Thunder is a popular P2P software at present. The multi-resource hyper-threading technology used by Xunlei is based on the grid principle, which can effectively integrate the existing server and computer resources on the network, form a unique thunder network, and transmit it at the fastest speed through various data files in thunder network.
The multi-resource hyper-threading technology used by Xunlei, in short, can be recorded as long as any user downloads that resource by using Xunlei, so the resources of Xunlei depend on the number of websites with resources. The more resources the website, the faster the multi-thread download speed of Thunder. At present, Thunder also supports various ways of obtaining and downloading resources such as electric donkey and BT, which makes Thunder the fastest P2P software to download at present, which can greatly consume the network bandwidth of enterprises.
Not only that, when downloading with Thunder, Thunder also forces users to upload from the background. Moreover, this upload speed is close to the network limit, depending on the broadband situation, ranging from 50-70KB to several hundred KB, which often takes up the uplink speed of broadband. At such a high upload speed, users' other network applications cannot be carried out, and the running speed of users' computers will slow down; At the same time, such a large number of uploads will also increase the reading and writing frequency of the hard disk. In the case of large bandwidth, the forced upload of Thunder will reach several hundred k or even several m, which means that the hard disk is read with high load for dozens or even hundreds of times per second for a long time, which is likely to reduce the life of the user's hard disk, and even directly lead to the damage of the user's hard disk due to overheating for a long time.
How to block the download of Thunder?
Thunder will use P2P-based download and HTTP-based multi-thread download at the same time, so it is necessary to ban Thunder download from these two aspects.
The first is blocking based on P2P protocol. Special sniffer software is needed to intercept the transmission data packets of Thunder, and the protocol characteristics of the transmission data packets of Thunder are analyzed. However, due to the adoption of encryption protocol and anti-sniffing interference technology, as well as the use of mature encryption packages and transmission methods such as BT and electric donkey, some protocols of Thunder cannot be fully obtained, which makes it more difficult to monitor the download of Thunder.
Secondly, in view of the situation that Thunder uses multipoint HTTP download, we can restrict HTTP download by prohibiting the file suffix of HTTP download on network devices such as firewalls, switches or routers, so that packets downloaded by Thunder using HTTP can be blocked.
Tianyicheng Network Management is the leading network behavior management system in China, which was launched by Chengdu Tianyicheng Software Co., Ltd. to intercept the popular P2P software. It is installed on a computer in the local area network, and can completely control the online behavior of the whole local area network, especially the current mainstream P2P download software and P2P video software, without the network structure such as port mirroring, proxy server or HUB, and without installing client software. The network management of Tianyi City integrates the functions of downloading the software version of Thunder 5 and controlling the webpage Thunder.
Tianyi City network management system uses P2P protocol identification and deep HTTP transmission analysis technology to intercept Thunder, and interrupts Thunder when shaking hands with TCP in advance. Combined with the function of prohibiting downloading all HTTP protocols and FTP protocols, it can completely block the possibility of Thunder trying to download through such protocols. So as to completely control the lightning. Moreover, in the network management system of Tianyi City, you can also prohibit Thunder from uploading files. By controlling the uplink bandwidth of the controlled computer, the bandwidth can be prevented from being occupied by the files uploaded by Thunder, and the full control of Thunder can be realized by limiting the files uploaded by Thunder.
I hope I can help you!