From the course: Ethical Hacking: Denial of Service

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Detecting P2P attacks with PeerShark

Detecting P2P attacks with PeerShark

From the course: Ethical Hacking: Denial of Service

Start my 1-month free trial

Detecting P2P attacks with PeerShark

- [Instructor] Peer to peer, or P2P networks are those in which there is no central server and all activity is managed by self-organizing nodes on the network. With many nodes being not only consumers of the service, but part of its infrastructure. One of the most significant P2P networks is Skype. The number of P2P networks fluctuates, but with the rapid emergence of the internet of things, there's a new role for P2P to play at the IoT device level. This is already being seen in traffic lights systems which use node to node communications at the end points. Traditional botnets operate around a central system of command and control servers. These form a single point of failure and are prime targets for take down operations which neutralizes the botnet. As P2P networks have no centralized server, they lack a single point of failure. This resilience has attracted the attention of botnet owners who are now building botnets in which implants or bots communicate, pass on commands, and…

Contents