Peer-to-Peer attacks exploit the fabric of peering technology to perform attacks. These attacks distinguish themselves from other types of attacks because of the following:
1. Attacker doesn't have to communicate with the clients for subversion and
2. The automated nature of Peer-to-Peer technology can allow for BOT like amplification of an attack with the permission of the victim.