A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
A research on the vulnerability in popular P2P protocols
2013
2013 8th International Conference on Communications and Networking in China (CHINACOM)
P2P-structure networks attract lots of users due to the large capacity and good performance. However, vulnerabilities in the protocols may be exploited maliciously by attackers to launch network attacks. In this paper, we first give an overview of several popular P2P networks with protocol vulnerabilities that can be used to launch attacks. Then we illustrate how to carry out network attacks through exploiting vulnerability in Thunder, the most popular downloading software in China. The
doi:10.1109/chinacom.2013.6694630
fatcat:r7rqeoikfjhhbmomk4g4jurem4