Gnutella Analysis
Gives away topology information.
Hard to control via firewalls.
Unchecked IP address and port number announcements can be used to generate flooding attacks, and possibly worse.
GUID may be usable to trace back Gnutella messages.
Previous slide
Next slide
Back to first slide
View graphic version