Repository logo
 
Publication

Torrent Poisoning Protection with a Reverse Proxy Server

dc.contributor.authorGodinho, António Augusto Nunes
dc.contributor.authorRosado, José
dc.contributor.authorSá, Filipe
dc.contributor.authorCaldeira, Filipe
dc.contributor.authorCardoso, Filipe Gonçalves
dc.date.accessioned2023-04-13T07:49:19Z
dc.date.available2023-04-13T07:49:19Z
dc.date.issued2023
dc.date.updated2023-04-12T14:16:43Z
dc.description.abstractA Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually compromised/infected computers controlled by the attackers. There are several variations of this kind of attack, and torrent index poisoning is one. A Distributed Denial-of-Service (DDoS) attack using torrent poisoning, more specifically using index poisoning, is one of the most effective and disruptive types of attacks. These web flooding attacks originate from BitTorrent-based file-sharing communities, where the participants using the BitTorrent applications cannot detect their involvement. The antivirus and other tools cannot detect the altered torrent file, making the BitTorrent client target the webserver. The use of reverse proxy servers can block this type of request from reaching the web server, preventing the severity and impact on the service of the DDoS. In this paper, we analyze a torrent index poisoning DDoS to a higher education institution, the impact on the network systems and servers, and the mitigation measures implemented.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.citationGodinho, A.; Rosado, J.; Sá, F.; Caldeira, F.; Cardoso, F. Torrent Poisoning Protection with a Reverse Proxy Server. Electronics 2023, 12, 165. https://doi.org/10.3390/ electronics12010165pt_PT
dc.identifier.doi10.3390/electronics12010165pt_PT
dc.identifier.issn2079-9292
dc.identifier.slugcv-prod-3106519
dc.identifier.urihttp://hdl.handle.net/10400.19/7720
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.subjecttorrent poisoningpt_PT
dc.subjectindex poisoningpt_PT
dc.subjectHAProxypt_PT
dc.subjectreversed proxypt_PT
dc.subjectDistributed Denial-ofService (DDoS) flooding attackpt_PT
dc.titleTorrent Poisoning Protection with a Reverse Proxy Serverpt_PT
dc.typejournal article
dspace.entity.typePublication
oaire.citation.endPage165pt_PT
oaire.citation.issue1pt_PT
oaire.citation.startPage165pt_PT
oaire.citation.titleElectronicspt_PT
oaire.citation.volume12pt_PT
person.familyNameCaldeira
person.givenNameFilipe
person.identifierlXPmBvYAAAAJ
person.identifier.ciencia-idCB11-8109-AB1D
person.identifier.orcid0000-0001-7558-2330
person.identifier.scopus-author-id36023210300
rcaap.cv.cienciaidCB11-8109-AB1D | Filipe Caldeira
rcaap.rightsopenAccesspt_PT
rcaap.typearticlept_PT
relation.isAuthorOfPublicatione845705e-5b0b-4f70-9c53-c472ffd768d1
relation.isAuthorOfPublication.latestForDiscoverye845705e-5b0b-4f70-9c53-c472ffd768d1

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
electronics-12-00165.pdf
Size:
1.35 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.82 KB
Format:
Item-specific license agreed upon to submission
Description: