From the course: Ethical Hacking: Denial of Service
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Detecting P2P attacks with PeerShark
From the course: Ethical Hacking: Denial of Service
Detecting P2P attacks with PeerShark
- [Instructor] Peer to peer, or P2P networks are those in which there is no central server and all activity is managed by self-organizing nodes on the network. With many nodes being not only consumers of the service, but part of its infrastructure. One of the most significant P2P networks is Skype. The number of P2P networks fluctuates, but with the rapid emergence of the internet of things, there's a new role for P2P to play at the IoT device level. This is already being seen in traffic lights systems which use node to node communications at the end points. Traditional botnets operate around a central system of command and control servers. These form a single point of failure and are prime targets for take down operations which neutralizes the botnet. As P2P networks have no centralized server, they lack a single point of failure. This resilience has attracted the attention of botnet owners who are now building botnets in which implants or bots communicate, pass on commands, and…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.