Torrent Poisoning Protection with a Reverse Proxy Server

نویسندگان

چکیده

A Distributed Denial-of-Service attack uses multiple sources operating in concert to a network or site. typical DDoS flood on website targets web server with valid requests, exhausting the server’s resources. The participants this are usually compromised/infected computers controlled by attackers. There several variations of kind attack, and torrent index poisoning is one. (DDoS) using poisoning, more specifically one most effective disruptive types attacks. These flooding attacks originate from BitTorrent-based file-sharing communities, where BitTorrent applications cannot detect their involvement. antivirus other tools altered file, making client target webserver. use reverse proxy servers can block type request reaching server, preventing severity impact service DDoS. In paper, we analyze higher education institution, systems servers, mitigation measures implemented.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy

In this era where Internet has captured the world, level of security that this Internet provides has not grown as fast as the Internet application. Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. One such intrusion is the SQL Injection attacks (SQLIA). Since S...

متن کامل

A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

-Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong nonrepudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We...

متن کامل

Proxy QUOTE SERVER

We’re changing gears in this column. Our recent columns have used a distributed stock quoting example to focus on different concurrency models for developing multithreaded server applications. In this column, we’ll start looking at another aspect of distributed object computing systems: decoupling the relationship between “clients” and “servers.” Our examples to date have focused exclusively on...

متن کامل

Security considerations with Squid proxy server

Securing and controlling workstation access to the web has never been an easy task for security professionals. Firewalls and access control list on routers alone may not bring an acceptable level of security for your organization. Even if their primary role is to reduce network traffic and improve performance, HTTP proxy servers (also called cache servers) are likely to be installed as an addit...

متن کامل

Intelligent Proxy Server

This paper studies the choice of web proxy servers. Usually there are plenty of proxy servers that are available to users, so it is important for users to choose the best proxy server. When visiting web servers in different countries, it is a common practice to divert the requests to different proxy servers in order to get better performance. However, generally the users do not exactly know whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12010165