BITTORRENT BLOG - Mitigating DRDoS Vulnerability in the BitTorrent Ecosystem
BITTORRENT ENGINEERING BLOG - DRDoS, UDP-Based protocols and BitTorrent
Recently, Florian Adamsky presented a paper at a USENIX Workshop on Offensive Technologies. The paper reported on a study his team conducted on the possibility of exploiting BitTorrent protocols for Distributed Reflective Denial of Service Attacks (DRDoS). The risk being that an attacker could exploit a user unknowingly and have them direct traffic to a victim at such volume as to take them offline. Their net conclusion was that there were some vulnerabilities.
Thankfully, no such attack has yet been observed in the wild and Florian responsibly contacted us to share his findings. This gave our engineering team the opportunity to mitigate the possibility of such an attack.
The details can be found in Francisco’s post on our Engineering Blog. We’ll continue to update as needed.
(Read more)
Thankfully, no such attack has yet been observed in the wild and Florian responsibly contacted us to share his findings. This gave our engineering team the opportunity to mitigate the possibility of such an attack.
The details can be found in Francisco’s post on our Engineering Blog. We’ll continue to update as needed.
(Read more)
BITTORRENT ENGINEERING BLOG - DRDoS, UDP-Based protocols and BitTorrent