![]() However certain peerto-peer applications have value and are permitted or at least tolerated in some corporate networks. Peer to peer applications are often cast as the villain due to their association with the downloading of copyrighted content such as music, movies, and software. ![]() Objective Peer to peer applications are increasingly under scrutiny especially on corporate networks. 14 Detecting BitTorrent Metafile Content. ![]() 10 Detecting BitTorrent Tracker Website Access. This presentation will describe the BitTorrent protocol and the associated aspects of BitTorrent communications and provides strategies to detect BitTorrent related traffic using Snort.Ĭontents Objective. Regardless of whether corporate policy prohibits downloading of copyrighted content, or prohibits all peer-‐to-‐peer usage, it is essential to be able to detect the various aspects of peer-‐to-‐peer usage. Unfortunately that also makes peer-‐to-‐peer protocols a very efficient way to download copyright content such as music and movies. The fact is that peer-‐to-‐ peer protocols such as BitTorrent provide a very efficient way to distribute large files such as operating system ISOs. It is estimated that more than 60% of the traffic on the Internet is peer-‐to-‐peer.
0 Comments
Leave a Reply. |