Protocol Attack

From ICANNWiki
Jump to navigation Jump to search

A Protocol Attack exploits a specific feature or implementation bug of a protocol installed in the victim to consume excess amounts of its resources.[1][2]

Types

  • A New Cell-Counting-Based Attack Against Tor[3]

Defense Mechanisms

  • Fake Traffic[4]

References