
Invalid information could include random content identifiers or fake IP addresses and port numbers. The attacker inserts a large amount of invalid information into the index to prevent users from finding the correct resource. Thus, this method of attack makes searching difficult for network users. The index allows users to locate the IP addresses of desired content. This method targets the index found in P2P file sharing systems. There were known cases when a company had created a special version of a game and published it on file sharing services advertising it as cracked, having undocumented hidden functionality, making it impossible to win this variant of the game. As a result, queries return principally corrupted copies such as a blank file or executable files infected with a virus. This method consumes a large amount of computing resources since the malicious server must respond to a large quantity of requests.
#HOW TO OPEN A TORRENT FILE AND MAKE IT MP3 DOWNLOAD#
In order to entice users to download the decoys, malicious users may make the corrupted file available via high bandwidth connections. A malicious user pollutes the file by converting it into another format that is indistinguishable from uncorrupted files (e.g. This deters users from finding an uncorrupted version and also increases distribution of the corrupted file. Methods of attack Decoy insertion ĭecoy insertion (or content pollution) is a method by which corrupted versions of a particular file are inserted into the network.
