Font Size: a A A

The Bittorrent Safety

Posted on:2007-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:L WenFull Text:PDF
GTID:2208360185956110Subject:Software engineering
Abstract/Summary:PDF Full Text Request
BT technology is a new way to share resourse in internet. Nowadays BT technology becomes more and more popular and perfect, and becomes an important way to download resourse because of the feature"more connectors, more quickly". It makes the resource not only belong to servers any more, but belongs to all the clients of internet. It makes the C/S mode changed into equity mode. As a result, most of attack ways in C/S mode are not effective in BT Net. And most of security measures are not effective in BT Net, too. So how to protect BT Net, how to improve the security of BT,is becoming more and more important.At first, the analysis of BT protocol and Client codes illuminates the distributing and equity feature of BT Net. And the analysis also illuminates the structure and machinism of BT Net. According to that, the weekness and leak of BT are exposed. After knowing how to download files and how to connect a client of BT, the ways of attack BT Net are brought forward. According to these ideas, I designed some experiments. According to the result of experiments, it's improved that when a number of clients are attacked, the effect would spread to the whole net very quickly, because evry client is a server in BT Net. On this situation, restriction or stop on a number of clients would not take any effect. The measures must be taken to the whole net to protect the net Because of the equity and distributing of BT Net.Tracker server is very special in BT Net. It's not the center of resource but the center of net information. It's like the"war flame"which used in ancient wars. If the tracker server is hacked or controlled, the BT Net would be very dangerous. Unfortunately a number of clients can affect tracker server easily. So it's very important to improve the security of tracker.In order to improving the security of BT Net, I gave some suggestions. The point is that all the measures of BT net should not be single as C/S mode; they depend on the feature of BT Net, equity and distributing. The ideas of security should not from a single sever or a single client, but the whole net.At last, I hope the document will be helpful to the advance of BT technology and the security of BT Net.
Keywords/Search Tags:BitTorrent, Tracker, P2P, BT Net, Attack
PDF Full Text Request
Related items