Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
BitTorrent
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Security == One concern is the [[UDP flood attack]]. BitTorrent implementations often use [[μTP]] for their communication. To achieve high bandwidths, the underlying protocol used is [[User Datagram Protocol|UDP]], which allows spoofing of source addresses of internet traffic. It has been possible to carry out [[denial-of-service attack]]s in a P2P lab environment, where users running BitTorrent clients act as amplifiers for an attack at another service.<ref>{{cite web|last=Adamsky|first=Florian|year=2015|url=https://www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent|title=P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks|access-date=21 August 2015|archive-url=https://web.archive.org/web/20151001113522/https://www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent|archive-date=1 October 2015|url-status=live|df=dmy-all}}</ref> However this is not always an effective attack because ISPs can check if the source address is correct. Several studies on BitTorrent found files available for download containing [[malware]]. In particular, one small sample indicated that 18% of all executable programs available for download contained malware.<ref>{{cite web |url=http://www.techrepublic.com/whitepapers/searching-for-malware-in-bittorrent/1681115 | title=Searching for Malware in Bit Torrent |first1=Andrew D. |last1=Berns |first2=Eunjin (EJ) |last2=Jung |date=24 April 2008 |publisher=[[University of Iowa]], via [[TechRepublic]] |access-date=7 April 2013 | archive-url = https://web.archive.org/web/20130501051349/http://www.techrepublic.com/whitepapers/searching-for-malware-in-bittorrent/1681115 | archive-date = 1 May 2013|url-status=dead}}{{registration required}}</ref> Another study claims that as much as 14.5% of BitTorrent downloads contain [[Zero-day attack#Viruses|zero-day malware]], and that BitTorrent was used as the distribution mechanism for 47% of all zero-day malware they have found.<ref>{{cite conference|last1=Vegge|first1=Håvard|last2=Halvorsen|first2=Finn Michael|last3=Nergård|first3=Rune Walsø|conference=2009 Fourth International Conference on Internet Monitoring and Protection|pages=66|publisher=IEEE Computer Society|year=2009|url=http://www.rookconsulting.com/Downloads/NTNU-zeroday-project-2008.pdf|archive-url=https://web.archive.org/web/20130617143905/http://www.rookconsulting.com/Downloads/NTNU-zeroday-project-2008.pdf|archive-date=2013-06-17|format=PDF ''(orig. work + pub. paper)''|doi=10.1109/ICIMP.2009.19|title=Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-Day Malware|isbn=978-1-4244-3839-6|s2cid=15567480}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)