BitTorrent DHT used for DDoS Attacks?

Tharic-Nar

Senior Editor
Staff member
Moderator
BitTorrent is slowly gaining a ubiquitous status as the go to protocol for downloads. A thorn in its side has been its reliance on a central tracker, which if taken down would result in peers being unable to connect to each other. Moving along a few years and the Distributed Hash Table or DHT system was implemented into the BitTorrent protocol, first by Azureus and then later by the BitTorrent standard as a derivative of Kademlia, allowing for peers to become nodes, each with its own ID and use hash keys to find files, these keys being stored by the nodes. It's a case of using the 'six degrees of separation' principal (or 8 in the case of DHT) to find everyone and thus the files. No central server to take down. This is great, until someone starts putting 'bad nodes' into the system.
bittorrent_logo_123110.png
You can read the rest of our post and discuss here.
 
Top