είναι έως και 120 φορές μεγαλύτερη", δήλωσε ο κ. Florian Adamsky.

But the bad news doesn't stop there. In addition to traffic amplification DRDOS attacks carried out via BitTorrent are detectable with normal εξαιτίας "του εύρους των δυναμικών πορτών και της κρυπτογράφησης κατά τη διάρκεια της χειραψίας"

Οι Υπηρεσίες μετριασμού για αυτό το είδος των επιθέσεων θα απαιτούσαν πιθανά Deep Packet Inspection (DPI), μία λύση που "τρώει" πολλούς πόρους για τις περισσότερες υποδομές διακομιστών.

Such as says TorrentFreak, BitTorrent has fixed some of these issues in a recent beta, while Vuze and uTorrent are still vulnerable.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).